Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 209 of 527

China is run by engineers. America is run by lawyers

Age, Cognitive Decline, and “Gerontocracy”

  • Large subthread argues America’s problem is age more than lawyers: proposals for hard age caps (often 60–75) for Congress, executive offices, and Supreme Court.
  • Supporters say very old politicians lack “skin in the game,” won’t live to see long‑term consequences, and are often out of touch with modern life and tech.
  • Opponents call absolute statements like “anyone above 75 isn’t all there” ageist, stressing wide individual variation and pointing out many unfit young people.
  • Structural factors raised: incumbency advantage, party machines (especially Democrats), corporate money, aging electorate, and party‑over‑person voting keep very old leaders in office.
  • Some see symmetric age discrimination (too young / too old) as pragmatically accepted in law; others draw analogies to racism to argue it’s morally suspect.

Old Institutions and Constitutional “Age”

  • Some commenters argue the deeper U.S. problem is an aging constitutional framework with entrenched features (e.g., Electoral College, 2nd Amendment) that are hard to reform.
  • Others counter that very old legal systems (e.g., UK tradition) show age alone isn’t the issue; rather, U.S. constitutional change is unusually difficult, producing stagnation.

Is China Actually Run by Engineers?

  • Multiple comments dispute the premise: China is described as run by the Communist Party and ultimately by Xi, not by engineers as a professional class.
  • Others note many senior CCP officials have engineering or technical degrees and operate an engineering‑style feedback loop: central targets, local experimentation, promotion by measured performance.
  • Chinese commenters emphasize that historically the country is run by officials/bureaucrats, not craftsmen/engineers, and warn HN readers romanticize authoritarian “competence.”
  • Discussion of perverse incentives: GDP and other metrics as targets produced overbuilding, waste, “ghost towns,” and selective anti‑corruption used as a political weapon.
  • Comparison to Soviet engineer‑heavy leadership is raised; technocracy alone does not prevent dysfunction or repression.

Building Capacity: China vs. U.S.

  • Many see China’s speed in infrastructure, EVs, solar, and robotics as linked to technocratic industrial policy: heavy subsidies, protected domestic markets, then brutal consolidation.
  • U.S. is portrayed as legally and politically gridlocked: NIMBYism, environmental review, and litigation make it hard to build transit and housing, though critics say “America builds plenty” outside those areas.
  • Some argue China’s speed relies on authoritarian powers (forced relocations, weaker labor and environmental protections); others stress China still faces local resistance and legal constraints, just fewer veto points.

Lawyers, Engineers, and Who Really Runs Things

  • Several threads argue the U.S. is effectively run by corporate lawyers, MBAs, and finance, not elected officials per se; legal departments shape corporate (and thus political) decisions.
  • Others defend lawyer‑politicians as natural in a system whose core product is law, warning that swapping in engineers wouldn’t fix capture, corruption, or polarization.
  • Materialist takes: China as manufacturing‑oriented yields engineer‑heavy elites; U.S. as rent‑seeking and financialized yields lawyer‑ and finance‑dominated elites.

Meta: Freakonomics, Ideology, and Blame

  • Freakonomics is criticized as smuggling conservative / Chicago‑school frames to liberal audiences; others see it as broadly centrist and data‑driven.
  • Debate over whether “progressives” caused U.S. anti‑building regulations; several insist the true culprits are cross‑partisan NIMBYism and long‑running neoliberal policy, not a powerful left that barely exists in U.S. governance.

People got together to stop a school shooting before it happened

Bullying vs other causes

  • Many see chronic bullying and social ostracism as core drivers of school violence and other harms (self‑harm, suicide, academic failure).
  • Others argue that even if bullying vanished, the combination of mental illness and gun access would still produce shootings; bullying is one factor among many, not a sufficient explanation.
  • Some push back on treating bullying as “biologically inevitable,” noting society has successfully suppressed other “natural” behaviors (rape, infanticide) and that fatalism blocks progress.

Guns, mental health, and policy ideas

  • Several comments contrast the U.S. with countries that have fewer shootings and stronger gun control and mental health care, arguing that’s more tractable than “ending bullying.”
  • Proposed policies include: revoking gun rights after any mental‑health or violence issue; mandatory mental‑health evaluations before and during gun ownership; strict liability (e.g., manslaughter) if a child accesses a parent’s gun.
  • Others warn such rules could deter people from seeking treatment, and note that “mental illness” does not imply violence.

School environment, age, and discipline

  • Repeated theme: schools tolerate or structurally enable bullying. Victims are often the only ones punished, especially under “zero‑tolerance” policies that treat being attacked as “fighting.”
  • Administrators are portrayed as politically constrained and conflict‑averse, often siding with influential parents. Teachers may care but lack power.
  • Some advocate aggressive suspensions/expulsions and even police involvement; others suggest expelling “problem kids,” which is criticized as unrealistic or dangerous given unregulated homeschooling.
  • Debate over age segregation: some think mixed ages and older students can moderate behavior; others fear older, stronger teens would worsen abuse.

Justice, surveillance, and reporting

  • One camp sees more supervision/monitoring (including AI‑based social analysis) as inevitable and useful; another warns that constant surveillance could itself be traumatizing.
  • A recurring point: the bus had cameras and “hours of video,” but nobody acted until a threat appeared—evidence that the problem is not lack of data but lack of will.
  • Suggested fix: make reporting safe and effective. Protect victims, then use targeted observation to confirm and impose real consequences, rather than blanket surveillance.

Victim vs system framing of the article

  • Many readers say the article feels like self‑congratulation by authorities who pathologized the bullied student while barely punishing aggressors.
  • Suspension for a hand‑gesture “threat” is seen as wildly disproportionate compared to the sustained abuse shown on video.
  • Some note positives: bullies eventually apologized; the student felt genuinely cared for; his outcomes improved. Others say that if this is a “success story,” it implies countless unseen failures.

Lived experiences and long‑term impact

  • Multiple commenters share stories of severe school bullying, inaction or complicity by adults, and only violence or police involvement finally stopping it.
  • A pattern is described where kids quickly learn that reporting bullying backfires, while administrators mainly punish whoever “creates work” for them.
  • One extended comment frames sustained bullying as a form of psychological torture: with enough isolation, loss of agency, and inconsistent treatment, “everyone breaks” in some way.

Is “bullied kid strikes back” even accurate?

  • Some question the popular narrative that shooters are primarily victims seeking revenge, claiming many known shooters were themselves escalating aggressors who later cast themselves as victims.
  • Others cite research suggesting a substantial fraction report being bullied, but note that many also posted threats and glorified guns, blurring lines between victim and perpetrator.
  • Consensus in the thread: bullying is clearly harmful and morally wrong, but its exact causal role in school shootings remains unclear.

