Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 220 of 528

This map is not upside down

Terminology: “Global North/South” vs “Developed/Developing”

  • Several commenters react strongly against “Global North/South,” calling it discriminatory, arbitrary, and politically loaded, especially for cases like Australia or Argentina being classed as “North” while poorer northern-hemisphere states are “South.”
  • Others argue “developed/developing” is just as problematic: it presupposes a single endpoint (industrial, Western-style society) and hides histories of colonial extraction and structural dependency.
  • Some point out that the original intent of “Global North/South” in critical theory was to expose imperial relations, not to rank virtue, but acknowledge it’s now used loosely and inconsistently (e.g., Singapore, China).
  • There’s broader skepticism about any binary global grouping: countries rise and fall, have mixed indicators, and don’t map neatly onto race, latitude, or alliances.

Do People Associate “Up” with “Good”?

  • Many cite language examples (“on top,” “moving up,” “low point,” “downhill from here”) and cognitive-linguistics work on orientational metaphors (good/up, bad/down, control/up, subject/down).
  • Others counter with neutral or positive “down” metaphors (“down for it,” “get to the bottom of it”) and argue that cherry-picking phrases proves little.
  • A linked psychological study on north–south housing preference is widely criticized for tiny, homogeneous samples and weak methodology; used as an example of broader doubts about social-psych “priming” style research.

Why North Is Usually “Up”

  • Explanations offered:
    • Practical navigation: Polaris and the North Star, compasses, and noon shadows make north easy to fix.
    • Geography: ~2/3 of land and ~90% of population are in the northern hemisphere; centering and enlarging that region is convenient.
    • Historical contingency: printing, European maritime power, and earlier sailor conventions locked in north-up; earlier maps sometimes had east-up or south-up (e.g., medieval European, Chinese, Egyptian traditions).

South-Up and Other Alternative Maps

  • Many like south-up maps as a simple way to unsettle habits, teach kids geography, or highlight that all orientations and centering choices are conventions.
  • Others find the “this reveals hidden prejudice” framing overwrought; to them it’s just a 180° rotation, less striking than changing projection or centering.
  • Several argue projections (e.g., Mercator vs Robinson vs Dymaxion/AuthaGraph) and centering (Atlantic vs Pacific vs polar) have more substantive effects on perceived importance and size (especially Africa, Russia) than the up/down choice itself.

Moralizing, Bias, and Overreach

  • One camp reads the article as implicitly condemning north-up as morally suspect (“up = good, north = rich”), seeing it as part of a trend of over-interpreting small psychological effects.
  • Another camp says this is overreaction: the piece merely notes subtle associations and invites perspective-taking, not guilt; resistance is read as discomfort at challenging defaults.
  • There’s a meta-thread about how much such cognitive framing actually shapes geopolitics versus being mostly academic or symbolic.

Learn Your Way: Reimagining Textbooks with Generative AI

Sci‑fi visions and overall reaction

  • Several commenters connect the idea to fictional AI tutors (Diamond Age’s Primer, Tom Riddle’s diary), seeing this as a step toward interactive, always‑available guidance.
  • Others say the demo feels like “chalk‑and‑talk with animations” rather than a true tutoring revolution.

Perceived pedagogical value

  • Many argue the hard part of learning is not style but difficulty and prerequisite gaps; deep topics require time, foundations, and lots of feedback.
  • A former physics teacher calls this a “low‑efficacy innovation”: it doesn’t tackle entrenched misconceptions (e.g., impetus vs Newtonian mechanics), just repackages slides and multiple‑choice quizzes.
  • Some stress that subject‑specific pedagogy (how to teach this concept) matters more than generic “engagement tech.”

Personalization via interests and analogy quality

  • The “tailor content to what the student likes” idea (e.g., food‑based CS examples, basketball for physics) is widely criticized as shallow and quickly tiresome.
  • Many point out the analogies themselves are often wrong or misleading (data structures vs recipes/sets, Newton’s third law with a bouncing basketball), making them actively confusing.
  • Several note this may just be a novelty effect (Hawthorne effect), not durable improvement.

AI as tutor: promise vs hallucinations

  • Quite a few use LLMs successfully as study aids: asking questions about papers, textbooks, or novels; generating practice quizzes; or getting lay explanations and step‑by‑step hints.
  • Others emphasize hallucinations and confidently wrong answers, including an example from the Learn Your Way demo where a comprehension question literally had no correct option.
  • There’s debate over whether learners—especially kids—can reliably detect errors or ask “the right kind of questions” to keep AI on track.

EdTech economics and systemic constraints

  • Commenters note EdTech’s poor VC returns and argue that selling to school districts (“enterprise sales”) pushes vendors to serve administrative metrics (test scores, dashboards) rather than authentic learning.
  • Several argue real problems are socio‑economic and political (inequality, underpaid teachers, credentialism), which tech can’t fix; better human teachers and basic resources would matter more than AI slideware.

Evaluation, design, and alternatives

  • The study is criticized for comparing AI‑augmented interactive content only to static PDFs, not to good print textbooks or non‑AI interactive materials. An unexplained “LCG” group in the report further raises eyebrows.
  • Practical issues: mobile layout limitations, performance, energy “AI tax,” and data‑use concerns when uploading PDFs.
  • Some see more promise in other AI uses: high‑quality exercise generation with instant feedback, true Socratic dialogue, domain‑specific tools (e.g., for arXiv papers or corporate training), and future richer 3D/simulation environments.

Chrome's New AI Features

Market Power, Lock-In, and Browser Competition

  • Many see this as Google leveraging Chrome’s dominance to push Gemini and AI agents, rather than offering a model-agnostic browser feature.
  • Some argue a “true browser enhancement” would let users plug in any model, including local LLMs.
  • Firefox, Brave, and Chromium builds are mentioned as alternatives; Firefox already has optional AI sidebar integrations, and some suggest LibreWolf / custom Chromium to avoid Google’s stack.

Privacy, Surveillance, and Cognitive Profiling

  • Strong concern that summarization, tab consolidation, and natural-language history search vastly expand what Google can infer about users: reading habits, decision patterns, knowledge gaps, and even writing “fingerprints.”
  • Several compare this to Microsoft Recall at the browser level and call it “AI spyware” that bypasses ad blockers.
  • People note Google’s help text: history contents are stored locally and encrypted, but queries, generated answers, and “best match” page contents are still sent to Google to improve models. Trust in any “local-only” promise is low.
  • Users highlight the absence of the word “privacy” in the announcement as alarming.

Usefulness vs Gimmick: History, Tabs, and Agentic Tasks

  • Some genuinely want better history and tab tools: full-text search, organization, long-term retention, drafts saved, link-rot protection, and smarter tab management. They’d even pay for a privacy-preserving, local solution.
  • Agentic browsing (e.g., automatically building carts, comparing prices, handling tedious form-filling) is seen by some as a potential “big deal” if it works reliably.
  • Others dismiss grocery/cart automation as trivial, unreliable, or undesirable, preferring direct control.

