Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 18 of 348

Threads edges out X in daily mobile users, new data shows

Interpreting the usage numbers

  • Several commenters question the article’s claim that X’s U.S. DAUs halved; the visible graph looks more like 150M → 125M and appears to be global, not U.S.-only.
  • Others note the TechCrunch piece focuses on mobile DAUs; X likely has many more web users than Threads, so “parity” on mobile alone is misleading.
  • People are skeptical of the Similarweb data because the article doesn’t explain methodology or provide a direct source beyond screenshots.

Drivers of Threads’ growth

  • Many argue Threads’ rise is heavily driven by Meta’s funnel: Instagram’s 2B+ users, mandatory or near-mandatory IG linkage in some regions, and constant in‑app promotion.
  • In the EU, some report you can sign up with a phone number instead of Instagram, likely due to DMA restrictions on cross‑using personal data.
  • Users describe Instagram showing teaser “stripes” of Threads posts where you must tap through (and often install Threads) to see replies, plus aggressive, sometimes irrelevant notifications.
  • Some believe most Threads “users” are Instagram users who clicked through once, not people who identify as part of a Threads community.

Perceptions of X/Twitter’s decline

  • Multiple people report X feeling empty, bot‑ridden, or dominated by scammers and “tech bros,” despite large claimed user counts.
  • Others say most users are quiet lurkers, which is true on all platforms, and that some niches (AI/ML, OSINT, certain politics) remain very active.
  • There’s mention of abandoned-account purges and handle auctions being inconsistent; some got long-dead usernames, others view this as “renting” identities.
  • A rumor is cited about an algorithmic “pageview budget” per user that suppresses visibility after some quota, allegedly breaking core dynamics; this is unverified in the thread.

Content, culture, and politics

  • Several commenters see X as heavily tilted toward far-right or racist content, describing reply threads under news as “vile” and unusable for non‑aligned users.
  • Others counter that their “For You” feed is mostly tech/photography and find Reddit far more “far-left” or propagandistic, sparking a long argument over what counts as extremism vs “reality bias.”
  • Some note that different communities migrated to different platforms: historians and some niches to Bluesky, infosec to Mastodon, others staying on X.
  • Threads is described by some as lighter and less rage-bait‑driven, but also full of ChatGPT spam and wannabe influencer posts; one person calls it “TikTok but with text.”

Platform consolidation and alternatives

  • There is widespread discomfort with “trading one evil billionaire for another” and consolidating public discourse into a few corporate platforms seen as politically aligned with Trump or other elites.
  • People mention Bluesky, Mastodon, and Lemmy as healthier or more pleasant, but also note that almost nobody in their offline lives is willing to leave Meta/X.
  • A few advocate disengaging from social media entirely, or returning to forums, self‑hosted sites, and pseudonymous identities, while others argue the old web won’t come back without new discovery mechanisms.

Meta, WhatsApp, and anecdotal bias

  • Several comments highlight “anchoring bias”: tech circles frequently underestimate Meta’s reach because their own peers don’t use certain products.
  • Examples: WhatsApp as essential infrastructure in much of Europe; historic regional hits like Orkut; Facebook still heavily used by older or non‑U.S. communities even as it looks “dead” to some.
  • The thread repeatedly notes that HN, and especially English‑speaking tech circles, are poor proxies for global usage patterns.

Threads vs X for tech and news

  • One active Threads poster in AI/tech reports that breaking tech news and “what really matters” still appear on X first, with Threads lagging and focusing more on personal updates within small circles.
  • Others say X still has a unique “you’ll see things here first” quality, akin to HN for certain fields, whereas Threads feels more generic or Instagram‑adjacent.

Walled gardens, federation, and trust

  • Some argue Threads isn’t a classic walled garden because of ActivityPub integration; others are highly skeptical, citing past examples like open XMPP and now‑defunct APIs that were later shut down.
  • Many fediverse instances reportedly block Threads due to spam and distrust of Meta.
  • Overall, there is a consistent belief that Meta has little long-term incentive to fully embrace open federation, and users expect integration to remain limited or fragile.

Nonviolence

Violence vs. Nonviolence as a Paired Strategy

  • A recurring claim: nonviolence only works when backed by a credible threat of violence from aligned but separate actors (“good cop / bad cop” at movement scale).
  • Argument: power-holders can ignore purely nonviolent protest, but not those willing to use force; negotiation with moderates becomes attractive compared to radicals.
  • Counterargument: this risks justifying violence and ignores that violent factions often alienate the public and shrink support.

Empirical Claims about Movement Success

  • Several comments cite research on ~600 movements since 1900 claiming:
    • Less violent campaigns succeed more often (roughly 40% vs 25%).
    • Nonviolent movements are more likely to lead to democratic outcomes.
  • Others challenge causality and raise survivorship bias: less promising movements may be more likely to turn violent.
  • The popular “3.5% rule” is discussed; some see it misused as a magic threshold, others note even its authors warn against over-reading it.

Historical Examples and Disputes

  • US civil rights and Indian independence are seen by some as succeeding partly because of background riots, armed groups, and global pressures (e.g., postwar Britain), not just principled nonviolence.
  • Others stress that women’s rights and abolitionist campaigns show nonviolent moral arguments can succeed, though critics reframe these as driven by economic shifts (industrialization, labor markets).
  • There is debate over how much parallel “militant” figures actually influenced concessions, and whether that’s historically substantiated.

Moral Frameworks: Agape vs Utilitarian Pacifism

  • Some distinguish a deep, love-based nonviolence (agape, “exiting the domination paradigm”) from tactical nonviolence used simply because it “works.”
  • Concern: without such a moral framework, movements treat nonviolence as a gambit and may abandon it once they gain power.

State Violence, Everyday Life, and Social Contract

  • Several comments argue everyday “nonviolent” order actually rests on the state’s monopoly on violence (police, courts, eviction, fines).
  • Hypotheticals (e.g., being illegally locked out of housing with no legal recourse) are used to argue that when institutions fail, turning to direct force becomes understandable.
  • Others insist most people act nonviolently out of norms and trust, not fear of punishment.

Modern Protest and Media Dynamics

  • Some see contemporary mass protests as ritualized “rights exercises” with no escalation path, thus easy for authorities to ignore.
  • Media coverage is said to reward spectacle; there’s a cynical suggestion that a small “unassociated” violent wing can amplify visibility while the main body stays nonviolent for optics.
  • Nonviolent resistance is also framed as broad-based disruption and quiet sabotage, not just marches.

Limits and Preconditions of Nonviolence

  • Multiple comments stress that nonviolence presupposes some “moral audience” capable of shame or persuasion; in contexts of extreme repression or low empathy, its efficacy is questioned.
  • Others maintain that, even then, violence tends to destroy social fabric and carries long-term costs that often outweigh short-term gains.