Scale and models of intervention

  • Commenters are struck that stopping bullying around one student required “106 people from 59 organizations,” raising questions about cost, scalability, and why routine school staff didn’t intervene earlier.
  • Some argue society has broadly lost the capacity and social norms to “correct” youth behavior informally; everything either gets ignored or escalated to formal systems.
  • One alternative model praised is Sudbury‑style schools, where a joint student‑staff judicial committee hears complaints (including against staff) and imposes consequences, providing a democratic, rule‑of‑law‑like approach to bullying.

UK Petition: Do not introduce Digital ID cards

What’s being proposed and why it’s contested

  • Many argue “digital ID” is conflated concepts:
    1. e‑government logins, 2) digital ID cards/wallets, 3) government SSO for private services.
  • Thread consensus: the UK plan looks like (2), effectively mandatory for employment, while some fear scope creep toward (3).
  • Official rationale (curb illegal working) is widely doubted. Employers already must do right‑to‑work checks; non‑compliant employers and cash‑in‑hand work would likely persist.

Trust, speech, and policing concerns

  • Strong mistrust in the UK state: citing online speech arrests, protest policing, and proscription of activist groups.
  • Dispute over facts: some arrests involve incitement/harassment; others cite “milquetoast” cases and chilling effects. Statistics referenced are contested; examples cut both ways.
  • View A: central IDs make targeted repression and data‑joining easier (turnkey totalitarianism).
  • View B: governments can already track people; lack of a single ID mostly adds inefficiency, not real protection.

Comparisons and culture

  • Estonia/Scandinavia praised for convenience and breadth of services; critics note past vulnerabilities, data leaks, and different institutional safeguards and trust cultures.
  • UK lacks constitutional constraints; concern that a powerful central ID is riskier in a low‑trust, highly polarized system.
  • Smartphone/platform dependence (Apple/Google) and anti‑rooting/attestation worries are common.

Benefits cited

  • Simplifies KYC and fraud reduction; reduces repeated paper checks, supports digital signatures, and helps those without passports/driver’s licenses.
  • Could replace today’s fragmented, leaky private ID checks with fewer, better‑controlled disclosures (e.g., selective disclosure/zero‑knowledge designs).

Risks and implementation pitfalls

  • Centralization/SPOF and mass‑breach risk; insider abuse.
  • Likely cost overruns, vendor capture, and “checkbox security” that locks out non‑mainstream devices.
  • Mission creep: from work eligibility to broader service access, banking/credit linkage, and private‑site login.
  • Age‑verification experience and prior legislation fuel doubts about delivery competence and privacy.

Politics and petitions

  • Many see this as a distraction from economic issues and a response to anti‑immigration politics.
  • Petition momentum is high, but several expect a perfunctory government response and continued rollout.
  • Calls for clear scope limits, physical smartcard options, tech‑neutral design, and independent governance.

Unclear/contested

  • Exact scope (card vs app vs SSO), mandates, and safeguards are not clearly specified.
  • The scale and nature of online speech enforcement remain disputed in the thread.

UK Petition: Do not introduce Digital ID cards

Concerns about Authoritarianism and Free Speech

  • Many see digital ID as another tool for an increasingly intrusive UK state: frequent references to arrests over social media posts, policing of protests, and broad hate/communications laws.
  • Disagreement over how bad things are: some think cases are exaggerated by selective video clips and far‑right figures; others cite “milquetoast” prosecutions and Palestine-related arrests as chilling.
  • Fears that combining digital ID with the Online Safety Act will make it trivial to deanonymise online speech and link every account to a real identity.

Trust in Government vs. Technical Merits

  • Several posters say a digital ID could be beneficial (less paperwork, better fraud prevention, simpler access to services, help for people without passports/driver’s licences).
  • But they explicitly “do not trust the UK government” to implement it without mission creep, abuse, or shoddy security; past legislation and policing are the core objection, not the idea in isolation.
  • Other countries’ systems (Estonia, Sweden, Denmark, Japan, Brazil) are cited as working well, but many argue those societies have stronger safeguards, higher institutional trust, or written constitutions.

Centralisation, Surveillance, and Single Points of Failure

  • Worries about creating an easy way to correlate all databases (tax, welfare, banking, health, policing), making “turnkey totalitarianism” more feasible.
  • Cyber risk is a major theme: a central ID (or badly integrated ecosystem) becomes an attractive national‑scale target; some argue fragmentation and inefficiency currently act as de‑facto protection.
  • Fear that digital ID will become de‑facto mandatory, phone‑only, and tied to Apple/Google platforms.

Immigration and Illegal Work Justification

  • Deep scepticism that digital ID will meaningfully curb illegal working: employers already must check right‑to‑work, and bad actors simply ignore the rules or use intermediaries.
  • Some see immigration framing as political cover: a way to sell a long‑desired ID system and paint opponents as “pro‑illegal immigration.”

Comparisons to Social Credit and Broader Controls

  • A vocal subset explicitly links digital ID to Chinese‑style social credit, CBDCs, movement controls, and “15‑minute city” fears; others call this a red herring but concede the technical possibility.
  • UK credit scoring is noted as an existing “proto social credit” for financial life, though not yet tied to political behaviour.

Democracy, Petitions, and Political Context

  • Many are cynical about petitions; earlier large petitions (e.g. against the Online Safety Act) were ignored.
  • Labour is criticised for pursuing ID after attacking the Conservatives for similar ideas, and for prioritising this over cost‑of‑living and public services.
  • Some argue focusing on ID and immigration mainly strengthens more hardline parties (e.g. Reform) and further erodes trust.

Denmark bans civil drones after more sightings

Scope and Framing of the Ban

  • Several commenters stress the Danish drone ban is temporary (five days, during a high‑level EU/VIP gathering), arguing this context should have been clearer in headlines.
  • Side discussion on Hacker News norms: submitters are generally expected to use the article’s original title unless it’s misleading or linkbait, with some seeing this one as somewhat misleading by omission.

Reality of the Drone Threat

  • Some argue many “drone” reports are likely misidentified aircraft, citing social media analyses that match sightings to known flight logs.
  • Others point out confirmed drone activity: Danish airport closures, repeated incidents in Norway, and Russian drones or fragments found in Estonia.
  • There’s emphasis on human unreliability in judging airborne objects, clustering of sightings once media attention spikes, and incentives for governments to overreact if they want fewer cameras in the sky.
  • Counterpoint: given documented Russian hybrid operations and drone use, being “paranoid” may still be rational.

Russian Activity, Airspace Violations, and Intent

  • Heated debate over whether recent drones entering Polish and Romanian territory were strays or deliberate missions.
    • One side cites technical details (no warheads, modified fuel capacity, controlled flight paths, telemetry) to argue they were probing NATO defenses and response times.
    • Others highlight earlier datasets counting dozens of prior airspace violations (often stray drones/missiles) and say media only began treating them as major news recently.
  • Reports of GPS jamming in the Baltic, undersea cable attacks, parcel bombs, and assassination plots are noted as part of a wider Russian “hybrid war.”