Security and Prompt-Injection Risks

  • Concern that using weaker on-device models like Gemini Nano for security tasks (e.g., scam detection) may be brittle against prompt injection.
  • Debate over whether a local model meaningfully reduces exfiltration risk once agents can take in-browser actions; consensus that user review/approval of actions is critical.

Opt-Out, Control, and User Backlash

  • Many resent “AI everywhere” being pushed by default and want strict opt-in with clear disclosure of what’s accessed and transmitted.
  • Some ask how to disable features entirely, whether Linux/Chromium builds are spared, or whether hosts can block AI features on their own sites.
  • Broader frustration with AI as the new corporate hype cycle; others counter that AI can be both overhyped and genuinely valuable.

Ads, Monetization, and Business Incentives

  • Speculation that AI modes start ad-free but will eventually be monetized or steer users toward promoted products.
  • Some suggest Chrome’s weak history UI is intentional to keep users re-searching with Google; AI history features may double as large-scale data collection and on-device preprocessing to cut cloud costs.

Configuration files are user interfaces

YAML and existing config formats

  • Several comments argue that plain YAML (or familiar formats like INI, TOML, JSON) are “good enough” and that most “YAML hell” is self‑inflicted by misuse (e.g., embedding shell scripts).
  • Others complain that many platforms (Azure Pipelines, GitHub Actions, GitLab CI, Ansible, etc.) effectively force users to write substantial Bash or CLI invocations inside YAML, which makes linting, testing, and reuse hard.
  • Some say this is a platform design problem, not a YAML problem; YAML was meant as data, not as a script host.
  • JSON5, HOCON, KDL, HJSON, protobuf-with-JSON, and gron are mentioned as alternatives that balance human-editability and machine-friendliness.

Are configuration files user interfaces?

  • One side: config files are data; the text editor is the UI. Calling the data itself a “UI” is seen as confused branding.
  • Counterpoint: if writing that data is how a user controls the app, then the file is functionally part of the user interface (even if mediated by an editor).

KSON: interest and criticism

  • Positives:
    • Superset of JSON with YAML-like readability and comments; embeddable blocks for code (SQL, Bash, etc.) with syntax highlighting; automatic formatting and tooling; explicit “end dot” to disambiguate nesting.
    • Aims to be a drop‑in replacement where JSON/YAML act as human-edited interfaces (e.g., Kubernetes manifests, CI configs).
  • Negatives:
    • Syntax perceived by several as ugly or unintuitive; “two thumbs down” reactions.
    • Non–whitespace-sensitive parsing allows “misleading indentation” that can radically change structure from tiny edits; critics argue any config that “needs” a formatter/linter is unsuitable for ad‑hoc editing.
    • Naming rules force quoting some keys (e.g., with Unicode or symbols), seen as a regression from YAML’s “friendly” bare keys.
    • Concern that embed blocks will further normalize mixing real code into configs.
    • Implementation is currently Kotlin-centric; Rust/Python bindings download prebuilt binaries without hash verification and have limited platform coverage, raising supply-chain worries; formal grammar/spec is not yet fully externalized.

Configuration languages vs plain data

  • Some advocate powerful, constrained configuration languages (Cue, Dhall, Starlark, Jsonnet, Pkl, RCL) to support abstraction, validation, and DRY patterns, often generating JSON/YAML as output.
  • Others prefer simple formats (TOML, INI, JSON/JSON5) with strong schemas and tooling, arguing complexity in config usually reflects underlying design problems.
  • Another camp argues “config as code”: using the host language itself (TypeScript, Zig, Python, Lisps, Emacs Lisp, Lua) for configuration, trading off safety and multi-tenant concerns for full expressiveness, types, refactoring, and IDE support.

Broader design and UX observations

  • Distinction is drawn between configuration formats (for humans) and data formats (for machines); trying to make one serve both roles can degrade both.
  • Large, monolithic, highly complex configs are seen as red flags for architecture and UX; some praise systems (e.g., OpenBSD tools, git rebase -i) that design bespoke, readable syntaxes for specific tasks instead of generic object notation.

American Prairie unlocks another 70k acres in Montana

Property rights and legitimacy of land exclusion

  • Several comments debate classical property theory (Locke, Smith, Rothbard) vs modern U.S. practice.
  • One view: legitimate ownership historically arose from homesteading/development, not from buying raw land just to block others; using private parcels to deny access to huge public areas is seen as anti-capitalist rent‑seeking.
  • Others counter that all property rights are state‑granted privileges backed by force; conquest or regime change can void titles, so “absolute” ownership is illusory.
  • There’s tension between seeing ownership as a moral right vs a contingent legal construct tied to power and the state’s willingness to defend it.

Public land access, enclosure, and corner-crossing

  • Strong support for unlocking public access; blocking roads into public land is called “uniquely evil” by some.
  • Others note the land was only blocking one of a few access roads, not the land itself, and caution against inflammatory journalism.
  • The Wyoming “corner crossing” case is discussed: it currently helps where public and private parcels meet at corners, but doesn’t solve fully landlocked or road‑blocked public parcels.
  • Some argue states should require access easements across blocking parcels or condemn a narrow path if needed.

Conservation, easements, and tax policy

  • Many praise private conservation (like American Prairie) as necessary to preserve biodiversity and habitat.
  • Conservation easements and “undeveloped in perpetuity” designations are discussed:
    • Supporters: they preserve land and can be funded via tax incentives or donations.
    • Critics: they can be abused for massive tax write‑offs via inflated appraisals; also used by wealthy owners to freeze development around their estates and “box out” future generations.
    • One commenter opposes property‑tax exemptions for nonprofits, arguing perpetual lockup of land harms long‑term prosperity.

International comparisons and right to roam

  • Multiple comparisons to the UK, Scotland, and Nordic “right to roam” systems:
    • Pros: codified footpaths and default public access reduce conflicts and prevent lakes/forests from becoming de facto private playgrounds.
    • Cons: UK has concentrated land ownership and little true wilderness; U.S. western public lands are vast by comparison.
  • Liability and prescriptive easements in the U.S. are cited as reasons landowners discourage casual access.

Local economy, ranching, and wildlife

  • A Montana-local perspective notes rising privatization and access loss as wealthy outsiders buy ranch land; this move is celebrated as a rare reversal.
  • Another commenter says nearby residents may oppose such projects, seeing them as a threat to ranching jobs and tax base, and argues large-scale conservation should be accompanied by public compensation or national/state leadership.
  • Bison classification in Montana (livestock vs wildlife) is flagged as a political/legal obstacle to freer roaming herds.