Letter from a Birmingham Jail (1963)

Violence, Nonviolence, and How Change Happens

  • Many comments challenge the simplified “nonviolent MLK vs violent radicals” story.
  • One view: King’s success depended partly on the credible threat of more militant groups (e.g., Malcolm X, Black Panthers) shifting the “Overton window” and making King’s path more palatable.
  • Others argue this is overstated or unproven: violence tends to strengthen state repression, and both the U.S. and late‑Empire UK were unusually sensitive to optics and ideals, making nonviolence especially potent.
  • Indian independence is debated similarly: some stress Gandhi’s centrality; others emphasize revolutionary violence as an indispensable “stick” behind his “carrot.”
  • Several stress that nonviolence wasn’t passive; it was a deliberate willingness to endure state brutality in public to expose injustice.

Civil Disobedience, Law, and Justice

  • The letter’s distinction between laws “just in text but unjust in application” prompts extensive discussion.
  • Some see this as classic civil disobedience: breaking unjust applications openly and accepting punishment as a way to honor law while correcting it.
  • Others strongly reject the idea that one must willingly submit to punishment; they cite resistance to Nazis/Communists as clearly valid without self‑sacrifice.
  • Jury nullification is raised as the flip side: juries may refuse to convict under unjust laws or uses of law.

Modern Legal System and Plea Bargains

  • A long subthread disputes whether U.S. law is “more often just than unjust” in practice.
  • Critics point to ~98% of criminal cases ending in plea bargains, high costs of trial, underfunded defense, and severe sentencing gaps as making the “choice” to plead effectively coercive, even for some innocents.
  • Defenders argue most defendants are in fact guilty, plea deals can be a reasonable tradeoff, and wrongful convictions are real but statistically rare; they see calls of systemic injustice as overstated.
  • There is partial convergence that economic barriers and extreme penalty gaps create real, fixable injustices even if the system is not wholly “broken.”

Relevance Today: Moderates, Risk, and State Power

  • King’s critique of the “white moderate” is linked to contemporary liberal/left splits, Democratic Party timidity, and responses to ICE abuses and policing.
  • Some say people now “have too much to lose” to engage in civil disobedience; others reply that earlier activists risked far more and that today’s reluctance is mostly fear and comfort.
  • Examples like ICE conduct and immigration stops on “reasonable suspicion” are cited as modern instances where law’s application diverges sharply from justice.

US Places Arctic Airborne Troops on Standby as Greenland Dispute Escalates

Domestic Use of Troops vs. Greenland Scenario

  • Multiple commenters argue the article is misleading: the Arctic unit is reportedly on standby for Minnesota, not Greenland, making the “Greenland dispute” framing clickbait and “rage bait.”
  • Others respond that even a Minnesota deployment is alarming: using an Arctic, Indo-Pacific–oriented division for domestic crowd control seems like using an “Arctic hammer for an urban nail.”
  • There is disagreement over intent and risk:
    • Some fear escalation of already-violent state actions against civilians and see this as part of a broader authoritarian trajectory.
    • Others insist the idea that these troops will be used to kill Americans is unfounded, and that US problems are real but separate from such scenarios.
  • Debate arises over whether regular combat troops are inherently unsafe for protest control (trained for overwhelming lethal force) vs. the counterpoint that this logic would imply they cannot safely live among civilians at all.

Quality and Authenticity of the Article

  • Several commenters call the piece “really bad” and “alarmist,” noting:
    • The text itself repeatedly downplays Greenland but the headline emphasizes it.
    • Alleged expert quotes appear nowhere else online, leading some to conclude it is LLM-generated content with fabricated quotations.
  • Some still defend its core concern as plausible given recent political rhetoric, but others stress there is no corroboration from major outlets and no visible supporting orders or movements, labeling it speculation and “bluster” rather than evidence of imminent war.

Arctic Posting and Soldier Preferences

  • OP’s assumption that Arctic duty is a “worst” posting is challenged:
    • Some soldiers reportedly request Alaska/Arctic assignments for lifestyle (hunting, fishing, skiing, climbing), challenge, and favorable garrison conditions.
    • Three‑year Alaska tours with modern cold-weather gear are described as attractive to outdoors-oriented troops.
    • Arctic/Antarctic postings are said to be oversubscribed among those seeking unusual experiences.
  • There is a side debate about the relative capability of US Arctic troops versus Finnish/Nordic counterparts, with one view doubting US competitiveness and another noting the existence of highly capable US elite arctic units.

Geopolitics, Trump, and NATO

  • Several comments frame any US move on Greenland as a severe geopolitical rupture with Europe and Canada, requiring clear preparatory signals (legal authorities, troop movements, diplomatic steps) that, commenters note, have not been observed.
  • Others argue Trump’s past behavior (Venezuela raid, domestic shootings, tariffs, NATO hostility, fixation on prestige like the Nobel) shows he is reckless enough that traditional indicators and rational calculations may not apply.
  • A long subthread distinguishes “bluster” (threats, rhetoric, floated illegal orders) from “action” (Venezuela operation, deadly domestic incidents, potential martial law in Minnesota), warning that each step normalizes further escalation.
  • Commenters worry about long-term damage to US alliances and soft power, and describe the current moment as “post-truth,” where many voters will not acknowledge mistakes even in the face of clear evidence.

Broader Political and Moral Reactions

  • Some participants vent broader anti-US sentiment, portraying the US as a primary source of global instability and praising an alternative order led by EU/China as hypothetically more stable.
  • Others highlight the irony that “Make America Great Again” appears, in their view, to be rapidly producing the opposite outcome.
  • A final theme is historical caution: commenters note that wars often begin when an aggressor assumes that third parties will not intervene because it seems irrational—an assumption they see as dangerous in the current context.

Nearly a third of social media research has undisclosed ties to industry

Industry Ties in Social Media Research

  • Many commenters say the findings are unsurprising and mirror patterns in tobacco, fossil fuels, pharma, food, AI, and crypto.
  • Some argue industry funding is almost inevitable: they hold the data, infrastructure, and money; without them, little large‑scale research would be possible.
  • Others stress this creates serious worries for policy-making, since there’s a built‑in incentive not to anger funders.
  • A minority questions the study’s methodology, especially counting prior co-authorship with an industry employee as a “tie” that must be disclosed.

Trust, Disclosure, and Independence

  • Several express deep distrust of both industry and academia, seeing universities as “reputation laundering” for corporate interests.
  • Others emphasize that undisclosed ties call for closer scrutiny of findings, but don’t automatically invalidate results.
  • A coalition for independent tech research is mentioned as an attempt to counterbalance corporate influence.

Ethics and Regulation of Corporate “Research”

  • Strong concern that social media companies can run large‑scale behavioral experiments without independent ethics review, unlike academic researchers.
  • Debate over what “research” actually is:
    • One side argues A/B tests and emotion‑manipulation studies clearly qualify and should face oversight.
    • The other side warns that over‑regulation would block useful analysis (including detecting harms) and notes that everyday business experimentation resembles research.
  • Some see academic ethics boards as overbearing but necessary given past abuses.

Social Media as a Grand Experiment

  • Many frame social media as a massive, poorly regulated experiment in connecting everyone and optimizing for engagement, outrage, and emotionalism.
  • Comparisons to leaded gasoline and big tobacco: slow, large‑scale harm whose full cost may only be clear decades later.
  • Extended discussion of algorithmic feeds:
    • Critics: they amplify rage, create echo chambers, normalize extremism, and differ from earlier forums by making toxicity the default rather than an opt‑in subculture.
    • Others note toxicity long predates algorithms (Usenet, forums, cable news, yellow journalism); algorithms mainly scale and automate it.