Manufacturing Consent vs Legitimate Alarm

  • Some participants feel there is a coordinated push to “manufacture consent” for greater EU militarization or even war with Russia, noting a sharp recent uptick in threat‑focused rhetoric and social‑media fear.
  • Others dismiss this as conspiratorial:
    • No major leaders are calling for invading Russia.
    • European governments largely want to avoid direct war; the ban and alerts are framed as self‑defense.
  • Another view: multiple actors benefit from amplifying the threat—defense industries, NATO bureaucracies, certain Eastern European politicians—while Russia itself also seeks to scare EU publics to weaken support for Ukraine.

Larger Russia–West Strategic Debate

  • Long subthread disputes whether Russia is driven by neo‑imperial aims or more complex post‑Soviet ideologies; victims’ perspective vs. Russian self‑image is contested.
  • Hawkish commenters call for Russia’s clear defeat, extensive strikes on its infrastructure, and even harsh economic measures on Russian assets; they tend to downplay nuclear escalation risk.
  • Opponents argue Ukraine and NATO cannot win a long attrition war against a larger population, urge negotiations to minimize losses, and warn about collective punishment and over‑militarization in Europe.
  • Participants differ sharply on how much “resolve” the EU is actually showing and whether current policies meaningfully deter Russia or risk further escalation.

Why I'm not rushing to take sides in the RubyGems fiasco

Perceived Bias and “Neutrality” of the Article

  • Many readers say the post is framed as “not taking sides” while functionally taking a clear anti-André position.
  • Some defend it as a contextual piece aimed at explaining why the author isn’t joining the current pro-André narrative, not as a full retelling of events.
  • Others argue the “reserving judgment” stance is unconvincing when concrete public actions are already known and can be evaluated now.

Relevance of Past Behavior to Current RubyGems Conflict

  • Supporters of the article see it as surfacing long-standing, semi-open concerns about André’s behavior, fundraising, and conflict style, which might explain Shopify’s and Ruby Central’s mistrust.
  • Critics say most anecdotes (Heroku, Google Cloud, dongle/expenses stories) are old, minor, or already resolved with apologies, and don’t justify the recent takeover actions.
  • There is disagreement on whether this constitutes a “pattern” or cherry-picked grievances.

Ruby Together Money, Compensation, and Transparency

  • Dispute over André’s hourly rate: initially portrayed as high, then corrected to ~$150/hr with public filings suggesting ~$30k/year on average—painting a more modest picture.
  • Some are “not shocked” by that rate given contractor costs and SF living expenses; others focus more on donor expectations and transparency about what contributions fund.
  • Debate over whether expensing hardware and meals is normal business practice vs. misleading to donors if not clearly communicated.

Shopify, Ruby Central, and Power Dynamics

  • A synthesized “good faith” reading from one commenter: years of perceived unprofessional conduct by André, then Shopify as dominant funder pushes Ruby Central to take control of Bundler/RubyGems and exclude him.
  • Even under that interpretation, people criticize the lack of transparency and the heavy-handed use of financial leverage.
  • Some suspect legal exposure is why Shopify/Ruby Central say little publicly; others think that silence exacerbates distrust.

Evaluation of Specific Evidence and Narrative Techniques

  • Multiple comments call out the article’s language (“was interpreted as,” “obscuring authorship”) as loaded and tendentious.
  • The rv-ruby fork example in particular is criticized: license and history were preserved, so claims of erasing authorship are seen as overstated.
  • Some describe the piece as a “petty hit” or “borderline defamation”; others view it as much-needed airing of issues otherwise only whispered privately.

Broader Themes: Nonprofits, Funding, and Governance

  • Side discussion on nonprofits that invoke “mission” while spending most funds on salaries/overhead; terms suggested include “lying by omission” and “hostage puppies.”
  • Several commenters generalize to a pattern of VC-backed companies clashing with open source once control and risk rise.
  • There are calls for a more trusted, drama-free steward of Ruby infrastructure, with one person wishing control would move to Ruby core/Ruby Association in Japan.

The AI coding trap

Planning-first workflows

  • Many advocate “don’t write code yet” prompting: have the agent propose a plan, alternatives, and risks before edits.
  • Design docs, CLAUDE.md/AGENTS.md, and pseudocode are used to guide execution and maintain consistency.
  • “Plan mode” exists in several tools, but reports say some agents still modify files; workflows with explicit approvals or YOLO mode on isolated branches with incremental commits are common.

Memory, context, and “learning”

  • Strong desire for durable, session-independent memory that doesn’t consume context and isn’t lossy; current workarounds include summaries, RAG, memory banks, and MCP “fact stores.”
  • Several note fundamental limits: models don’t truly learn across sessions and struggle with massive contexts without strong relevance filtering.
  • Users claim compounding value comes from them learning to wield the tools, not from the models learning.

Where LLMs help most

  • Scaffolding and boilerplate (tests harnesses, CI/CD, SDKs, build configs), stubs, and repo setup; speeding prototyping and exploration.
  • Systematic use across lifecycle (planning, docs, test writing, refactors) can add leverage; some report large speedups, others modest or none.
  • TDD support is mixed: agents can generate tests, but assertions and coverage can be wrong without tight constraints.

Quality, maintenance, and risk

  • Recurrent risks: duplicated code, inconsistent patterns, “messy codebases,” loss of mental model, and hidden failures (“buggy compiler” analogy).
  • Debugging or reviewing AI-written code can be harder than writing it; several prefer writing code to avoid later cleanup.
  • Mitigations: constrain scope, modularize, use strong typing, enforce standards, CI/e2e tests, small tasks, and explicit plans.

Productivity impact and “thinking vs coding”

  • Disagreement on where time goes: some say thinking dominates so codegen offers modest gains; others say LLMs accelerate thinking via rapid iterations and alternatives.
  • Coding and thinking are seen as intertwined; faster throwaway prototypes can improve design decisions.

Roles, juniors, and learning

  • Pushback on “LLMs are junior devs”: models don’t ask clarifying questions or retain context; humans do.
  • Concern that heavy reliance can erode deep understanding and hinder junior growth; some deliberately code without AI to preserve skills and enjoyment.

Process and governance

  • Best results come from plan–build–test–reflect loops, constraint design, and comprehensive automated testing.
  • Accountability remains human: clearer standards, review discipline, and guardrails are needed, especially as some orgs mandate AI use.

The AI coding trap

How people actually use coding LLMs

  • Many experienced engineers say they start with “don’t write code yet”, using agents for planning, architecture discussion, and design docs before any edits.
  • LLMs are used as scaffolding tools: generating stubs, boilerplate, build/test wiring, and framework setup, then refined by humans.
  • Several workflows rely on “plan mode” or similar: get a multi-step plan, negotiate it, then let the agent execute with gated approvals or on a separate branch.

Context, memory, and planning

  • A recurring frustration is lack of true, persistent memory beyond the context window.
  • People use workarounds: AGENTS.md/CONVENTIONS.md files, “memory banks” or JSON fact stores, RAG, and regular summarization, but all are seen as lossy.
  • Some argue that remembering everything across sessions would require a different architecture or an “engineering breakthrough”, not just larger contexts.