Use vs protection: people in nature

  • Some worry that opening previously unused land to the public could degrade it.
  • Others argue access is crucial: people are more willing to fund and defend conservation when they can experience the land.
  • There’s debate over strict “wilderness” rules (no motors, limited bikes) vs allowing motorized access (4x4s, dirt bikes) without “ruining” wildness.

Language tangent

  • A long subthread debates the phrase “one of the only” (vs “one of the few”), prescriptivism vs descriptivism, and how dictionary definitions evolve, illustrating how minor wording in the article attracted disproportionate attention.

Samsung confirms its smart fridges will start showing you ads

Overall reaction to fridge ads

  • Strongly negative response; many say they will avoid Samsung fridges (and often all Samsung appliances) over this.
  • People question who actually wants a fridge screen at all, even before ads.
  • Some compare this to gas pumps or smart TVs: you pay a lot and still get intrusive ads.

Corporate incentives & how this gets approved

  • Commenters describe internal product meetings where KPIs and short‑term revenue trump user experience.
  • Assertion that decision-makers expect “sticky” users and high switching costs, so backlash is tolerable.
  • Some note Samsung appliances already have a poor reliability/service reputation, so targeting less‑discerning buyers may seem acceptable.

Ad normalization, consumer behavior, and price

  • Several argue people “don’t care enough” about ads: they complain but won’t pay more for ad‑free products.
  • Ads are framed as the default for any screen (TVs, Windows, phones); many see this as a societal surrender.
  • Others say this is only acceptable when clearly discounted/opt‑in; surprise ads after purchase are seen as deceptive.

Privacy, tracking, and data exploitation

  • Widespread concern that internet‑connected appliances will log consumption patterns, images, and behaviors.
  • Fears include data sharing with insurers, food vendors, or ad networks for behavioral targeting and risk pricing.
  • Some worry about devices auto‑connecting to networks or mesh systems (e.g., Sidewalk‑like), making opt‑out harder.

Smart vs “dumb” devices

  • Many deliberately buy “dumb” fridges, dishwashers, ranges, and thermostats, or physically disconnect Wi‑Fi modules.
  • Reports of smart products gaining more intrusive behavior over time via updates (e.g., Echo Show, Samsung washer defaults).

Regulation, legality, and ownership

  • Debate over whether this should be legal, especially when ads are added post‑sale or use customer electricity.
  • Some call for strict regulation of ads, attention, and IoT, arguing advertising is a form of “mind control.”
  • Concerns tie into right‑to‑repair: disabling ad systems could be framed as unsafe or as illegal “tampering.”

Dystopian extrapolations & humor

  • Thread is full of dark jokes: fridges withholding access until ads are watched, toilets fingerprinting users, ad‑blocked beer, etc.
  • These are used to illustrate fears about “everything with a screen” becoming an ad channel and eroding autonomy at home.

Tesla is looking to redesign its door handles following trapped-passenger report

Safety-Critical Design & Engineering Culture

  • Multiple commenters compare Tesla’s electronic handles to past safety disasters (e.g., Therac-25, 737 MAX): software-controlled systems without robust hardware fail-safes.
  • Several argue this is less a one-off mistake and more a reflection of weak safety culture, with “design theater” prioritized over robust engineering.
  • Others note that many automakers copied the trend, suggesting an industry-wide “gimmick” culture, not just one company.

Gimmick vs. Real Benefit

  • Retractable/flush electric handles are widely described as a gimmick with negligible aerodynamic benefit; links are shared showing drag impact is minor.
  • People share anecdotes of failed handles (e.g., zip-ties in the desert, frozen handles in winter) and say simpler mechanical flush handles have existed for decades.
  • Some argue that if manufacturers truly cared about efficiency, they’d focus on wheel/tire choices and major aero surfaces instead of complex door mechanisms.

Usability & Intuitiveness

  • Many passengers report confusion entering/exiting Teslas, often mistaking emergency mechanical releases for normal handles or not even knowing they exist.
  • Commenters reference intuitive design principles: door operation is a deeply learned behavior that should not require a “tutorial” or 5‑minute safety briefing.
  • Public transit is cited as a better model: powered doors plus clearly labeled, obvious manual emergency releases.

Emergency Egress & Incidents

  • Bloomberg/CNN reporting of ~140 complaints and injury cases involving stuck Tesla doors sparks debate: some find the number alarming, others question how significant it is without a baseline for comparison.
  • Commenters detail how rear manual releases used to require lifting mats and hidden panels; newer models reportedly improve this but still add friction.
  • There’s disagreement over specific high-profile drowning cases: whether Tesla’s design played a causal role is viewed as unclear. Several point out that escaping any submerged car is inherently difficult.

Regulation vs. Responsibility

  • Some frame this as a regulatory failure: agencies did not anticipate the need to specify that doors must be obviously and mechanically openable.
  • Others counter that the core problem is engineering culture, and regulation alone can’t anticipate every “stupid implementation.”
  • China’s move toward banning fully retractable handles is cited as evidence regulators can step in after patterns of harm emerge.

Broader Sentiment on Modern Cars

  • A recurring wish: “a normal car that’s electric” – conventional handles, stalks, and controls, without touchscreens and electronic poppers for basic functions.
  • Some owners tolerate poor UX because of very low maintenance costs; others refuse to buy or even ride in such cars over safety and design concerns.

TernFS – An exabyte scale, multi-region distributed filesystem

Small Files & Metadata Scaling

  • TernFS is explicitly not optimized for tiny files; median file size in production is ~2 MB.
  • Storing billions of 1 KB files is possible and safe, but leads to:
    • Poor space efficiency.
    • Potential exhaustion of metadata structures / inode-like limits.
  • Multiple commenters explain that moving from ~trillions to quadrillions of objects makes metadata itself petabyte-scale:
    • Bulk deletion and reindexing become extremely slow and non-local.
    • Cache and scheduler state can no longer fit in RAM; “meta-scheduling” becomes necessary.
    • Worst‑case behavior and tail latency dominate design.
  • General sentiment: designing for tiny files at exabyte scale is possible but requires exotic, complex architectures; avoiding that is a reasonable tradeoff.

Comparison to CephFS and Other Systems

  • TernFS vs CephFS:
    • Ceph uses RADOS for both metadata and data; TernFS uses a specialized metadata DB and a separate block service, tuned for immutable files and low metadata churn.
    • TernFS currently runs a single deployment storing ~600 PB without sub-clustering; claims this is beyond commonly cited Ceph clusters.
    • TernFS sacrifices mutability and POSIX permissions to gain scale and simplicity; CephFS is closer to full POSIX.
    • TernFS emphasizes seamless real-time multi-region replication; commenters say Ceph does not offer that in the same way.
  • Other systems mentioned for context: SeaweedFS (good with small files), Lustre, GPFS, Isilon, 3FS, HRT’s DFS, ZeroFS, CVMFS.
  • Some view Ceph as flexible but heavy, with significant overhead for mutable workloads and high complexity.