Coping and Policy Ideas

  • Personal responses: delete apps, add “friction,” use non‑algorithmic tools (newsletters, chronological feeds).
  • Policy suggestions: stronger disclosure norms, data transparency, limits on platform data ownership, structural reforms to reduce monopoly power, and rethinking the balance between free speech, Section 230, and algorithmic editorial control.

Notes on Apple's Nano Texture (2025)

Cleaning, Cloths & Chemicals

  • Many commenters only realized there’s a special Apple cloth after this article; replacements are sold separately and mocked as overpriced.
  • People debate cleaning methods: Apple’s guidance is a 70% isopropyl solution on the cloth, never directly on the screen.
  • Others report long-term success with weaker alcohol mixes or lens wipes, but note that some older Retina models had coating issues that alcohol could worsen.
  • Several emphasize risk to oleophobic coatings (especially on phones) and say nano-texture can show permanent white smudges if cleaned incorrectly.
  • Some find the nano screen actually easier to keep “perfect” than glossy, needing only the supplied cloth; others see the extra protocol as a deal-breaker.

Nano-Texture vs Glossy/Matte: Tradeoffs

  • Strong consensus: nano-texture reduces glare dramatically, especially outdoors and in uncontrolled lighting.
  • Multiple people confirm it lowers effective contrast and “punch” compared to glossy, particularly in dark rooms and for photo/video work.
  • Some feel the article’s photos don’t fairly demonstrate contrast due to brightness mismatch and composition choices.
  • A few argue that this is functionally just “matte screens are back,” not a fundamentally new idea.

Perception, Artifacts & Eye Comfort

  • Fans describe a paper-like, low-glare look that reduces eye strain for reading and coding.
  • Critics report:
    • “Dusty”/hazy appearance and less “retina-like” sharpness, as if pixel density is lower.
    • On iPad Pro, rainbow grain or sparkle on white backgrounds; some returned devices over this.
  • Others with nano-texture MacBooks say they see no grain or rainbow at all, suggesting device- or user-sensitivity differences.

Devices, Use Cases & Availability

  • Many wish nano-texture were offered on MacBook Air and iPhone; currently it’s tied to higher-end Pro gear.
  • Designers and photographers often prefer glossy for accurate contrast and shadow detail, sometimes pairing nano laptops with dedicated glossy monitors.
  • For iPad, opinions split: handheld/touch use makes smudges more visible and texture more annoying for some; mounted or fixed-use scenarios (e.g. on a fridge) benefit greatly from glare reduction.

Technology, Marketing & Alternatives

  • One detailed post cites Apple’s patent: the surface is chemically etched (e.g., with hydrofluoric acid), not a removable coating.
  • Others note this is similar in principle to etched glass on devices like the Steam Deck; Apple’s contribution is framed more as packaging and marketing (“nano texture”) than invention of matte itself.
  • Historical context: LCDs were widely matte before consumer demand and marketing pushed glossy as default; some see nano-texture as a belated course correction.
  • Alternatives mentioned: custom matte films, anti-glare covers, DIY sunshades, and software like Vivid to boost outdoor brightness on glossy screens.

What came first: the CNAME or the A record?

DNS fragility and protocol philosophy

  • Many see this incident as another example that “it’s always DNS”: small changes expose long‑standing, obscure interoperability bugs.
  • Hyrum’s Law is cited: any observable behavior becomes relied upon, regardless of what specs say.
  • Debate around Postel’s Law:
    • Some argue “be liberal in what you accept” leads to brittle ecosystems and security issues; modern practice favors failing fast on malformed data.
    • Others think liberal acceptance is fine if paired with strong warnings and migration paths, though warnings are often ignored in practice.

RFC 1034, ambiguity, and CNAME ordering

  • Several commenters argue the RFC text clearly implies CNAMEs must appear first and that “possibly” refers only to presence, not ordering.
  • Others think the combination of examples and lack of normative keywords made it reasonable to treat ordering as non‑significant.
  • Even if “CNAMEs first” is clear, the RFC is seen as ambiguous about ordering within a CNAME chain; that’s where glibc’s assumptions broke.

Responsibility, testing, and deployment practices

  • Strong criticism that a major public resolver changed CNAME ordering without:
    • byte‑for‑byte golden tests of responses, and
    • integration tests against ubiquitous clients like glibc’s getaddrinfo.
  • Surprise that the failure was only discovered in production; some suggest Cloudflare’s test environments likely used stacks (systemd‑resolved, musl, etc.) that masked the bug.
  • Others defend cautious rollout and slow rollback as appropriate for a global service.

Impact on clients (glibc, Cisco, others)

  • glibc’s resolver assuming ordered CNAMEs is seen as a serious but long‑hidden bug.
  • Cisco switches reboot‑looping on unexpected answers is viewed as especially egregious.
  • Some note most other resolvers were tolerant, reinforcing the de facto expectation that servers preserve traditional ordering.

Standards process and de facto behavior

  • There’s support for clarifying DNS behavior via an Internet‑Draft, but some dislike Cloudflare’s pattern of “breaking behavior then writing RFCs.”
  • Others emphasize that, decades on, the real “spec” is what widely‑deployed software expects, not just old text.

Broader DNS and CNAME issues

  • Discussion widens to SERVFAIL semantics, qname minimization, and DNS’s underspecification in edge cases.
  • Multiple commenters criticize allowing CNAMEs to coexist with other record types at the same name, and recall earlier Cloudflare features that stretched or violated CNAME rules.

Apple testing new App Store design that blurs the line between ads and results

Capitalism, Leadership, and “Enshittification”

  • Many see this as the predictable endgame of capitalism: growth targets and stock-linked compensation push leadership toward dark patterns once product-driven expansion plateaus.
  • Commenters argue boards systematically select MBA/finance-style CEOs, who optimize for revenue even at UX cost.
  • Several frame this as Apple’s “Ballmer moment” or “services pivot,” with spreadsheets displacing product vision and organizational cohesion decaying.
  • Others push back: expecting Apple to “care about users” over profits was always naive; this is simply proof the incentives are working.

User Experience, Safety, and Dark Patterns

  • Blurring ad vs result is seen as inherently deceptive: it exploits the fact most users don’t carefully scan UI labels.
  • People report already seeing scammy or confusing lookalike apps (e.g., authenticator clones, fake ChatGPTs) outranking legitimate ones, undermining Apple’s safety/walled-garden claims.
  • Concern that trick installs of the “wrong app” can have serious consequences, especially for family members, elderly, or less technical users.
  • Some say they now refuse to tell relatives “just search the App Store,” and instead only share direct links.

Erosion of Apple’s Premium / Trust Position

  • A recurring theme: users pay a hardware and ecosystem premium specifically to avoid this kind of hostile design.
  • OS-level upsells (News+, Fitness+, AppleCare+, iCloud nags, F1 promotions) are cited as evidence that “freemium” patterns are creeping into a supposedly premium product.
  • A number of commenters are actively de-risking from Apple services (Nextcloud, Fastmail, FOSS, GrapheneOS) so they can switch platforms more easily.