Productivity gains and limits

  • One camp reports very large speedups (10x–100x for certain tasks), especially for prototypes and one-off tools they’d never have built otherwise.
  • Others find net gains small or negative once prompt crafting, review, and debugging are included, especially on complex, long-lived systems.
  • There’s disagreement whether LLMs meaningfully accelerate the “thinking” phase or mainly the typing/boilerplate part.

Code quality, debugging, and maintainability

  • LLMs are compared to a “highly buggy compiler” that often reports success while being wrong, with opaque failure modes.
  • “Vibe coding” (letting agents freely generate large swaths of code) is widely criticized as generating messy, duplicated, inconsistent code and long‑term tech debt.
  • Systematic use (small tasks, strong typing, strict tests, e2e suites, constraint-based specs) is seen as necessary to keep quality under control.

Learning, juniors, and skill development

  • Many reject the “LLM = junior dev” analogy: juniors learn, ask questions, gain domain context; models don’t.
  • Concern: if juniors lean on LLMs, they may never develop deep debugging, architecture, and domain modeling skills.
  • Others note that user skill with LLMs compounds over time, but concede this doesn’t replace foundational experience.

Enjoyment, craft, and workflow preferences

  • Some find LLM-assisted coding less fun, likening it to managing an erratic intern instead of “doing the work” and building intuition.
  • Others enjoy offloading the rote/boilerplate parts and spending more time on architecture and domain reasoning; the divide often maps to whether one values code-as-craft versus code-as-means-to-an-end.

Broader concerns beyond laziness

  • Commenters highlight IP/copyright abuse of open source, job displacement, power concentration, misinformation, and community spam as serious anti‑AI arguments that don’t rest on “people will be lazy”.
  • There’s also anxiety that management will mandate careless AI use for short-term speed, leaving engineers to clean up later.

She Sent Her iPhone to Apple. Repair Techs Uploaded Her Nudes to Facebook (2021)

Passcodes and Device Repair

  • Many commenters are uncomfortable that repair shops routinely ask for device passcodes, especially for basic hardware work (screen, battery).
  • Some users always refuse; shops typically proceed anyway, sometimes warning they can’t fully test or will need the owner present to complete settings.
  • A former phone repair tech explains they request passcodes mainly to test screens and touch input after repair. Their shop offered: wipe beforehand, share the PIN, or accept unverified repairs.
  • Others describe vendors (including Apple Stores) asking for iOS passwords or even Mac root passwords, which they now see as unacceptable.

Technical Limitations and “Repair Mode”

  • Several people note that stock Android and iOS traditionally lack robust pre‑boot diagnostics, making testing without unlocking hard.
  • Comments highlight newer “repair modes”: Samsung (since ~2022), Pixels (similar features), and Apple’s “repair state” added in iOS 17.5.
  • There’s confusion and disagreement in the thread about how long Apple has had this feature and how visible it is.
  • Some argue Apple should make repair mode part of the standard intake process so users never hand over passcodes.

Privacy Abuse in the Repair Industry

  • Multiple anecdotes describe techs snooping through photos and files, treated informally as “normal” behavior in some shops.
  • A cited study in Canada found most repair providers ask for OS passwords, many store them insecurely, and a significant minority opened private photos on test laptops.
  • Older examples from photo labs copying nude prints underscore that this predates digital devices.

Legal and Ethical Responses

  • Strong views that this kind of access‑abuse is sexual exploitation akin to voyeurism or hidden cameras, deserving severe criminal penalties.
  • Others favor a distinction: private snooping as serious but not on par with distributing nudes; argue prison is an extreme punishment with limited deterrent effect.
  • Suggestions include both criminal charges and civil penalties that could shutter unethical repair shops.

User Practices, Features, and Threat Models

  • Some now factory‑reset devices before repair and rely on cloud backups, though others see storing everything in the cloud as its own risk.
  • Users discuss hidden/secure app folders, repair mode, and “Guided Access”/app pinning for limiting exposure when handing over devices or to kids.
  • Extended debate over FaceID vs passcodes, law‑enforcement access, and “rubber‑hose” scenarios, with some avoiding biometric unlock entirely.

Apple threatens to stop selling iPhones in the EU

Perception of Apple’s Threat

  • Many see the “we may stop shipping products in the EU” line as a bluff: Apple is unlikely to abandon such a large, affluent market and anger shareholders.
  • Others think it’s at least partially credible because Apple is defending control over its ecosystem, not just revenue.
  • Some argue Apple’s statement is more about explaining why features are withheld in the EU than a direct threat to pull iPhones.

Impact on EU Consumers and Market

  • Several commenters say Europeans would “survive” and simply switch to Samsung, Chinese brands, or emerging European vendors; some even welcome this as space for local competition.
  • Others insist many consumers are emotionally attached to Apple products and would blame Brussels if they disappeared, possibly buying via grey markets or traveling abroad.
  • A counterpoint: brand “love” is viewed by some as unhealthy; if Apple withholds products, anger could flip against Apple instead.

Regulation, Sovereignty, and DMA

  • Strong support for the DMA’s aims: preventing tracking, locking in, and artificial barriers to competition. Apple is framed as holding users hostage to weaken EU regulation.
  • Critics highlight EU overreach and raise broader fears about “chat control” and potential mass surveillance, arguing courts and treaties aren’t permanent safeguards.
  • Some say the DMA is central to EU digital sovereignty and the bloc is unlikely to back down, just as with GDPR and the USB‑C mandate.

Walled Gardens vs Interoperability

  • One camp: Apple’s tight hardware–software integration and private APIs enable superior battery life, low‑latency audio, and features like Live Translation; forcing interoperability makes engineering “10x” harder and can degrade quality and security.
  • Opposing camp: the barriers at issue are artificial policy choices (hidden APIs, punishing compatible devices, blocking default‑app choice). Public APIs don’t require Apple to support or optimize third‑party devices, only to stop actively sabotaging them.
  • The debate repeatedly invokes Android’s poorer real‑time audio and third‑party driver problems on Windows as cautionary or contested analogies.

How Important Is the EU to Apple?

  • There’s heavy argument over numbers: a misread “7%” App Store figure versus much larger overall European revenue.
  • Some insist forfeiting EU iPhone sales would be corporate “self‑sacrifice” markets wouldn’t tolerate; others cite Russia, where iOS share rose despite official exit, to claim Apple could endure leaving.

Media Framing and Accuracy

  • Several commenters note the submission headline overstates things: Apple talked about “products and services” in general and specific features, not explicitly “iPhones”, and within an EU‑mandated feedback process on the DMA.

Ask HN: What is nowadays (opensource) way of converting HTML to PDF?

Browser Engines & Headless Automation

  • Many recommend using a real browser engine for fidelity, especially with modern CSS/JS:
    • Headless Chrome/Chromium via CLI (--headless --print-to-pdf) is a common baseline.
    • Puppeteer and Playwright are repeatedly cited as “main” open‑source options. Easy to integrate in backends or microservices; good when JS must run and print CSS is under your control.
    • Gotenberg (Dockerized headless Chrome with a Go wrapper) is praised as “rock solid” in production, including high‑volume workloads and Word→PDF.
  • Downsides mentioned: heavier resource usage, headless browser quirks (especially Firefox), and long‑term maintenance overhead.