Design Choices & Performance

  • TernFS is append-only / immutable at its core, with Reed–Solomon erasure coding and replication.
  • Uses TCP/IP and a Go-based block server relying on sendfile; authors note they can saturate NICs without RDMA, though RDMA could be added later.
  • Consensus uses a custom “Raft-like” implementation (LogsDB); currently no automatic failover, to be enabled after Jepsen-style testing.
  • Metadata operations are sharded; most activity stays within a shard. No ACLs and restricted semantics reduce complexity.
  • Includes a Linux kernel module rather than FUSE; performance difference vs FUSE not quantified but implied to be significant.

Scale, HFT Workload & Data Volume

  • Production deployment reportedly exceeds 500–600 PB for financial research.
  • Explanations for data volume:
    • High-frequency trading data: order book changes can reach ~1M messages/sec per exchange.
    • Thousands of instruments plus derivatives multiply data streams.
    • Need for full historical order book data with fine granularity limits compression options.
  • Some question the social value of spending massive compute and storage on trading; others argue that liquidity provision and tighter spreads are economically valuable.

Distributed Systems, CAP & Correctness

  • Commenters stress difficulty of getting consensus and failure modes right at this scale.
  • CAP tradeoffs highlighted: in a partition, a system must choose consistency or availability; Paxos/Raft do not “evade” CAP, they just define behavior.
  • Suspicion toward distributed systems that don’t clearly state their C vs A choices and request-level consistency knobs.

Licensing, Ecosystem & Broader Reactions

  • Core TernFS code is GPLv2-or-later; protocol definitions and client libraries are Apache 2.0 with LLVM exception to allow proprietary clients and kernel integration.
  • Multiple people praise the decision to open source such a high-value internal system; others note the strategic advantage of owning and deeply understanding your own DFS.
  • Some see TernFS as more like an object store with a filesystem veneer, optimized for a narrow but important workload.
  • Blockchain angle: a few suggest TernFS-like tech could underpin decentralized storage; others counter that immutability/decentralization don’t require blockchain and that blockchain-style metadata would be a performance bottleneck.
  • One commenter laments the focus on huge, ops-heavy DFS designs rather than “human-scale” distributed storage usable by individuals or small teams.

Grief gets an expiration date, just like us

Medicalizing Grief and DSM Criteria

  • Many argue that DSM “prolonged/disordered grief” exists to define when professional help is warranted (e.g., inability to function, self‑destructive behavior), not to pathologize all ongoing sadness.
  • Several commenters think the author would not meet those criteria, noting she works, parents, and maintains life routines.
  • Others stress that even when grief is understandable and expected, it can still justify diagnosis and treatment if it’s severely impairing.
  • There’s concern that laypeople misread DSM language (“disrupting routines”) and feel labeled “broken” when criteria are actually narrower.

Grief, Culture, Religion, and Death-Avoidance

  • Multiple threads say contemporary Western culture is cowardly or avoidant around death: little ritual, few elders, and social pressure to “move on” quickly.
  • Some link this to secularization and individualism: losing religious frameworks and ancestor traditions that normalize death and grief.
  • Others counter that secular people can find deep meaning and handle mortality without religion; they see religion as comfort rather than truth.
  • Debate arises over whether atheism tends toward nihilism or whether both religious and secular worldviews can meaningfully situate death.

Stigma, Over-Pathologizing, and Therapy-Speak

  • Older commenters recall being told to “suck it up” and see less acceptance of therapy in older generations.
  • Others say stigma has flipped for younger people: therapy is normalized, and many casually self‑diagnose with depression, ADHD, OCD, PTSD, etc.
  • Concern: the spread of psychiatric labels into everyday language (“panic attack,” “triggered,” “masking”) can trivialize severe conditions and confuse what’s “normal but hard” vs. what truly needs care.

Diagnosis, Systems, and Practical Utility

  • Several note that formal diagnoses are often needed to access leave, insurance coverage, disability benefits, or accommodations; “medicalizing” can thus be protective.
  • Others warn diagnoses can later be used against people (e.g., safety‑sensitive jobs like pilots) and argue this incentivizes hiding distress.

Personal Grief Narratives and Dreams

  • Many share vivid, long‑lasting grief: decades of missing partners, siblings, parents, or friends, often re-experienced in dreams or reflexive urges to call/text the dead.
  • Common view: grief never fully ends; it changes shape, resurfaces in waves, and can become part of identity.
  • Several emphasize that allowing and accompanying grief—rather than timing or fixing it—is more humane than forcing it into an “expiration date.”

The quality of AI-assisted software depends on unit of work management

Perceived Capability of Coding Agents Today

  • Many see incremental, not revolutionary, gains vs a year ago: agents still reliably do only “intern-level” tasks, often ~50% success even on small changes, with frequent hallucinations and misreads of requirements.
  • A minority report large productivity boosts (5–10x) in well-trodden domains like framework-based web CRUD, but acknowledge close supervision is required.
  • Several compare current tools to “very expensive IntelliSense”: helpful autocomplete and boilerplate generation, but far from autonomous coding.
  • Strong skepticism towards recurring claims that “this new model finally doesn’t suck,” attributed to a hedonic treadmill: users quickly adapt and then notice remaining limits.

Best Uses: Code Review, Exploration, and Tests

  • Broad agreement that LLMs are much stronger at going from code → English than the reverse.
  • Popular uses: code review, explaining unfamiliar codebases, suggesting edge-case tests, exploring APIs/platforms, writing test scaffolding, and sketching prototypes where quality/maintenance don’t matter.
  • Some developers find reviewing AI output mentally draining and ownership-reducing; others find it easier than starting from scratch and like the lack of social friction compared to human code review.

Unit of Work Size and Context Management

  • Consensus that small, well-scoped tasks work best; large “agentic” changes often degrade into confusion, breakages, and escalating fixes.
  • A common pattern: finish one task, then summarize changes into a small text artifact and start a fresh context for the next task, instead of running long multi-step sessions.
  • Users report that tools’ automatic compaction (e.g., after large contexts) often correlates with quality collapse: redoing completed work, misinterpreting the state, or “destroying” working code.

Planning, TDD, and Agents’ Inability to Follow Plans

  • Many describe agents as “ambitious high-schooler/junior dev” level: can write functions, but are poor at reliably executing multi-step plans, running tests, or adhering to TDD without constant correction.
  • Some have invested hundreds to thousands of hours developing bespoke workflows (TDD-heavy, strict supervision, Plan/Act modes) and report good results at scale, but this “AI management” skill itself is substantial overhead.
  • Others argue that if effective use requires that much micromanagement, it’s not a net productivity win for typical day-to-day coding.