Comparisons to Google, Amazon, Microsoft, and Android

  • Many note Apple is “just catching up” to others:
    • Google Search/Play gradually hiding ad markers.
    • Amazon search dominated by hard-to-spot “Sponsored” results.
    • Windows 11 filled with first- and third‑party promotions.
  • Counterpoint: Apple’s brand promise was not to do what everyone else does; matching the industry undermines the rationale for paying the “Apple tax.”
  • Some argue Android is at least as bad (or worse) for ads and telemetry; others highlight F-Droid/GrapheneOS as partial escape hatches.

Ad Economics, Trademarks, and Regulation

  • Several see this as part of a broader pattern where gatekeepers tax brands on their own names (search ads on trademarks, lookalike apps around official results).
  • One camp calls for banning ads on trademarked queries or forcing organic first-position for exact matches; another warns about free-speech and comparative-advertising issues, preferring stricter anti-fraud and clear labeling instead.
  • EU rules nominally require ads to be clearly recognizable; commenters say platforms now optimize up to that legal line, making labels as small and low-contrast as possible.

Changing App Ecosystem and User Behavior

  • Many say they haven’t “browsed” an app store in years; they only install apps they already know by name. Discovery now happens via friends, social feeds, or search/LLMs.
  • Some think the “golden age” of interesting one‑off $2 apps is over. App economics (no paid upgrades, platform cut, ranking algorithms) push devs toward subscriptions, IAPs, and “live service” models.
  • There’s frustration that even trivial utilities (timers, flashcards, trackers) demand aggressive weekly/monthly subscriptions, which in turn increases dependence on manipulative funnels like ad-like search placement.

Monopoly, Lock-In, and What’s Next

  • Debate over whether this is a “monopoly”: defenders say Android exists; critics point out iOS users have no alternative app distribution, unlike macOS or Android.
  • Some argue that clamping down on Apple’s 30% cut simply pushed them to extract via ads instead; others say that’s exactly why regulation should target dark patterns and ad placement rules directly.
  • A few predict that AI/agents and system-level app/package discovery may eventually bypass the visible App Store UI—making today’s enshittification both short-sighted and corrosive to long-term trust.

The microstructure of wealth transfer in prediction markets

Observed biases and wealth transfer

  • Commenters highlight the paper’s evidence of classic longshot bias: very low-probability “YES” contracts are overpriced, with realized returns far below fair odds.
  • The “optimism tax” — a persistent preference for affirmative YES bets, especially at 1–5¢ — is seen as psychologically revealing (people “buying hope”), not just financially irrational.
  • Liquidity takers systematically lose while makers earn roughly symmetric excess returns, largely by passively selling overpriced YES to optimistic bettors rather than superior forecasting.

YES/NO structure, pricing quirks, and fees

  • Several comments clarify that on Kalshi YES and NO are effectively one security shown as two order books; this enables short-selling–like behavior without traditional margin.
  • Perceived arbitrage between YES and NO prices is often too small to overcome Kalshi’s nonlinear fee structure; some dispute “fees explain everything,” but agree they matter at the 1–2¢ level.
  • Confusion about symmetric markets (e.g., two-team sports outcomes plus tie) leads to questions about why optimism toward one outcome doesn’t always map neatly into YES on that outcome.

Interest rates and time value

  • Multiple replies note that “sure-win” contracts should trade below $1 because of time value; at positive interest rates, rational actors won’t pay 100¢ for $1 resolved in months.
  • Platforms partly offset this by paying interest on collateral/open positions, which reduces but doesn’t eliminate the effect.

Efficiency vs. casino dynamics

  • Some argue that in fully efficient prediction markets, expected long-run return (pre-fees) is 100%, unlike slots; others counter that real markets are far from efficient and profits are evidence of that.
  • Finance-related markets are reported to be relatively efficient (tiny maker–taker gap), while sports, media, and world events are much more exploitative of biased flow.

Gambling, access, and regulation

  • There is tension between seeing prediction markets as valuable information aggregators vs. rebranded gambling.
  • One camp thinks restrictive financial regulation just pushes people into worse-odds gambling; others argue markets already resemble casinos too much and need tighter, gambling-style oversight.
  • Concerns are raised about aggressive social-media marketing and guerrilla “success stories” promoting platforms like Polymarket and Kalshi.

Insider trading, war bets, and corruption risks

  • A major thread worries that powerful actors (politicians, military, referees, judges) can profit from outcomes they directly control, with examples involving airstrikes, political events, and sports officiating.
  • Some see this as a national security problem and a de facto assassination/bribery market; others note that similar incentives already exist via conventional financial markets and can be policed with surveillance and enforcement.
  • Debate continues over whether such markets primarily incentivize earlier leakage of inside information (a feature) or distort real-world decisions for profit (a bug).

Alternative designs and societal uses

  • Ideas are floated for “accountability” or “bug bounty”–like markets (e.g., betting on whether a malicious code commit gets merged), but critics question who would rationally take the losing side and note perverse incentives.
  • Some suggest play-money markets can provide similar predictive value without the extreme corruption and violence incentives of large real-money stakes.

American importers and consumers bear the cost of 2025 tariffs: analysis

Who Actually Pays the Tariffs (and How They Work)

  • Broad agreement that tariffs function as a tax on imports paid to the importing country’s government, not by foreign exporters.
  • The cited study’s estimate that ~96% of the burden falls on US buyers and ~4% on foreign exporters is seen as directionally unsurprising but numerically debated.
  • Multiple comments explain tax incidence: who bears the cost depends on demand/supply elasticity and availability of substitutes; in current US–China trade, consumers are relatively inelastic, exporters have other markets, so Americans pay most.
  • Exporters are still harmed indirectly via reduced volumes and sometimes lower margins; trade volumes for some countries collapsed rather than prices falling.

Intended Goals vs. Actual Effects of Tariffs

  • Supporters frame tariffs as tools to:
    • Encourage reshoring and domestic manufacturing.
    • Reduce strategic dependence on China and other rivals.
    • Correct “global imbalances” and persistent US trade deficits.
  • Skeptics counter that:
    • Tariffs raise consumer prices (often with full pass-through, plus “me-too” price hikes by non‑tariffed competitors).
    • They rarely spark large-scale US investment when policy is erratic and politically driven.
    • Past cases (e.g., washing machines) show high consumer cost per job created and higher prices for related goods.

Politics, Messaging, and Misinformation

  • Many comments focus on how tariffs were sold politically as “other countries paying,” despite basic economics implying otherwise.
  • This is tied to a broader “post-truth” and anti‑intellectual dynamic: distrust of experts, partisan media ecosystems, and voters prioritizing tribal identity over factual accuracy.
  • Some see tariffs as a hidden regressive tax on poorer Americans, rebranded to bypass anti-tax rhetoric.

Institutional and Legal Concerns

  • Strong worry about tariffs imposed unilaterally via executive authority (IEEPA, delegation questions), with Congress sidelined.
  • Discussion of the nondelegation doctrine and whether the Supreme Court will curb presidential tariff powers; concern that courts have already normalized past actions by not intervening.