WeasyPrint & Non‑Browser Libraries

  • WeasyPrint gets strong endorsements for server‑side HTML→PDF, especially with Django and AWS Lambda:
    • Handles modern CSS reasonably well (but no JS).
    • Seen as a better‑maintained successor to wkhtmltopdf.
    • Used for invoices, ebooks, and general document export; considered close to commercial tools now.
  • Some prefer non‑browser engines (like WeasyPrint) for lower resource use and more predictable environments.

Pandoc, LaTeX & Typst

  • Pandoc is frequently named:
    • Converts HTML→LaTeX (or Typst)→PDF via engines like XeTeX or ConTeXt.
    • Valued for robustness across many formats and extensibility.
    • Debate: some dislike that it’s a “wrapper” around LaTeX and would rather target the underlying engine directly; others argue the higher‑level interface is worth it.
    • Also used to create self‑contained HTML instead of PDF; mixed reports on how well complex CSS survives.
  • Typst is suggested as a modern typesetting backend, sometimes via pandoc → typst → PDF.

Other Tools & Ecosystem

  • Java stack: openhtmltopdf / Flying Saucer, PDFBox, OpenPDF.
  • PHP: mPDF; JS frontend: jsPDF.
  • Ghostscript and Apache FOP are mentioned for more low‑level or XML‑driven workflows.
  • For PDF merging, poppler’s pdfunite is cited as a simple open‑source solution.

Philosophical & Workflow Points

  • Some argue to avoid HTML→PDF entirely: keep a canonical source (Markdown/LaTeX/etc.) and generate both HTML and PDF from that.
  • Others stress that PDFs are still preferred for archival, offline reading, annotations, and consistent layout; HTML is better for accessibility and reflow.
  • For the OP’s use case (≈5k PDFs/month for archival), the de facto “modern OSS” answers in the thread are:
    • Headless Chromium (directly, via Puppeteer/Playwright, or via Gotenberg), and
    • WeasyPrint, if JS execution isn’t required.

The Demon-Haunted World

Enduring impact & favorite works

  • Many commenters describe The Demon-Haunted World as formative for their thinking about science and self-correction.
  • Favorite Sagan pieces include “The Dragon in My Garage,” Pale Blue Dot, Cosmos, Billions and Billions, and Shadows of Forgotten Ancestors.
  • Several note a perceived lack of a single Sagan-like figure today, but point to multiple modern science communicators (physicists, YouTubers, podcasters) filling parts of that role.

“Pale Blue Dot” and human significance

  • Some admire the “pale blue dot” passage as profoundly humbling and poetic.
  • Others criticize it as a logical error: physical size of the universe doesn’t determine human significance, and they see it as needlessly belittling human achievements.
  • Defenders answer that it’s a rhetorical device to convey scale and humility, not a strict philosophical argument.

Sagan, atheism, and philosophy

  • There is an extended dispute over whether Sagan (and similar figures) were philosophically shallow “scientistic” critics of religion, or simply scientists speaking outside formal philosophy.
  • Critics accuse him and later “New Atheists” of straw‑manning theology, ignoring centuries of work, and over‑privileging empirical science.
  • Others respond that deep expertise in theology isn’t required to reject religious claims one finds baseless, and that his main strength was as an astronomer and communicator, not a professional philosopher.

Skepticism, compassion, and the skeptical movement

  • Multiple quotes from the book highlight Sagan’s criticism of organized Skepticism: polarization, condescension, “us vs. them” attitudes, and lack of compassion for believers.
  • Some readers are surprised skeptics revere a book that so sharply critiques their style; others say those passages are precisely why it’s foundational.
  • One commenter stresses that the book is best read as a guide for examining one’s own beliefs, not as ammunition against others.

Human rationality, myth, and magical thinking

  • Several discuss how entrenched beliefs rarely change just from logic or lending someone a book; motivation and social costs matter more.
  • There’s reflection on cognitive “wiring,” confirmation bias, and the idea that even very rational people may be mostly irrational, just slightly less so than average.
  • Others argue mythology and irrational narratives are inevitable products of the psyche; the realistic goal is to replace worse “wrong stories” with better ones via the scientific method.

Politics, prophecy, and today’s “demon‑haunted” world

  • Sagan’s passages about a service/information economy, loss of manufacturing, concentrated tech power, and declining critical faculties are widely seen as eerily accurate for current conditions.
  • Commenters connect this to disinformation, conspiracy culture, and fear‑based politics that actively “haunt” the public with manufactured demons.
  • Debate arises over whether this slide is orchestrated, emergent from human nature, or both.

UFOs, astrology, and harmful vs harmless belief

  • One long comment uses UFO debates to illustrate Sagan’s point: both true believers and some self‑described debunkers exhibit dogmatism and contempt.
  • Another defends everyday astrology and crystals as mostly benign introspective tools, arguing that systemic economic forces are far more damaging than such superstitions.
  • Others reply that Sagan’s criticism targets anxious dependence on such beliefs, not casual usage.

Reception and access to the book

  • Some readers now find the “science cheerleading” sections less compelling with age, but still value the chapters on witchcraft, gullibility, and cognitive pitfalls.
  • There is practical discussion about high current prices, used copies, and free digital versions; one reader offers a brief chapter‑by‑chapter impression after reading an online copy.

When I say “alphabetical order”, I mean “alphabetical order”

What “alphabetical” means vs. what UIs do

  • Many file managers sort “by name” using natural/number-aware collation (treat digit runs as numbers), not strict lexicographic/character-by-character order.
  • Several argue “alphabetical” is ill-defined: case, digits, punctuation, Unicode, diacritics, locale rules all complicate it. Others say the concrete issue is just numbers inside names.

Defaults, labeling, and user control

  • Broad support for natural sort as the sensible default for most users (e.g., photo_2 before photo_10).
  • Critique: UIs often label it “Name,” not “Alphabetical,” which avoids a false promise but still surprises users expecting classic lexicographic order.
  • Recurrent request: expose both modes. Examples given where KDE/Dolphin offers toggles; Windows/macOS have APIs and even registry/GPO switches. Some push back on option bloat; others argue this is a core behavior worth a visible toggle.

Edge cases and ambiguity

  • Natural sort breaks down with:
    • Decimals (1.10 vs 1.2), scientific notation, negatives/hyphens, thousands separators, locale differences.
    • Hex IDs, hashes, GUIDs, mixed numeric lengths, inconsistent camera filenames (e.g., milliseconds with/without separators).
  • Disagreement on leading zeros: should they imply lexical treatment or just be shorter numeric representations?
  • Date-in-name formats: ISO-like YYYY-MM-DD works lexically; “September/October Budget” or dd.mm.yyyy can confound both modes.