User Stories, Architecture, and Units of Delivery

  • Debate over vertical “user story” slices vs horizontal architectural layers as the right unit of work.
  • One camp: vertical, customer-facing slices are crucial to validate business value early and reduce risk.
  • The other: feature-led slicing produces fragile, hard-to-change systems; robust design should be layered and cross-cutting, with features emerging from composed infrastructure.

Overall Strategy

  • A recurring recommendation: don’t spend energy on clever prompting to make agents do everything.
  • Instead, focus on knowing when not to use them, and limit usage to tasks where you can quickly verify correctness or where the value is primarily understanding, not generation.

Teardown of Apple 40W dynamic power adapter with 60W max

Link and access issues

  • Several readers reported the site being down or very slow; others hit Google Safe Browsing warnings.
  • Archive mirrors were shared as workarounds.

What’s technically notable

  • Internals show a very dense GaN-based design, with a thermistor used to dynamically adjust power output based on temperature.
  • Supports USB PD 3.2 SPR AVS (Adjustable Voltage Supply), which some noted is still rare in chargers.

60W peak / 40W sustained behavior

  • Multiple comments referenced tests elsewhere showing ~15–18 minutes at 60W before stepping down to 40W.
  • Consensus is that temperature is the limiting factor: the adapter boosts briefly for “quick top‑ups,” then backs off to avoid overheating the brick and the phone.

Compatibility, AVS vs PPS

  • One camp: any decent 40W+ USB‑PD charger will charge iPhone 17 models at full rated speed; AVS is not required and practical gains are negligible.
  • Another camp speculated AVS might slightly improve efficiency and sustained speeds under specific thermal conditions, though this was challenged with detailed efficiency math.
  • Debate on Apple’s choice of AVS but not PPS (Programmable Power Supply): some see it as ecosystem lock‑in; others point out AVS is a USB‑IF standard and just “along for the ride” with new PD revisions.

Comparisons to other chargers and form factors

  • Many argue there’s nothing uniquely special versus compact GaN options from Anker, Ugreen, SlimQ, Lenovo, etc., especially multi‑port units.
  • Others find it “mildly interesting” as a very packed single‑port design and expect similar folding‑pin UK/EU variants.
  • Complaints that EU/UK plug geometry often negates compactness gains seen with US plugs.

Safety, heat, and quality

  • Concerns about very cheap high‑power AliExpress chargers: questions over UL/CE compliance, fusing, and fire risk; others claim newer Chinese designs often include basic protection.
  • Discussion of how hot small GaN bricks can legally get; thermal cutoffs and “toasty but not too hot” measurements were referenced.
  • Reminders that hotels’ built‑in USB ports are usually very low power.

Charging behavior, battery health, and user preferences

  • Multiple users intentionally avoid fast charging, preferring slow (5–10W) or wireless to reduce stress and heat, though others note wireless often increases heat.
  • General technical view: device, not charger, controls current; modern phones manage battery temperature and SoC intelligently (80% limits, “optimized charging,” fast‑charge toggles).
  • Several argue fast charging within manufacturer limits causes minimal extra degradation compared to keeping batteries at high state of charge for long periods.
  • Some aim to keep phones 5–10 years and therefore obsess over slow charging; others with large managed fleets report batteries rarely being the limiting factor within ~2–3 years.

Repairability and UX odds and ends

  • Praised teardown photography but disappointment that the adapter is glued, making it non‑repairable and future e‑waste.
  • Some admired Apple’s mechanical folding‑pin designs; others complained about disabled pinch‑to‑zoom on the teardown site and shared browser workarounds.
  • Side discussion on integrated in‑wall USB‑C PD outlets as an alternative to wall warts.

KDE is now my favorite desktop

Overall Sentiment & Evolution

  • Many commenters now consider Plasma 5/6 “rock solid” and their preferred desktop after years on GNOME, XFCE, i3, etc.
  • Several long‑time users recall KDE 3.x fondly, view the 4.0 release as a one‑off disaster that damaged reputation, and say the project has since focused on polish and bug‑fixing.
  • Some still report KDE feeling fragile compared to GNOME: random crashes, quirks around upgrades, and bad experiences on certain distros or hardware.

KDE vs GNOME and Other Desktops

  • KDE is praised for:
    • Very high configurability, coherent suite of apps, and “sane defaults” compared to GNOME.
    • Doing out of the box what GNOME typically needs extensions for (dock, clipboard history, tiling-ish features, app indicators).
  • GNOME is often described as:
    • Better looking, more cohesive, more professionally designed, but opinionated, rigid, and reliant on fragile extensions.
  • XFCE, LXQt, MATE, tiling WMs (i3, Sway, Hyprland, niri) attract users who want minimalism or no “DE bloat”; several switched to KDE once Plasma became lighter and better at HiDPI.

Design, UX, and Defaults

  • Strong split on aesthetics:
    • Some say Plasma now looks more consistent and professional than recent macOS/Windows.
    • Others see “programmer art”: inconsistent padding, fonts, and noisy toolbars; Breeze still criticized.
  • KDE’s philosophy of “everything is configurable” delights power users but overwhelms some, who find the sheer number of options anxiety‑inducing.
  • There’s ongoing design work: updated HIG, consistency goal, Kirigami/Qt Quick improvements, and a future “Union” theming system.

Features and Integrated Apps

  • Widely praised components: Dolphin (tabs/splits, KIO), Kate (with LSP), Konsole (powerful but UI-cluttered), Spectacle, Okular, KDE Connect, KIO-audiocd, window rules, Activities.
  • Plasma’s system settings and panel/widget model are appreciated for discoverability and centralization.
  • New efforts mentioned: Plasma Keyboard (on‑screen keyboard), better input story, possible future per‑screen virtual desktops.

Wayland, Performance, and Hardware

  • Many report Plasma 6 on Wayland as stable, fast, and memory‑efficient, sometimes rivaling XFCE, especially after targeted optimization work.
  • Others still hit rough edges: multi‑monitor layout bugs, focus glitches, compositor regressions, and app freezes (e.g., SSHFS, Exposé‑style overview).
  • Fractional scaling, HiDPI, and HDR support are frequently cited as areas where KDE now excels.
  • Steam Deck and Asahi Linux users highlight KDE as a surprisingly polished default; some want Valve to track newer Plasma more closely.

Packaging, Distros, and Release Model

  • Fedora KDE, Arch, Debian, openSUSE, and Void are cited as good KDE hosts; there’s new interest in the official KDE Linux distro.
  • Plasma 5 had LTS releases; Plasma 6 dropped LTS due to low distro adoption, though a future reintroduction is under discussion.