International and Long‑Run Consequences

  • Non‑US commenters note that other regions (EU, Canada, Mercosur, China) are deepening trade ties while the US makes itself a less reliable partner.
  • Some argue others benefit from cheaper Chinese exports redirected away from the US; others emphasize long-run global reconfiguration that could permanently erode US influence and export markets.

Reception of the Study Itself

  • Some trust the German institute as a serious research body; others question bias, data coverage (e.g., missing EU/UK/Canada detail), static modeling, and ignoring exchange-rate and VAT dynamics.
  • Even critics of the methodology generally accept the core qualitative point: American importers and consumers shoulder most of the immediate tariff cost.

"Anyone else out there vibe circuit-building?"

Vibe Circuit-Building vs. Traditional Hardware Design

  • Thread starts from a joking image of a “vibe-built” circuit literally on fire, used to highlight the difference between software failure (crash) and hardware failure (smoke, cost, safety).
  • Several people note that “letting the magic smoke out” has always been part of hobby electronics, not unique to LLM-assisted design.
  • Concern is higher for hardware because parts cost money, turnaround is slow, and errors can be dangerous.

Using LLMs as Learning and Ideation Tools

  • Multiple hobbyists report LLMs (ChatGPT, Gemini, Claude) helped them:
    • Learn analog concepts (op-amps, ADCs, protection circuits).
    • Discover better parts than default dev-board components.
    • Navigate datasheets and EE Stack Exchange more effectively.
    • Design small products (stove monitors, bathroom controllers, sheet-metal brackets, audio preamps).
  • LLMs are often described as “idea boards” or “search on steroids,” good at suggesting directions but requiring human verification.

Limitations and Risks of LLM Circuit Design

  • Critiques include:
    • Recommending obsolete or inappropriate parts (especially op-amps).
    • Confusion about circuit topologies and protection strategies.
    • Poor adherence to constraints and safety, especially for high-voltage or production designs.
  • One commenter rates LLM capabilities: good at reading datasheets; mediocre at error-checking schematics; poor at designing circuits from scratch.
  • Breadboards are flagged as especially problematic for analog/ADC performance due to parasitics.

Block-Based / Constraint-Driven Approaches

  • A major subthread discusses using LLMs not for novel circuit synthesis but for selecting and arranging pre-validated blocks on a fixed grid.
  • This is compared to software dependencies: reuse of known-good modules instead of reinventing them.
  • Others push back, noting this is partly an admission that LLMs are bad at low-level design; still, many agree it’s practical for prototypes and non-experts.

Simulation, Tooling, and Future Direction

  • Several people suggest integrating SPICE/LTspice or PCB tools as feedback loops, so the model can iterate until simulations pass.
  • There is ongoing work on auto-placement/routing and tying LLMs to distributor APIs for smarter part selection.
  • Consensus: with strong domain knowledge or strong tooling/feedback, LLMs are powerful accelerators; without it, they’re risky and must not replace expert review.

GLM-4.7-Flash

Hosting & Availability

  • Initially only a few cloud options: z.ai directly, Novita via OpenRouter, HuggingFace Inference, Cerebras, DeepInfra; more expected to follow.
  • One provider (Novita) is criticized for serving undisclosed quantized variants that noticeably degrade quality; concern that OpenRouter’s “cheapest by default” UX misleads new users.
  • Cerebras’ GLM-4.7 endpoint is praised for raw speed but panned for per‑minute rate limits and counting cached tokens fully for both rate and billing, making it effectively slow and expensive.

Model Size, Architecture & Use Cases

  • Flash is a MoE model ~30–32B total parameters with ~3–4B active per token (A3B/A3.9B), positioned as a “free-tier” / Haiku‑equivalent version of GLM‑4.7.
  • Seen as attractive for home or small‑server setups and fine‑tuning experiments, though still larger than typical “tiny” local models.

Performance & Comparisons

  • Benchmarks: SWE‑Bench Verified score ~59 is viewed as strong for this size, but some point out Devstral 2 Small (24B dense) scores higher.
  • Several users say GLM‑4.7 (full) is roughly Sonnet‑3.5‑level for code, clearly behind Sonnet 4.x and Opus, despite competitive benchmark numbers.
  • Some find GLM models better than Qwen and acceptable replacements for mid‑tier Claude levels; others report poor general knowledge, invalid code, and looping behavior in early tests, especially with quantized variants.
  • Comparisons to GPT‑OSS‑20B/120B are mixed: on paper Flash looks good, but some users find GPT‑OSS‑20B more reliable in practice.

Benchmarks & Evaluation Skepticism

  • SWE‑Bench Verified is criticized for limited repos/languages and suspected memorization; alternatives like SWE‑REBench and Terminal Bench 2.0 are preferred.
  • Multiple comments emphasize that public benchmarks often fail to predict real‑world coding‑agent performance.

Local Inference, Tooling & Quantization

  • Users report running Flash via vLLM (including ROCm/MI300x), llama.cpp (GGUF), Ollama, LM Studio, and LM Studio/MLX on Apple silicon.
  • Architecture is similar to DeepSeek V3; llama.cpp support landed quickly after a PR.
  • 4‑bit and 8‑bit GGUF quants (Unsloth, ngxson, byteshape, etc.) are popular; 30B Flash fits in ~20–22GB VRAM at Q4_K_M with large contexts, vs ~60GB for BF16.
  • Some experience severe repetition, spelling errors, and broken tool calling with certain quants/frontends; others report it working “fine” in tools like OpenCode and Ollama once templates and versions are updated.

Pricing & Plans

  • z.ai’s coding subscription is repeatedly praised as extremely cheap with high limits, using Flash as a default mid‑tier coding model.
  • Users note GLM‑4.7 models can feel slow due to more internal “thinking,” but reliability is generally considered good for the price.

West Midlands police chief quits over AI hallucination

Accountability and Precedent

  • Many see the resignation as a welcome precedent: senior officials taking responsibility for bad decisions, even when subordinates or tools (AI) were directly at fault.
  • Others argue the precedent is backwards: the “worker bee” or AI provider faces no visible consequences, while the chief becomes an “accountability sink.”
  • Some would have preferred disciplining the officer who used the AI output and keeping the chief, fearing his replacement could be worse.

AI’s Role vs. Misconduct/Incompetence

  • Several commenters stress that the core issue was not the hallucination itself, but the intent and use of the document: banning away fans and then misleading MPs about how the evidence was obtained.
  • Debate centers on whether the chief “lied” about AI use or was merely misinformed and incompetent. Some insist intent to deceive is clear; others say the evidence of deliberate lying is unclear.

AI Slop and Information Contamination

  • Discussion notes that AI-generated content can surface via Google searches without users realizing its origin, making “we didn’t use AI” a weak defense if sources are AI-written.
  • Concern that AI summaries and Copilot-style tools blend seamlessly with normal search results, undermining trust and demanding stricter verification.

Police Use of Open-Web Intelligence

  • Many criticize relying on Google/Copilot rather than official reports or inter-police contacts for high-stakes decisions.
  • Some argue police (and judiciary) should be banned from using AI or at least from unverified web material; others say this is impractical but agree robust validation is essential.

