Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 221 of 356

Starlink is currently experiencing a service outage

Scope and user reports

  • Many users across regions (US, Europe, Afghanistan, etc.) report total loss of service around the same time, interpreted as a global or near‑global outage.
  • Common symptoms: terminals unable to find satellites, orange modem lights, dishes pointing in unusual directions, and app showing “heating” or “software update” stuck partway.
  • Some users saw unexpected public IP changes or router factory resets shortly before the outage.

Reliability and dependence

  • Long‑time users say major outages have become rare; some recall the last large coordinated outage in May 2024.
  • Several comments highlight how critical Starlink is for rural homes, cabins, and frontline use (e.g., Ukraine), with some maintaining backup WISP/cellular links.
  • Despite the outage, many describe Starlink as “spectacular” and more reliable than previous rural options.

Theories and technical analysis

  • Strong consensus that the root cause is likely software/configuration, not hardware:
    • Bad config rollout, DNS/BGP or other control‑plane change, or core service discovery failure (analogies to Facebook/Roblox incidents).
    • Centralized control plane for the constellation as a single point of failure.
  • Network observations:
    • Cloudflare Radar shows a sharp traffic drop for Starlink’s AS with no BGP withdrawal.
    • Some argue that total loss of signal suggests more than simple routing issues, perhaps affecting satellite–terminal association or control services.
  • Multiple users report terminals downloading and installing updates and rebooting as service recovers, consistent with a pushed fix.

Security and geopolitics debate

  • Speculation ranges from Russian cyberattacks to space nukes/EMP and hybrid warfare, often tied to Starlink’s role in Ukraine and concurrent UK telecom outages.
  • Others push back, calling this evidence‑free geopolitics and pointing to a confirmed statement (quoted from news) that “failure of key internal software services that operate the core network” caused the outage.
  • Some discuss how hard it would be to physically destroy the constellation vs. more plausible software, insider, or cyber routes.

Infrastructure / status-page lessons

  • starlink.com itself showed “no healthy upstream” and partially failed, likely from both core-network issues and traffic spikes.
  • Discussion emphasizes hosting status pages on independent, highly scalable infrastructure and not tying them to the same control plane as production.

Air Force unit suspends use of Sig Sauer pistol after shooting death of airman

Debate: Carrying with a Round Chambered

  • Many commenters argue that if you’re going to carry at all (civilian or military), the firearm should be ready to fire, i.e. chambered. Racking the slide under attack adds ~0.5–2 seconds plus extra complexity, which can be decisive in close, fast encounters.
  • Others prefer an empty chamber for perceived safety, or won’t carry at all if chambered—especially with appendix carry or around family—accepting reduced responsiveness.
  • Several note that in ambiguous “sketchy” situations you can’t legally rack or draw without risking a brandishing/menacing charge; the gun is meant for the rare, clearly lethal scenario, not general intimidation.

Legal and Tactical Context

  • Brandishing and self‑defense law is described as complex, varying by state (duty to retreat vs stand‑your‑ground, differing treatment of “threat of force” vs firing).
  • Some see “only draw if you’re ready to shoot” as standard doctrine; others point out real cases where drawing alone ended the threat and they’d accept a brandishing charge over killing someone.

P320 Design Concerns and Evidence

  • Thread distinguishes two issues: early drop‑fire defect (partially addressed via voluntary “upgrade” to the fire control unit) and newer claims of “uncommanded discharge” from holster, without trigger contact.
  • A recently FOIA’d FBI report on an M18 incident, plus multiple videos, are cited as strong evidence that safeties can fail and the gun can fire in a proper holster, even post‑upgrade.
  • A minority argue many incidents can still be explained by something snagging the trigger and that this may be social amplification; others counter that documented forensic cases and tolerance‑stacking analyses make a genuine design/manufacturing defect highly likely.

Sig’s Response and Reputation

  • Sig is widely criticized for denial, framing critics as irresponsible or politically motivated, and offering a “voluntary upgrade” instead of a recall.
  • Some say they will no longer buy Sigs (or only older models); others continue to trust models like the P365 while treating the P320 as unsafe or a “paperweight.”