You Had No Taste Before AI

What “Taste” Means (and Whether the Article Gets It Right)

  • Several argue the author conflates “taste” with craftsmanship, standards, and conscientiousness (proofreading, self-review, quality control).
  • Some suggest better terms: tact, class, or professionalism; others defend a narrower definition of taste as autonomous, critical judgment vs mindless copying.
  • A recurring point: you can have “taste” even if the majority thinks your taste is bad; it’s about thinking for yourself, not about being popular.

AI Value: Surface-Level Help vs Deep Understanding

  • One camp: AI is transformative for everyday, “surface” questions (shopping, DIY, translation, boilerplate emails, CLI flags). They see it as a faster interface to common knowledge.
  • Another camp: in deep domains (e.g., corporate finance, complex coding), AI regurgitates shallow patterns, can’t generalize or apply concepts well, and promotes “vibe coding” without real learning.
  • People note AI removes old heuristics like “good English = serious effort” or “code compiles = someone thought it through,” making taste and bullshit-detection more important.

Taste, Profit, and Capitalism

  • One thread claims maximizing profit is inherently tasteless and drives dark patterns, invasive advertising, and homogenized, lowest-common-denominator products.
  • Others push back: profit can simply signal that people value something; many beautiful artifacts were funded by surplus profit. Problem is unchecked greed, not profit itself.
  • Debate over advertising:
    • Some see it as necessary discovery and sometimes genuinely useful.
    • Others equate “paid promotion” with lying and manipulation, especially with tracking and microtargeting.
    • Accessibility and “late-stage capitalism” rhetoric are questioned as overused or vague.

Subjective vs Objective Taste

  • One side insists taste/beauty is largely social and time-bound (fashions, body ideals, design trends); taste = peer pressure and status.
  • Others argue there are timeless, objective elements (craft, coherence, proportion), and that experts can distinguish “taste” from mere fashion.
  • Discussion touches on “tastemakers” vs “tastetakers”: few people can or should be tasteful about everything; most rationally rely on experts/influencers in many domains.

AI, Homogenization, and Quality in Practice

  • Several note the world was already conformist and filled with clichés; AI mostly accelerates existing mediocrity (“bad taste, just faster”).
  • Complaints that some coworkers over-trust AI, dumping long, unedited AI documents or code for others to clean up, are framed as both laziness and lack of taste.
  • Others report a double standard: teams suddenly impose strict style, linting, and coverage requirements on AI-generated code that human-written repos never met.
  • Some worry future generations may internalize “AI smell” as what good writing looks like, shifting norms of taste.

Reception of the Article Itself

  • Many find the piece clickbaity, shallow, or self-contradictory, especially the premise of an “influx” of people preaching about taste in AI, which commenters say they rarely see.
  • Others find it insightful in highlighting how generative tools expose underlying lack of judgment: when curation is on you, tastelessness becomes more obvious.

Nvidia buys $5B in Intel

Deal structure and scale

  • Nvidia is investing $5B for ~5% of Intel’s common stock, becoming a top shareholder alongside the US government (whose stake is largely non‑voting).
  • The stake is small relative to Nvidia’s market cap but large in voting terms; some call it a “corporate engagement ring,” not a merger.
  • Unclear whether Intel is issuing new shares vs using treasury stock; commenters argue over dilution “theft” vs necessary capital raising.

Strategic motives

  • Many see it as primarily about:
    • Custom x86 data‑center CPUs tightly coupled with Nvidia GPUs and NVLink.
    • Getting access to Intel Foundry as a hedge against over‑reliance on TSMC and geopolitical risk.
    • Joint x86 SoCs with RTX chiplets for PCs, echoing past Intel–AMD “Kaby Lake‑G” hybrids.
  • Others think it’s partly political: shoring up a strategically vital US fab, validating earlier government equity injections, and easing antitrust pressure on Nvidia. Whether the government “forced” the investment is widely debated and remains unclear.

Impact on competition, GPUs and AI

  • Major worry: this becomes “shut‑up money” to neuter Intel Arc and Gaudi:
    • Arc is the only third player visibly improving in consumer GPUs (price/GB of VRAM, FP64, open stack, SR‑IOV).
    • If Intel slows or cancels dGPUs, the market reverts to a de facto Nvidia–AMD duopoly, with AMD seen as a weak or reluctant competitor, especially on features and VRAM.
  • Others counter:
    • 5% doesn’t give Nvidia direct control, and Intel still needs a GPU story for AI chiplets and yield management.
    • The real game is datacenter AI, where Nvidia faces competition from AMD, hyperscaler ASICs, and Chinese vendors; consumer GPUs are now “a rounding error.”

Intel’s condition and fabs

  • Split views:
    • “Circling the drain”: culture problems, layoffs, failed side bets, need for state support, lagging foundry tech.
    • “Recovering”: increasingly competitive CPUs, iGPUs and Arc dGPUs; Battlemage cited as closing the gap.
  • Broad agreement that Intel cannot fund leading‑edge nodes alone and needs anchor customers; Nvidia’s business could help break the chicken‑and‑egg for Intel Foundry.

Linux, openness and developers

  • Strong concern among Linux users:
    • Intel’s open drivers, decent FP64 and SR‑IOV are valued; Nvidia is remembered for closed, fragile drivers and slow Wayland support.
    • Fear that an Intel–Nvidia axis will cement proprietary CUDA/NVLink and weaken open alternatives (ROCm, oneAPI, Vulkan, RISC‑V, etc.).
  • Others note Nvidia has begun contributing an in‑kernel Rust driver and that AMD still offers a fully open stack, but ROCm is criticized as immature.

Politics and corporatism

  • Thread repeatedly touches on:
    • The state directly owning Intel equity, directing industrial policy, and “picking winners”.
    • Analogies to earlier bailouts and to Microsoft’s 1990s Apple investment as antitrust cover.
  • Some view the deal as the opening move in a state‑orchestrated “AI war economy”; others see that as speculative and overstated.

Scream cipher

What counts as a “cipher”? (cipher vs encoding)

  • Several comments debate whether SCREAM is truly a cipher or just an encoding, comparing it to ROT13 and base64.
  • One side: classical definition of a substitution cipher says the “key” is the character-mapping table; by that standard ROT13 and SCREAM qualify as ciphers (albeit very weak ones).
  • Other side: since the mapping is fixed and hard-coded, with no secret input, these are better described as encodings, similar to base64.
  • Some note that terminology depends on historical vs modern cryptography usage, and on intent (obfuscation vs secrecy).

ROT13, Caesar, and monoalphabetic substitution

  • Commenters liken SCREAM to Caesar/shift ciphers and ROT13; all are monoalphabetic substitution with essentially no real security.
  • There’s playful talk about “post-quantum” ROT13/SCREAM and the silliness of relying on such schemes.
  • A side thread jokes about the “security” of applying ROT13 multiple or fractional times.