Unicode and locale realities

  • Sorting isn’t just A–Z: case folds, diacritics, digraphs (e.g., Czech “ch”), dotted/dotless i, and language-specific collation rules matter.
  • Standards exist (Unicode Collation Algorithm, CLDR; ICU implementations) with a numeric option (“kn”) but numeric sorting is not a universal default in DUCET.

CLI vs GUI expectations

  • Shell tools often default to lexicographic; many provide numeric/version-aware options (e.g., sort -V, ls -v, alternative tools).
  • GUI file managers generally default to natural sort; some also case-insensitive.

Workarounds and practices

  • For predictable ordering across contexts: zero-pad numbers, use delimiters, adopt ISO-like date formats in filenames.
  • For photos: sort by metadata (Date Taken) when available; caveats noted about copied files losing FS timestamps but EXIF persists.

Proposed resolutions

  • Better naming in UI: “Name (natural)” vs “Name (strict)”.
  • Keep natural as default, but make strict lexicographic easily discoverable.
  • Avoid overly “smart” heuristics beyond digit-run-as-number; complexity quickly becomes surprising and inconsistent.

When I say “alphabetical order”, I mean “alphabetical order”

What behavior is being debated

  • Thread centers on GUI file managers that use “natural” (a.k.a. numeric‑aware) sorting for filenames, while terminals and classic tools use strict character‑by‑character (lexicographic) sorting.
  • Example: file-2.txt after file-10.txt in strict sort vs. after file-1.txt in natural sort.
  • The article’s concrete case: mixed camera filename formats like IMG_20250820_055436307.jpg vs IMG_20250820_095716_607.jpg get reordered unexpectedly when numeric segments are interpreted as numbers.

Natural vs. strict lexicographic / “alphabetical”

  • Many commenters say natural sort is overwhelmingly what users expect: numbered items, versioned files, episodes, screenshots, etc. should order 1,2,3,…,10, not 1,10,2….
  • Others argue the opposite: filenames are strings, so sort should be purely lexicographic; “numbers aren’t in the alphabet” and any numeric semantics are extra “magic.”
  • Several people note the author is really asking for “lexicographic” or “ASCII/UTF sort”, not “alphabetical,” and that “alphabetical order” is itself underspecified.

Labeling and configurability

  • Strong view that the real bug is UI wording and lack of options: if the menu says “Name,” not “Alphabetical,” it’s not lying—just vague.
  • Many advocate two modes: e.g., “Name (natural)” vs “Name (strict)” or a deep preference toggle. KDE/Dolphin and Windows (via registry / Group Policy) are cited as offering such switches.
  • Others push back: every extra option multiplies complexity and test surface; defaults should favor the majority use case.

Unicode, locales, and standards

  • Multiple comments emphasize that “real alphabetical” is messy in Unicode: locale‑dependent ordering, accents, digraphs, case, and digit characters make any single rule arbitrary.
  • References to the Unicode Collation Algorithm, CLDR, ICU, and specific tricky locales (e.g., Czech “ch”, Swedish å/ä/ö, Turkish dotted/undotted i).
  • Numeric collation (“kn” option, natural sort) is explicitly a configurable extension in these standards, not a universal default.

Edge cases where natural sort is bad

  • Hash‑like filenames, GUIDs, random IDs, or hex strings become harder to scan when digit runs are reinterpreted as numbers.
  • Mixed date formats, decimals, scientific notation, locale‑specific separators, and leading zeros produce ambiguous expectations; natural sort only “just works” for a narrow subset.
  • Users dealing with large photo collections often prefer sorting by metadata (EXIF date) rather than filename at all.

Philosophy: smart defaults vs. dumb tools

  • One camp prefers “dumb but predictable” tools that never guess, even if that requires zero‑padding names.
  • Another camp prefers “mind‑reading” behavior that fits lay expectations 99% of the time, accepting occasional surprises.
  • Several note a broader trend: UIs removing advanced options in favor of opinionated defaults, frustrating power users who want explicit control.

Privacy Badger is a free browser extension made by EFF to stop spying

Personalized vs. Contextual Ads

  • Strong call for contextual ads (match ads to current content) as more relevant and privacy-friendly; cited as how YouTube “should” work.
  • Pushback that behavioral/personalized ads generally outperform contextual in ROI, CTR, and conversion, so the industry isn’t irrational for using them.
  • Middle ground: use contextual when sufficient; fall back to generic or broader categories.
  • Practical challenges: many contexts lack clear matches (e.g., niche hobby videos), adjacency risks in news, and higher manual curation costs.

Ad Effectiveness and Measurement

  • Advocates of personalization cite extensive internal data and direct click-to-purchase tracking.
  • Skeptics argue attribution is murky, incentives bias metrics, and independent studies find smaller-than-claimed effects. Retargeting may simply capture inevitable purchases or clicks “out of curiosity.”
  • Debate over post-purchase targeting: some say it works via reinforcement/substitution; others find it obviously wasteful for infrequent purchases.

Market Power, Costs, and Externalities

  • Claims that ad platforms (especially search/display) act as rent-seeking middlemen, extracting a “tax” that raises consumer prices and shifts revenue from local providers/publishers.
  • Concerns about monopolistic control of both buy and sell sides, auction opacity, and fraud risks; calls for structural remedies/divestitures.
  • Counterpoint: advertising spend exists because it increases profits; banning or slashing ads would mainly reduce demand for upstarts versus incumbents.

Privacy Badger vs. Other Tools

  • Some say Privacy Badger (PB) is redundant with uBlock Origin (uBO) and modern Firefox protections; others argue PB is complementary, not a pure ad blocker.
  • PB highlights: dynamic learning of trackers, per-domain modes (allow/block cookies/block), click-to-activate widgets, Do Not Track/Global Privacy Control signaling, search-link rewriting; working on automatic cookie-consent opt-outs.
  • uBO noted for powerful request/content filtering and scriptlet injection; NoScript and LocalCDN mentioned for deeper control and local font/CDN replacements.

Usability, Breakage, and Platforms

  • Reports of increasing site breakage; PB suggests site-level disabling and reporting broken sites to improve heuristics.
  • Platform caveats: best on Firefox (including Android); limited/unsupported on Safari iOS and Chrome Android. Brave users may rely on built-in blocking.

YouTube Experiences

  • Frustration with irrelevant, interruptive ads; suggestions for Premium and SponsorBlock (or built-in equivalents), with trade-offs across devices and risk of third-party apps.

Privacy Model and Fingerprinting

  • One view: extra extensions increase uniqueness. Rebuttal: blocking third-party trackers reduces exposure; fingerprinting-based detection exists but is not universal. Tor browser offers stronger uniformity but different trade-offs.

Privacy Badger is a free browser extension made by EFF to stop spying

Contextual vs. Personalized Ads

  • One side argues for “context-sensitive” ads tied to current content (e.g., car ads on car videos) as more logical, less creepy, and often more relevant than history-based targeting.
  • Others say contextual signals alone are weak (e.g., watching TV-repair videos for entertainment), and that combining context with user profiles and past behavior yields higher ROI.
  • Several commenters note that in many product categories, the best predictor of the next purchase is a recent related purchase or interest, so retargeting can be rational even if it feels dumb to individuals.