Football Hooliganism and Fan Ban Justification

  • Long, heated debate over whether banning Maccabi Tel Aviv fans was a reasonable safety measure or discriminatory.
  • One side emphasizes racist chants and violence by Maccabi ultras in Amsterdam and elsewhere, seeing the risk assessment as justified.
  • Others highlight that away-fan bans are relatively rare, that UEFA didn’t impose equivalent sanctions at that stage, and that Dutch police disputed parts of West Midlands’ account.

Politics, Sectarian Tensions, and Antisemitism

  • Several commenters argue the AI error was a thin pretext for a politically driven ouster tied to UK debates over Israel–Palestine, local Muslim-majority areas, and antisemitic/anti-Israel tensions.
  • Others stress rising antisemitic attacks in the UK and criticize “two-tier policing” that allegedly appeases local groups threatening unrest instead of enforcing the law evenly.
  • There is mutual condemnation (from some) of both racist Maccabi hooliganism and violent “Jew hunts” by pro-Palestinian rioters; others are more sympathetic to retaliatory violence, leading to sharp disagreement.

Media Framing and Language

  • Several find the Reg headline misleading and note that mainstream reporting often fixated on the AI hallucination while underplaying the deeper political and procedural issues.
  • Brief side discussion explains the British punning in the headline (“cop cops it… copilot cops out”) as confusing but idiomatic.

Ask HN: COBOL devs, how are AI coding affecting your work?

Direct COBOL + AI Experiences

  • Some banking/mainframe environments report success with fine‑tuned models on their own COBOL codebases, citing COBOL’s verbosity and English‑like syntax as a good fit for LLMs, but without much concrete detail on workflows.
  • Others find generic LLMs notably worse at COBOL than at mainstream languages: useful for tedious tasks (file layouts, boilerplate, test data) and for “chatting with manuals” or PDFs, but limited by system‑specific context and huge legacy codebases.
  • In COBOL‑to‑Java migration projects, models can occasionally help debug small issues or summarize business rules, but are frequently confidently wrong; without RAG/finetuning, the impact is “just OK.”
  • Compliance and security constraints (no code leaving the bank, locked‑down VDIs) block use of cloud models in many financial shops; local models are too heavy. Strict COBOL formatting (columns, periods) also trips models and adds linting overhead.

COBOL Ecosystem, Legacy, and Workforce

  • Multiple comments emphasize COBOL’s persistence in banking and large institutions, often running decades‑old critical code, sometimes on emulated mainframes. Java or other systems often generate COBOL, which then runs on emulators.
  • COBOL’s tight coupling of logic and data structures is seen as a reason for its stickiness.
  • At the same time, some European banks are running multi‑year programs to replace COBOL with cloud‑based Java/Spring because COBOL developers are aging out and not being replaced.

Model Training, Dialects, and Potential

  • Much COBOL is proprietary and never public, and there are many dialects, so generic LLMs likely lack training on the exact variants used in big financial systems.
  • This fragmentation limits transferability: a model fine‑tuned on one institution’s dialect may not generalize well.
  • Several commenters think it’s only a matter of time before large banks/airlines fund serious COBOL‑focused models plus tooling; they see this as an augmentation, not a threat, with domain experts remaining essential for review and interpretation.

Broader AI Coding Debate

  • Strong disagreement on how “good” AI coding is overall: some report substantial productivity gains (especially with Go, TypeScript, SQL, Python, C), others are repeatedly burned by hallucinations, subtle bugs, and security oversights.
  • Common ground: AI is best for scaffolding, boilerplate, configs, and documentation lookup; poor at complex refactors, nontrivial type systems, or deep architecture without extensive prompting and human review.
  • Many stress the danger of “vibe coding” in critical systems: AI can accelerate both good practice and sloppy, barely‑understood code, making rigorous review and clear responsibility even more important.

Article by article, how Big Tech shaped the EU's roll-back of digital rights

EU governance, democracy, and corruption

  • Several comments frame the Commission as “pro-corporate, anti-citizen” and too aligned with US interests, with particular criticism of its leadership.
  • Others push back, noting that the Council (elected national governments) and Parliament must approve laws, and that the Commission president is indirectly but still democratically chosen.
  • There’s frustration that the Commission can keep re‑proposing controversial measures (e.g. “chat control”) and a sense that layers of indirection dilute democratic accountability.
  • Some call for formal investigation of the Commission for corruption, pointing to existing EU prosecutorial mechanisms but no clear outcomes.

Dependence on US tech, clouds, and consumer boycotts

  • Strong sentiment that EU leaders overestimate the indispensability of US cloud and platform services, effectively allowing themselves to be blackmailed.
  • Proposals range from ditching anti‑circumvention laws and boycotting US products to building EU alternatives and favoring local services.
  • Others argue boycotts are hard to sustain and often hurt local franchisees more than US HQs; people tend to revert to dominant brands (e.g. Coke, iPhone).
  • There’s a detailed sub‑thread on how hard large‑scale cloud migrations really are: some claim “portable code” plus open source makes it feasible; others with migration experience say complexity, regressions, and business risk make “cloud agnosticism” mostly theoretical at scale.

Strategic dependence and geopolitics

  • Several comments zoom out: EU is said to have outsourced energy (Russia), manufacturing (China), and defense/tech (US), making it vulnerable to all three.
  • One side argues these policies made sense for “peace and prosperity”; another claims military and industrial weakness inevitably invites bullying and war.
  • Trump’s Greenland moves are seen by some Europeans as a rude awakening that the US is no longer a trustworthy partner and as a potential trigger for EU disentanglement from US tech and security dependence; others think it’s mostly a media‑baiting distraction but still forces de‑risking.

Do Europeans care about digital rights?

  • One view: almost nobody in Europe cares enough to protest digital rights rollbacks; if they did, the EU would already have “firewalled” itself from Big Tech.
  • Others dispute this, citing coverage in mainstream European media and longstanding sensitivities around surveillance (especially in Germany).
  • There’s pushback against “people don’t care, so why talk about it?” with the argument that awareness is low and such articles help build concern.

Regulation, competitiveness, and GDPR/AI Act

  • Multiple founders and practitioners describe EU tech regulation (GDPR, AI Act, etc.) as an “alphabet soup” that disproportionately harms startups, especially in health and AI, and scares away frontier‑scale investment.
  • They highlight huge compliance workloads (DPIAs, DPAs, access controls, documentation) for rights that only a tiny fraction of users exercise, arguing the gap between intention and practical impact is vast.
  • Critics of GDPR call out loopholes like “legitimate interest” and suggest the regime both fails to stop abuse and burdens smaller firms.
  • Defenders respond that most of the described practices are necessary for responsible handling of sensitive data anyway, GDPR levels the playing field by forcing competitors to do the same, and manual handling of rare user rights is acceptable.
  • There’s a broader worry that overregulation means “nothing remains to regulate because every company has moved somewhere else,” with reference to internal EU critiques like the Draghi competitiveness report.

Big Tech, political alignment, and left–right framing

  • The article’s mention of Meta’s meetings with far‑right MEPs sparks debate: some see it as evidence of Big Tech aligning with specific parties; others argue these companies will work with whoever has power and “speak only USD.”
  • A side discussion notes that both left and right governments try to pressure platforms to control narratives, with references to US cases where administrations pushed for content moderation changes.
  • Several commenters argue that focusing on “far right vs far left” misses the core issue: transnational platforms as instruments of state power and as lobbyists against consumer digital rights.