Unicode, Zalgo, and data density hacks

  • Multiple comments explore using Unicode combining marks:
    • “Zalgo” text as a way to pack more info into a single grapheme cluster.
    • A linked “zalgo256” scheme encodes bytes as stacks of combining marks on top of “A”, similar in spirit to SCREAM but more data-dense.
    • Discussion of grapheme cluster limits and HN’s filtering of disruptive combining characters.
  • Others mention using invisible Unicode characters to hide metadata in messages, or using emojis for similar low-stakes steganography (with jokes about emoji’s byte overhead).

Implementations, tricks, and language features

  • Various short implementations are shared (Python, JS, Racket), including:
    • Using str.maketrans/translate to avoid manual cipher loops.
    • A JS one-liner mapping scream/unscream via index XOR.
    • Racket code demonstrating hiding base64 text using invisible characters, plus discussion of threading macros and set vs dict comprehensions in Python.

XKCD and cultural references

  • Multiple commenters connect SCREAM to a recent XKCD comic and note tool support for the “XKCD scream cipher”.
  • There’s general humor: Serious Sam “scream” language, “sand people” talk, ghosts wanting an O-variant, and fears of accidentally summoning eldritch beings.

AI and cracking SCREAM

  • Some experiment with ChatGPT decoding SCREAM as a generic monoalphabetic substitution cipher.
  • Results are mixed: it can get close but makes notable errors without further guidance.

40k-Year-Old Symbols in Caves Worldwide May Be the Earliest Written Language

Scope of the Claim vs. Evidence

  • Many commenters argue the article (and headline) overstates the case by calling the marks “earliest written language.”
  • The core empirical work is seen as: cataloging thousands of recurring abstract signs across hundreds of Paleolithic sites, not demonstrating a full writing system.
  • Some defend the researcher’s seriousness (large database, peer-reviewed work) but note that popular presentations and infographics oversell it.

Writing vs. Symbols vs. Notation

  • Repeated distinction:
    • Symbolic art (any meaningful mark),
    • Proto-writing / notation (e.g., tallies, calendars, accounting marks),
    • Writing proper (systematic mapping from marks to elements of language, with grammar and large symbol inventory).
  • Linguists in the thread stress that known languages need far more distinct units (phonemes, syllables, words) than the small set of cave signs, and that long, coherent symbol sequences from one time/author are lacking.
  • Examples like cuneiform and Egyptian are used to illustrate a trajectory from pictograms and numbers → proto-writing → fully phonetic, grammatical writing.
  • Several participants suggest these cave signs are at best notation (e.g., tallies, calendars, clan marks), not language encoding.

Alternative Explanations for Recurring Signs

  • Simple-shape convergence: crosses, lines, spirals, hand stencils, etc., are what children or anyone with a stick and sand will independently produce.
  • Cultural continuity: deep, place-bound traditions (e.g., long-used rock art sites) show that symbols can be passed down for millennia without implying global contact.
  • Entoptic / phosphene hypothesis: some argue many motifs reflect internal visual phenomena (neural/retinal patterns in trance, darkness, or altered states), a position supported by a substantial specialist literature; others find this overconfident or non-falsifiable.
  • Fringe ideas (global plasma aurora, lost worldwide civilization, “Protong” ur-language) are raised by a few and strongly rejected by others as classic spurious-correlation or pseudo-science.

Definitions, Semantics, and Hype

  • Several comments criticize the article for blurring “language,” “writing,” “emoji,” and “graphic communication,” seeing this as a definitional sleight of hand to claim a record.
  • Others propose broader definitions (any intentional symbolic communication = “writing”), but this is not how linguists or archaeologists usually use the term.
  • Overall sentiment: recurring cave symbols are important evidence of very early, complex symbolic cognition—but calling them a “written language” is regarded as misleading.

Pnpm has a new setting to stave off supply chain attacks

Effectiveness of delayed dependency updates

  • New minimumReleaseAge in pnpm is seen as a useful “soak period” so security scanners/researchers can catch malicious uploads before most users upgrade.
  • Some argue a universal delay might also slow rollout of fixes and simply shift the attack window, not remove it.
  • Others counter that recent npm attacks were detected within hours by researchers and security companies, so a days-long delay would have prevented many compromises.
  • There’s debate whether “everyone waiting” delays detection; several point out that canary users and automated scanners still install and analyze new releases immediately.

How supply-chain attacks are detected today

  • Disagreement over how effective automated scanners are: some say app‑sec companies constantly scan npm and have caught many attacks; others stress that humans typically notice issues first and tools only assist.
  • Consensus that malware detection is fundamentally hard; scanners mostly find obvious patterns, not arbitrary malicious logic.

npm, lockfiles, and update behavior

  • Confusion over whether npm install respects package-lock.json. Current behavior: it installs from the lockfile if lock and package.json are in sync; otherwise it updates the lockfile.
  • Many recommend npm ci in CI for deterministic builds and to avoid silent lockfile churn.
  • Lockfiles already store content hashes, but semver ranges in transitive dependencies still allow new versions to be pulled in when the lockfile is regenerated.

Ecosystem update culture and risk

  • JS and similar ecosystems rely heavily on semver and frequent updates; tools like Dependabot/Renovate encourage rapid patch/minor upgrades.
  • Some prefer aggressive auto‑updates for security; others advocate very slow, deliberate updates (months) and pinning everything.
  • There’s recognition that never updating creates large “dependency debt,” making future upgrades painful and sometimes blocking security fixes.

Alternative or complementary defenses

  • Proposals include:
    • Registry‑side or third‑party “delayed” registries and commercial delay policies.
    • Permission systems for packages (restricting network/file access, especially for install scripts).
    • Stronger use of hashes / provenance, or even hash‑based resolution.
    • Web‑of‑trust audit/review systems.
    • AI‑assisted code analysis, though many are skeptical it’s a silver bullet.

Implementation details & ecosystem adoption

  • Some complain the pnpm setting lacks explicit units and should perhaps use ISO‑8601 durations; others find that format ugly.
  • Questions about configuring it globally vs workspace files, and why it isn’t in package.json.
  • Similar features are appearing in other tools (uv, Yarn, potential Bun support, commercial proxies), suggesting a broader trend toward delayed/controlled upgrades.

Why, as a responsible adult, SimCity 2000 hits differently

Game Mechanics & the “Simulator Effect”

  • Several comments dissect SimCity 2000’s underlying simulation as shallow but cleverly presented.
  • The “Simulator Effect” is referenced: players project far more depth and realism onto the model than actually exists, filling gaps with imagination.
  • This is framed as an intentional design strategy: optimize for a coherent mental model and fun, not accurate urban simulation or politics.