Do Personalized Ads Actually Work?

  • Multiple participants with ad-tech experience insist behavioral ads are measurably more effective (higher conversion/ROI) and that huge budgets and constant A/B testing would quickly kill ineffective approaches.
  • Skeptics cite academic work and structural incentives: metrics can be biased to make ad products look good; attribution is murky; and some spend may chiefly “move” sales timing or steal credit from organic discovery.
  • There’s recognition that even if effect sizes are smaller than claimed, they are not zero, and this strengthens, rather than weakens, the privacy argument against tracking.

Economic and Social Costs of the Ad Ecosystem

  • Example: in home-cleaning services, a large share of the fee goes to Google ads and intermediaries, not the worker; commenters call this a “Google tax” and part of a broader rent-extracting middleman economy.
  • Debate over whether advertising primarily reallocates customers among similar providers or genuinely helps discovery, and whether high marketing costs crowd out local relationships and word-of-mouth.

Attitudes Toward Ads

  • Many users object more to UX harms (interruptions, clutter, bandwidth, mobile misery) than to tracking per se.
  • YouTube’s non-contextual, intrusive mid-rolls are a frequent complaint; some advocate Premium + tools like SponsorBlock, others reject paying due to broader platform issues.

Privacy Badger, uBlock Origin, and Browser Features

  • Privacy Badger is framed as a tracker detector/learner (per-host allow / cookie-only / block), complementary to list-based blockers like uBlock Origin.
  • Some see it as redundant on hardened Firefox + uBO setups; others value unique features (automatic learning, link rewriting, click-to-activate widgets, upcoming cookie-banner auto-reject).
  • There’s a side debate about whether additional extensions increase fingerprintability versus clearly improving privacy from third-party trackers.

Failing to Understand the Exponential, Again

Exponential vs. Sigmoid Growth

  • Many argue the author is mistaking the steep part of a sigmoid (logistic S-curve) for a true exponential.
  • Commenters note that most real systems (COVID spread, airline speeds, CPU clocks, human population) start exponential and then hit constraints.
  • The key disagreement: some think we’re still safely on the early, exponential part of the S-curve; others believe we’re already seeing diminishing returns, especially on LLMs.

Benchmarks, “Human-Level” Claims, and Metrics

  • Heavy skepticism toward the METR “task length” metric and OpenAI’s GDPval benchmark:
    • “Length of tasks a model can do” is seen as loosely defined and easy to cherry-pick.
    • A 50% “win rate” vs. experts is criticized as a low bar, obscuring error and hallucination rates.
    • Concerns that benchmarks select only tasks that flatter LLMs (presentations, reports) rather than the full job (e.g., nursing, software engineering).
  • Several commenters stress that evaluation on curated tests ≠ robust performance in messy real-world workflows.

Limits: Data, Compute, Energy, and Economics

  • Multiple proposed limiting factors:
    • Training data (the “petri dish” is the internet; synthetic data risks feedback/hallucination loops).
    • Compute, energy, and cooling; capex may already be propping up the broader economy.
    • Funding and investor patience: exponential capability is being bought with exponential spending.
  • Others counter that information systems historically show long-run exponential improvement and that physics limits (e.g., Bremermann’s limit) are still far away.

Real-World Capability vs. Hype

  • Practitioners report:
    • Strong gains in tooling (coding assist, video editing, subtitles, masking), but models still fail in ways no competent human would.
    • “Eight hours of autonomous work” ignores memory, learning, and responsibility: LLMs don’t retain long-term context or reliably self-correct.
    • Key weaknesses remain in reasoning, math without tools, physical-world understanding, and persistent learning.

Incentives, Hype, and Trust

  • Significant criticism of conflicts of interest: the author works at a frontier lab and benefits from continued hype.
  • AI timelines always being “1–2 years away” (self-driving, AR, metaverse, AGI) is seen as structurally tied to fundraising and competition for capital.
  • Many call for focusing less on curve-fitting and more on:
    • Concrete constraints and mechanisms,
    • Error/hallucination rates and accountability,
    • How and when systems can actually replace or safely augment human experts.

EPA tells some scientists to stop publishing studies

Reactions to the alleged EPA publication halt

  • Many commenters see the reported pause on EPA scientists’ publications as consistent with a broader pattern of censorship and hostility to science by the current administration.
  • A minority argues the article may overstate things: a couple of staffers report being told to pause, HQ denies it, no written directive has surfaced; this could be a “clearance bottleneck” from reorganization rather than a formal gag order.
  • Others reply that organizational chaos, staff cuts, and centralization are the censorship tactic: you don’t need memos if you can choke capacity and create fear.
  • Several note that this administration often avoids paper trails, making it unrealistic to expect explicit “do not publish” directives.

Trust, whistleblowers, and rule of law

  • Multiple comments argue that career scientists are more credible than an administration widely perceived as habitually dishonest, including to courts.
  • There is debate over evidence standards: some want documents or journal confirmations before declaring “censorship,” others say multiple whistleblowers are already strong evidence.
  • Discussion extends to federal courts increasingly refusing to assume the executive acts in good faith, and to repeated episodes where government lawyers allegedly misled judges.

Perceived anti-environment, anti-science agenda

  • Many see the administration as fundamentally opposed to the EPA’s mission: promoting fossil fuels, downplaying climate change, and undermining environmental regulation.
  • “Clean coal” and hostility to wind power are treated as emblematic of policy driven by ideology, greed, or image concerns, not by science or public health.
  • Some commenters express deep pessimism, claiming impactful science in the U.S. is “dead” under current conditions.

Psychology and politics of climate denial

  • Explanations offered include:
    • Tribal signaling and “owning” the out-group (including racial and cultural resentments).
    • Willingness to accept personal harm if it hurts disliked groups (“hurting yourself to hurt others”).
    • Long-running anti-intellectualism and media-driven propaganda from fossil-fuel interests.
    • Identity built around unrestricted profit and dominance; reality is bent to fit that identity.
  • Others emphasize simple material incentives: politicians and institutions funded by coal/oil push narratives like “clean coal” because it pays, not because they believe it.

China, competitiveness, and climate

  • One thread argues aggressive U.S. climate action could weaken U.S. power while China continues polluting, making global outcomes worse.
  • Multiple replies counter that:
    • China is rapidly scaling renewables and EVs and often outpacing the U.S. on deployment.
    • Per-capita and historical U.S. emissions are higher, so blaming China is ethically and empirically shaky.
    • Using China as a reason for inaction effectively values Chinese lives less and ignores per-person responsibility.

Institutional workarounds and erosion of trust

  • Several commenters call for robust, non-federal institutions (professional societies, NGOs, blue states, private initiatives) to maintain scientific and public-health standards when federal agencies are captured or politicized.
  • Example: medical groups creating independent vaccine schedules due to distrust of federal health agencies.
  • Others note limits: federal funding and constitutional structure make it hard for states or private actors to fully substitute for federal basic-research and regulatory roles.