Proposals for EU tech sovereignty

  • One cluster wants fewer constraints on domestic firms and more targeted discrimination against US Big Tech: e.g. exclusive EU data storage, encryption keys in EU, banning AWS/Azure/GCP and Windows/Office from government procurement, mandating Linux, forcing joint ventures.
  • Others suggest the “China playbook”: first deregulate to grow a native ecosystem, then regulate later once it is strong, rather than pre‑loading strict rules that only incumbents can afford.
  • A more moderate position argues that rolling back or tweaking some digital rules to enable scaling and investment isn’t inherently “evil” but a pragmatic response to global competition—though critics fear this becomes a pretext for watering down rights.

Corporate power, NGOs, and lobbying

  • Several comments point to billionaire wealth growth and AI‑driven gains as evidence that current policy is structurally pro‑billionaire, with digital regulation rollbacks framed as part of that trend.
  • There’s deep skepticism about NGOs and advocacy groups: some see them as critical watchdogs; others label parts of the NGO ecosystem and the “legal‑industrial complex” as self‑interested actors that entrench complexity and help Big Tech monopolize.
  • A broader question is raised: if governments are heavily influenced by corporate lobbying, what counter‑vailing function do they still serve? One reply stresses that regulating lobbying itself is a political responsibility, not something that will change by blaming lobbyists alone.

Digital vs physical rights

  • One comment questions the focus on digital rights rollbacks while physical rights (e.g. protest, bodily security) are eroding, implying that without strong physical rights, digital protections may be moot.
  • Others implicitly connect these spheres, arguing that imperialism abroad, platform capture, and erosion of rights at home are tightly linked dynamics rather than separate issues.

Amazon is ending all inventory commingling as of March 31, 2026

Nature of commingling & why it was harmful

  • Amazon treated all inventory for a given SKU/ASIN as interchangeable, regardless of which seller supplied it.
  • This enabled:
    • Counterfeiters to inject fake goods that would be shipped under the “good” seller’s name.
    • Return fraud (customers swapping items, Amazon restocking them) to poison the shared pool.
    • Sellers to dump refurbished/used goods as “new,” externalizing bad reviews and returns onto others.
  • Result: product reviews and seller ratings became largely disconnected from what any particular seller actually shipped.

Why Amazon might be changing (speculation)

  • Many see it as a response to mounting legal, regulatory, warranty, and trademark liability as Amazon’s physical presence expands.
  • Others suspect pressure from major brands or large buyers burned by fakes (e.g., electronics, PPE, SD cards).
  • Another thread: logistics have matured (regionalized warehouses, relaxed “2‑day” expectations), so commingling’s speed benefit no longer outweighs reputational and operational costs.

Customer experiences & trust erosion

  • Numerous anecdotes of obvious counterfeits: books, monitors, HDMI adapters, flash cards, batteries, water filters, cosmetics, clothing, respirators, dental products, pet meds, bike tires, etc.
  • Several people stopped buying high-value or ingestible items from Amazon entirely, preferring direct-from-brand, local stores, or competitors (Walmart, Costco, B&H).
  • Some long‑time customers canceled Amazon altogether; many say this change is “years too late” to win them back.

Scope, timing, and implementation doubts

  • Policy applies to inventory shipped to Amazon by sellers after March 31, 2026; existing commingled stock will mostly just sell through.
  • Questions remain about:
    • How they’ll handle current mixed inventory and date-sensitive products.
    • International sites (e.g., EU/UK) and whether the policy is global.
    • Preventing resellers from posing as “brands” to bypass extra barcoding.

Logistics, costs, and marketplace effects

  • Ending commingling likely increases warehouse complexity, inventory duplication, and shipping variability, and may raise prices.
  • Some expect more visible differences in delivery time per seller.
  • Others view this as Amazon shifting from a “distributed liquidity pool” optimization to stricter per-seller tracking as it leans on its dominant position.

Problems this doesn’t fix

  • Fake or incentivized reviews; product listings being repurposed or swapped to lower-quality items while keeping old ratings.
  • Misleading “replacement for OEM X” parts and grey/parallel imports.
  • Safety/regulation issues (e.g., uncertified electrical products) and opaque provenance.
  • Overall sense that Amazon’s marketplace still resembles a higher-priced, faster AliExpress unless these adjacent issues are addressed.

Nvidia contacted Anna's Archive to access books

Legal status of training on copyrighted books

  • Several comments debate whether using pirated books for AI training can be defended as “fair use” when the model only keeps “statistical correlations.”
  • Some argue this fits existing precedents (e.g., book scanning and search), since the models aren’t meant to redistribute the original texts, only extract patterns.
  • Others counter that even scanning/downloading is already reproduction, and obtaining works from pirate libraries is illegal regardless of what you do afterward.
  • There’s disagreement over whether the legal problem lies at the input stage (copying works) or the output stage (reproducing copyrighted text).

Human reading vs machine training

  • A recurring analogy compares AI training to a person reading and remembering books.
  • One side says calling training illegal is like criminalizing human memory, and law doesn’t distinguish by scale (one book vs millions).
  • Critics reply that law often does treat scale as a proxy for intent (e.g., drugs), and slurping “every single piece of produced content” is categorically different.
  • Many note a key distinction: humans can’t reliably reproduce long works verbatim, whereas models can be induced to regurgitate large copyrighted passages, as shown in cited research.

Scale, intent, and ambiguity of copyright

  • Commenters note copyright law is underspecified for LLMs; outcomes are “unclear” and highly dependent on future cases.
  • Some argue models were “intended” to produce legal, transformative output and that infringing outputs are side effects; others say corporations routinely accept legal risk for profit.

Source of data: piracy vs legal channels

  • Strong criticism centers on a trillion‑dollar company using pirate libraries instead of paying publishers or authors.
  • Others stress practical incentives: there is no ready-made, licensed corpus product; negotiating with every publisher is complex and costly, while Anna’s Archive offers a single 500 TB firehose.
  • Some point to alternative legal paths (buying and scanning physical books, then destroying them), but acknowledge this is expensive and politically fraught.

Power imbalance and broader implications

  • Multiple comments highlight that “laws are for the poor”: individuals are punished for piracy while large firms do mass infringement with minimal consequences.
  • There’s resentment that AI systems trained on these books now automate or devalue the work of the very authors whose texts were copied.
  • The episode is seen as evidence of how desperate AI companies are for high‑quality data, contradicting narratives that synthetic data will soon suffice.

I was a top 0.01% Cursor user, then switched to Claude Code 2.0

Code review vs. “behavior-only” development

  • A central claim (“you no longer need to review the code, just test behaviors”) triggers strong pushback.
  • Many argue this is untenable for multi-dev, customer-facing systems, especially with SOC 2, SLAs, and security concerns; code review is seen as core to reliability and safety.
  • Supporters counter that high-velocity teams already lean on telemetry, error budgets, feature flags, and rollbacks; they expect code review to become largely performative as AI improves.
  • Critics respond that tests can’t cover all behavior, subtle vulnerabilities can slip through, and someone must still be accountable when production fails.