Transport, Water, and Other System Flaws

  • Traffic is described as fundamentally “broken”: trips choose random junction exits and time out easily, making realistic road grids and hub‑and‑spoke transit nonviable.
  • Optimal play often means highly artificial, junction‑free point‑to‑point networks, or even disconnected cities that still satisfy demand.
  • Debate over water: some claim pipes are mostly cosmetic; others cite tests suggesting water significantly raises land value and affects development.
  • Comparisons are made to later games/mods (SimCity 3000/4, NAM, Cities: Skylines) and to Transport Tycoon for more robust transport logic.

Nostalgia, Aging, and Morality in Play

  • Some readers resonate with revisiting SimCity as adults: priorities shift from maximizing density to creating pleasant, “leafy” suburbs.
  • Others reject over‑seriousness: SimCity is praised as a sandbox whose charm is precisely its illusory realism.
  • A few extrapolate to future games where NPCs might be self‑aware agents, raising ethical questions about “playing god.”

Cars, Transit, Density, and Children

  • A huge subthread uses SimCity as a springboard into real‑world urbanism.
  • One camp: having kids makes car dependence understandable; dense cities and transit are seen as stressful or “child‑hostile,” especially with strollers.
  • Counter‑camp: cites experiences in New York, the Netherlands, Germany, Japan, etc., arguing dense, low‑car cities are excellent for kids’ freedom, safety, and activities; cargo bikes feature heavily.
  • Intense disagreement over whether density lowers fertility, whether suburbs are economically subsidized by cities, and how fairly externalities of car use are priced.
  • Many emphasize that American “cars or nothing” is a policy choice: zoning, subsidies, and infrastructure design, not geography alone.

UI, Versions, and Alternatives

  • The clunky SC2K UI is recalled fondly; hidden long‑press menus were confusing but compact.
  • People discuss GOG’s DOS version, SimCity 4, Theotown, and other city‑builders, plus classics like SimTower, as spiritual relatives with differing realism/complexity trade‑offs.

Show HN: The text disappears when you screenshot it

How the effect works (and implementation details)

  • Text is visible only in motion: animated noise scrolls through text-shaped cutouts over static or differently-behaving background noise.
  • Several comments note the claim “each frame is random noise” is not literally true in the demo: the pattern within letters visibly cycles / repeats, likely via a periodic function or buffer.
  • Others point out it could be implemented with true per-frame random noise (like TV static) and still be readable as long as background is fixed.
  • Alternative implementation ideas: shifting a noise buffer down each frame; re-randomizing letter pixels every frame; moving background vs. foreground in opposing directions.

Browser, zoom, and rendering quirks

  • Multiple users report that zooming out (sometimes to ~25–65%) makes the text clearly readable and screenshots trivial.
  • On some platforms (certain macOS/Chromium, Firefox/Android, Linux browsers with privacy / canvas protections), the animation fails or the background and text noise differ enough that text is visible even in static screenshots.
  • Aliasing and luminance differences at certain zoom levels can unintentionally reveal the letters.

Ways to defeat “unscreenshottable” text

  • Take two or more screenshots and:
    • XOR / difference / blend them in an editor (GIMP, Pixelmator, ImageMagick compare), or
    • Stack them with partial transparency, or
    • Blink between them in browser tabs (manual “blink comparator”).
  • Record the screen instead of capturing a still; video preserves motion and reveals text.
  • Use the URL query string which contains the text in plain form.
  • Some users feed multiple frames to models or code interpreters to reconstruct the text.

Cameras, long exposure, and physical capture

  • Long-exposure photography of the screen (e.g., 0.5s shutter) produces readable motion-blurred text on a noisy background.
  • Even normal photos might be processable afterward to enhance the hidden text.

Applications, security, and ethics

  • Suggested uses: “LLM-proof” or motion-based CAPTCHAs; friction against screenshot leaks; ID apps that hide sensitive fields from still captures; stylistic effect in games or technothrillers.
  • Counterpoints: trivial to bypass with video, multiple screenshots, or AI; adds friction but not real security.
  • Strong criticism for accessibility (low contrast, motion dependence, motion sickness, epilepsy triggers) and for making already-hostile CAPTCHAs worse.
  • Some debate over user rights/ethics: attempts to block capture of on-screen content are seen by some as “annoying” or contrary to user ownership expectations.

Slack has raised our charges by $195k per year

Slack price hike to Hack Club: what happened

  • Hack Club, a teen coding nonprofit, had a long‑running, heavily discounted Slack arrangement: originally a free nonprofit plan, then a special ~$5k/year contract despite very large user counts (tens of thousands of teens plus staff/volunteers).
  • This year Slack/Salesforce reinterpreted billing to count every community member as a billable seat, producing a ~$200k/year price and a demand for $50k within about a week, with threat of deactivation and loss of 11 years of history.
  • Hack Club staff say they were told to ignore earlier shocking invoices and reassured pricing would be addressed, then abruptly got the ultimatum. Some commenters speculate internal Salesforce processes or automation “lost” the special deal.

Reactions to Slack/Salesforce behavior

  • Many see this as classic “enshittification”: bait with generous terms, lock organizations in, then extract maximum revenue once switching is hard.
  • Several compare Salesforce to Oracle/CA/Broadcom: focus on enterprise rent extraction over goodwill, even at brand cost.
  • Others argue Slack is entitled to charge market rates; the real outrage is the 40× jump plus days‑long deadline and data‑deletion threat.

Vendor lock‑in, data control, and regulation

  • Strong emphasis that hosted chat is effectively ransomware if export is constrained.
  • People note Slack’s limited, gated exports (especially for DMs/private channels) and recent API rate limits and marketplace bans on archiving apps.
  • Some call for laws mandating data export and portability; others insist organizations should have enforced this in contracts or built their own continuous backups.

Alternatives: self‑hosting and open source

  • Large support for moving to self‑hosted tools: Mattermost (Hack Club’s choice), Zulip, Matrix/Element, IRC+web frontends, Rocket.Chat, Campfire, or even classic forums (Discourse/Flarum).
  • Debate over each:
    • Mattermost: AGPL, self‑hostable, but “open‑core” drift and user‑count nags; some forks remove limits.
    • Zulip: praised threading model, fully open source, good self‑hosting, but earlier mobile clients were weak (new Flutter app now).
    • Matrix: protocol‑level openness and federation vs. operational and UX complexity.
    • Discord: great UX and free now, but seen as another proprietary trap.

Broader lessons

  • Many treat this as a teachable moment: don’t build core community or institutional knowledge on proprietary SaaS without an exit plan.
  • Others stress that executives often choose SaaS for “standardization” and perceived modernity, even when self‑hosted tools are cheaper and better.
  • Several note the specific harm: thousands of teens losing community continuity and seeing, early, how large platforms can turn hostile.