Polarization, voting systems, and constitutional structure

  • Some blame extreme polarization on first-past-the-post elections, which structurally encourage a two-party, tribal dynamic.
  • There is discussion of U.S. Senate malapportionment and the 1929 cap on House seats as mechanisms that overrepresent smaller, often more conservative states.
  • Others argue this is not “both sides”: only one major party is seen as systematically running on anti-science, climate-denial platforms.

Overall sentiment

  • The dominant tone is alarm and anger: the episode is viewed less as an isolated EPA dispute and more as another symptom of authoritarian drift, contempt for law and norms, and deliberate dismantling of scientific governance.

Why I gave the world wide web away for free

Nostalgia, optimism, and what was “lost”

  • Several comments read the article as: the web started on a hopeful trajectory toward a better world, then lost its way; the author is now looking for smaller corrective moves.
  • Some recall the 1990s as uniquely optimistic and almost-utopian, including an anomalous period of worldwide, lightly censored communication that “won’t come back.”
  • Others push back: they still experience largely free global communication; every era had serious problems (ozone, homelessness, etc.), so 90s optimism is partly mythmaking.
  • One thread links climate-change anxiety to renewed authoritarianism: when problems lack simple solutions, “us vs them” ideologies become more attractive than universalist “better world for everyone” visions.

Guardian’s consent/paywall model and data use

  • Multiple people note the irony: an article lamenting data harvesting is hosted on a site that effectively demands “consent to tracking or pay.”
  • Defenders argue the Guardian is unusually generous compared with hard paywalls; journalism costs money, and you can often reject cookies (at least in some jurisdictions) or block specific scripts.
  • Critics stress that “free to read” backed by data monetization is exactly the model the article warns about.

Did one person “invent” the Web, and how important was giving it away?

  • Some insist the core WWW stack (HTTP, HTML, URL, first browser/server) really was a distinct, pivotal invention, and putting it in the public domain mattered.
  • Others say the web was an “obvious” next step, built on hypertext, FTP, Usenet, Gopher, CEEFAX, Minitel, etc.; if it hadn’t been opened, another open system likely would have emerged.
  • A counter-argument notes this is heavy hindsight bias: contemporaries didn’t generally see it as inevitable, and a proprietary web might have entrenched walled gardens like AOL/CompuServe.
  • There’s broad agreement that openness and simple standards were key to beating closed systems and that earlier proprietary hypertext efforts (e.g., ones tied to licensing or micropayments) stagnated.

Advertising, centralization, and protocol choices

  • One view: “we got the web advertising built” — without ad money and search, the internet would have remained niche.
  • Others argue the web is still fundamentally free; users mostly choose convenience over freedom, which drives reliance on a few mega-platforms.
  • Commenters note HTTP’s client/server model and lack of incentives for interoperability made walled gardens easy; by contrast, email protocols inherently distribute messages between systems, which has slowed enclosure (despite spam and hosting difficulties).
  • Legal regimes (DMCA, terms of service) and dominant providers’ spam policies are seen as additional de facto “walls.”

Data ownership schemes and decentralization attempts

  • Some argue loss of control over personal data is partly due to web architecture: domain registration, IPv4, NAT, and security fears make self-hosting hard for ordinary users.
  • Suggestions include Tor and similar tech as ways to self-host more safely, though their adequacy is labeled “unclear.”
  • Solid is discussed: its goal is to separate data from apps via personal “pods.” Critics say data is often useless without the app, and any remote app can still copy it, so privacy benefits are limited; adoption has been minimal.
  • Self-hosted app platforms (e.g., ones that bundle data and app under user control) are proposed as more practical ways to give users real ownership.

AI, CERN-style governance, and open models

  • The article’s call for a CERN-like, not-for-profit AI body sparks debate:
    • Some think it’s already too late; AI is captured by US/Chinese corporate interests, and big powers won’t relinquish control.
    • Others prefer public institutions over corporations: governments are at least theoretically accountable to citizens, whereas companies are structurally accountable to profit.
    • Skeptics doubt current great-power governments would be good stewards, especially amid rising autocracy.
  • Several comments pin hopes on open-source LLMs and local models: cheap, offline, ad-free assistants that don’t phone home could counterbalance centralized, biased systems — albeit with their own quality issues.

Expectations of inventors and community attitudes

  • Some argue that inventors who give technologies away get paradoxically less respect: people call their ideas “obvious” and then blame them for later commercialization and abuse.
  • A minority of comments criticize the web’s original design for not preventing enclosure or data silos; others respond that solving every future social and economic failure was never a realistic design brief.
  • A few voices express frustration with the tone of the thread itself: demanding more from the web’s inventor and holding him responsible for oligopolies’ later behavior is seen as unfair and ahistorical.

Dismissed as a joke, UK's first rice crop ripe for picking after hot summer

Rice cultivation methods and the UK fenlands

  • Commenters note rice doesn’t require classic flooded paddies; it can be grown in dry or partially flooded systems, as in parts of Australia and the US.
  • In this UK experiment, flooded fields are linked to preserving peat in the Fens: keeping peat wet prevents shrinkage and CO₂ release.
  • Some argue that “re‑naturalising” fenlands (restoring wetlands) should be a higher priority than new crops.
  • Saltwater intrusion is flagged as a potential long‑term risk if sea levels rise around this low‑lying, heavily drained region.

Climate change, geography, and crop viability

  • Several posts say it’s unsurprising rice can now be grown outdoors in England, given it’s long grown in northern Italy and southern France and UK summers are becoming more Mediterranean.
  • Others push back on the framing “rice is tropical,” pointing to Japan and Korea as non‑tropical rice producers.
  • There is disagreement on whether climate change is being reasonably highlighted or opportunistically “jammed into” every BBC science story.

Economics, labour, and subsidies

  • Rice is described as low‑margin and only attractive with cheap labour or huge, highly mechanized farms; UK land structure and small fields work against that model.
  • Debate splits between:
    • Those saying government should not subsidise or should actively discourage economically inefficient boutique rice projects.
    • Those arguing local food diversity and security justify subsidies, even for inefficient crops, given geopolitical and climate risks.
  • There’s side discussion on how mechanisation and drones are rapidly reducing labour needs in rice farming.

Water, sea level, and land‑use strategy

  • The Fens and East Anglia are seen as highly vulnerable to sea‑level rise; long drainage history and pumped systems are noted.
  • Some suggest integrating rice into broader coastal and lowland strategies: tidal marsh restoration for storm protection plus inland rice paddies as additional retention buffers.

Media, science reporting, and trust

  • Several commenters criticise BBC science coverage as sensationalist, climate‑angle‑driven, and weak on basic botany; others defend the article as reasonable and note such flaws are common across journalism.
  • Broader concerns are raised about science being perceived as a policy tool, university PR overhyping results, and journalists not seeking independent expert review, all contributing to public distrust.