Where AI coding works today (and where it doesn’t)

  • Consensus: agentic coding is powerful for solo devs, side projects, prototypes, and new “AI-ready” repos (good docs, tests, observability).
  • Established, complex codebases with deep domain rules are seen as much harder: long feedback cycles, higher risk of regressions, and difficult context provision.
  • Some foresee new AI-native systems eventually replacing legacy code; others think that’s far off or impractical.

Genetic algorithms / random code fantasy

  • One subthread explores generating random binary or program text and selecting purely on observed behavior, likening it to evolution.
  • Multiple commenters note this is essentially genetic algorithms and argue it’s wildly inefficient given the astronomical search space, discrete program state, and incomplete specs.
  • Debate extends into analogies with evolution, airplane design, and agriculture; critics stress that engineering is intentional, not unconstrained random search.

Tool comparisons and workflows

  • People compare Claude Code with Cursor, Windsurf, Copilot, and GLM-based services: mixed views, but Claude Code is often praised for agentic workflows.
  • Others prefer staying in their existing IDE (Goland, Emacs via ACP, etc.) and using AI as a helper, not a driver.
  • Token cost and consumption are recurring concerns; aggressive agentic setups can rapidly exhaust quotas.

Hype, skills, and the craft of programming

  • Several see using these tools effectively as a new, hard skill: prompting, debugging, refactoring, and maintaining a mental map of fast-changing code.
  • Many criticize overconfident solo-dev narratives (“no review,” “5 years of AI coding,” percentile bragging) as buzzword-heavy and unproven on real, large systems.
  • Concerns include loss of the “art” of programming, homogenized LLM writing style, difficult-to-review AI code, and open source inundated with low-quality, AI-generated PRs.
  • Others report real productivity gains (e.g., weekend PoCs, RAG pipelines) and argue skeptics are under-updating on how far tools have come.

Radboud University selects Fairphone as standard smartphone for employees

University choice & IT/MDM considerations

  • Commenters see standardizing on Fairphone as making in‑house repair practical: IT can stock parts, swap modules like batteries, screens, charging ports, and treat phones like laptops.
  • Alternatives (sending to manufacturer, using local shops, or reimbursing staff) are viewed as costly and bureaucratic at scale.
  • Some think the phones are only for staff who formally “require” a device, not every employee.
  • There’s speculation this ties into broader moves to Microsoft 365/Teams and/or mobile-based MFA and MDM, where institutions must provide managed devices rather than require use of personal phones.
  • Others link it to Dutch academia’s push for “digital sovereignty” and reducing dependence on US tech vendors.

Repairability, parts, and real-world experience

  • Many praise Fairphone’s modular design: easy battery and screen swaps, long-term spare-part sales (noted even for Fairphone 2 and 3), and quick self-service repairs.
  • Positive anecdotes: simple USB‑C port, screen, and earpiece replacements; buying Fairphones second‑hand and keeping them running.
  • Negative anecdotes:
    • A model discontinued after ~4 years with key parts no longer available.
    • Months-long unavailability of a charging-port module, leaving an unusable device.
    • No replacement module for a scratched fingerprint/power button; requirement to send the phone to Fairphone’s own center, wiping the device.
    • Local repair shops sometimes refuse Fairphones or consider the company hard to work with.
  • Some conclude availability of parts and repair infrastructure matters more than theoretical ease of repair.

Sustainability vs second-hand and cheap phones

  • Strong view that reusing existing hardware (second-hand or refurbished mainstream phones) is usually more environmentally friendly than buying new “ethical” devices.
  • Others argue Fairphone shines when you’re accident-prone: repeated screen/port/battery fixes instead of multiple full replacements.
  • Debate over whether modular phones can compete with very cheap Android devices, where replacing the entire phone can cost little more than a battery swap.

Software support & security

  • Concerns that Fairphone devices lag on firmware/driver/security practices (e.g., bootloader/AVB key issues), making them unsuitable for hardening projects like GrapheneOS.
  • Limited major Android version upgrades mean some critical apps (especially banking) drop support even while security patches continue.
  • Counterpoint: for typical university staff not targeted by high-end attackers, these risks may be acceptable compared to the ethical and sustainability benefits.

Alternatives, OSes & regulation

  • Discussion of /e/OS, GrapheneOS, Sailfish/Jolla, and Linux-based devices as ways to escape Apple/Google ecosystems, with disagreement over how “de-Googled” Android can ever be.
  • Calls for regulation mandating easily replaceable batteries/screens, unlockable bootloaders, and minimum support lifetimes; EU battery rules are cited, with worries about “waterproofing” loopholes.

Form factor & feature complaints

  • Multiple commenters want a smaller “Fairphone mini” with a headphone jack; current models are considered too large.
  • Others lament missing features like optical zoom and USB 3 + DisplayPort, especially given the SoC technically supports them.

MTOTP: Wouldn't it be nice if you were the 2FA device?

Nature and Goals of mTOTP

  • Presented as an early, experimental “human-computable TOTP” under strict mental constraints, not production crypto.
  • Goal: avoid ever revealing the underlying secret to a device while also not relying on any electronic token that can be compromised.
  • Some find the idea intellectually neat and worth exploring; others see it more as a fun puzzle than a practical security tool.

Is It Actually 2FA?

  • Many argue this is not a second factor: it reduces entirely to “something you know” plus mental computation, i.e., a password variant.
  • Counter‑view: “factor” is about what you must have/know at login time; a brain-stored secret that never leaves your head can still serve as a second factor alongside, say, a password manager or SSH key.
  • Ongoing disagreement over whether clonability (you can tell someone the secret) disqualifies it as “something you have.”

Security Properties and Weaknesses

  • Keyspace is small (~10 billion); commenters note that 2–3 observed codes with timestamps plus brute force can recover the secret.
  • Human computation can’t use high-cost key derivation; compensating with longer, random secrets quickly becomes impractical to memorize.
  • Suggestions include longer passphrases, larger wordlists, or multiple rotating keys, but rotation introduces sync and complexity issues.
  • Some see value mainly against phishing / replay (no static secret entered), others say the reduced search space and server-side secret storage undercut that.

Human Constraints and Usability

  • Mental math each login is seen as too demanding for most users; many would likely offload it to an app, defeating the concept and leaking the secret.
  • Time-based nature assumes users roughly plan login time; several doubt this is realistic behavior.
  • The 6th digit is identified as a checksum / self-check, not real extra security.

Comparison to Existing 2FA Methods

  • TOTP itself is “password + time-based computation,” but with a separate device and short-lived output that mitigates some attacks (password reuse, replay).
  • Debate over storing TOTP seeds in password managers: convenient but collapses factors if that device is compromised.
  • Hardware tokens / secure enclaves are regarded as stronger for “something you have,” but less flexible and harder to back up.
  • Biometrics are criticized as non-revocable, privacy-sensitive, and often effectively tied to a device anyway.

Threat Models and Philosophy

  • Several argue that what’s “correct” depends on actual attack vectors: remote password stuffing vs device compromise vs coercion (“rubber-hose”).
  • Some see mTOTP as offering marginal practical security; others value it as a thought experiment probing the limits of human-only authentication.