Safeties, Holsters, and Modern Handgun Design

  • Modern defensive doctrine often treats a rigid holster that fully covers the trigger as “the real safety,” with multiple internal drop/striker safeties expected to prevent any discharge without a trigger pull.
  • Manual thumb safeties are controversial: they can block inadvertent trigger pulls but also fail under stress or when not in muscle memory. The P320’s military safety is criticized as merely a trigger block, not a redundant striker block.

Military/LE and Nuclear Context

  • Commenters note these guns are used by USAF Security Forces guarding nuclear assets and by school resource officers; carrying a mechanically suspect pistol in such roles is viewed as unacceptable.
  • Some highlight that even on secure bases, the military itself sharply limits personal carry, which they see as an implicit critique of the net‑safety value of widespread armed carry.

Training, Stress, and Realistic Use

  • Multiple firsthand accounts from live‑fire classes and simulators emphasize how fast real violence unfolds, how badly fine motor skills degrade, and how unrealistic many “I’ll just rack then shoot” or “I’ll out‑draw him” fantasies are.
  • Others stress that accidents, negligent discharges, and mis‑ID of threats are also real risks, especially for poorly trained carriers; some conclude “don’t carry” is safer for most people.

Meta: Corporate Liability and HN Culture

  • Some frame this as a textbook case of corporate incentives to deny defects (parallels drawn to other industries) and to lobby for legal shields (e.g., New Hampshire law limiting suits over missing safeties).
  • The thread notes, with some surprise, how many technically minded HN readers are deep into firearms, both as engineering objects and as tools embedded in legal and societal trade‑offs.

Windsurf employee #2: I was given a payout of only 1% what my shares where worth

What happened in the Windsurf / Google / Cognition saga (as discussed)

  • Many commenters find the tweet itself extremely unclear:
    • Was forfeiting vested equity conditional on joining Google, or mandatory regardless?
    • Was the “1%” payout contingent on taking the offer, or the consolation prize for not taking it?
  • Reconstructed narrative from the thread (still partly ambiguous):
    • Google poached key Windsurf employees and licensed the tech, paying very large amounts to founders, executives, and investors.
    • Rank‑and‑file employees were reportedly given “exploding” offers: join Google and give up Windsurf equity at a very low effective valuation, or stay with a now‑gutted company.
    • Windsurf, with most value stripped out, was later acquired by Cognition for a much lower price; remaining employees came along with little equity value left.
  • Several commenters question how this isn’t a breach of fiduciary duty to common shareholders, but others note that preferred stock, liquidation preferences, and deal structuring often make this legally defensible even if ethically dubious.

How startup equity actually screws employees

  • Detailed explanations of:
    • Options vs RSUs; vesting vs exercising; 90‑day exercise windows; AMT/tax risks.
    • Liquidation waterfalls: debt → preferred with 1–5x prefs → participating preferred → common last.
    • Dilution, recapitalizations, and “preference cliffs” where employees get close to nothing even on big‑headline exits.
  • New pattern noted: big tech “buys” the people and IP directly, leaving the corporate shell to be sold later, with VCs and founders paid but common shareholders gutted.

Is joining a startup still financially rational?

  • Many argue: for non‑founders, it was always a bad EV bet, and is worse now (higher FAANG comp, fewer liquidity events, more sophisticated ways to zero out employee equity).
  • Others say 2010s startups were a real, if risky, lottery; today the upside is being “hollowed out” by investors and executives.
  • Some push back: good startups still exist, sometimes pay solid salaries, and successful exits can be life‑changing—but these are rare and heavily founder‑dependent.

Impact on trust and the startup ecosystem

  • Strong sentiment that cases like Windsurf (and similar recent deals) break the social contract: employees trade lower cash and higher risk for upside that can now be structurally removed.
  • Fear this will poison the early‑employee talent pipeline; people will either insist on big‑co jobs or founding their own companies.

Advice to engineers in the thread

  • Treat private‑company equity as a lottery ticket, often worth ≈$0 for planning.
  • Maximize cash compensation; assume you are financing founders and VCs otherwise.
  • If you do care about upside, deeply evaluate founder integrity and insist on transparency: cap table, 409A, liquidation prefs, total shares outstanding.
  • Consider startups for learning, autonomy, or mission—not as your primary retirement plan.

The great AI delusion is falling apart

Individual productivity vs personal incentives

  • Many argue there’s little personal benefit to being more productive with AI if pay and time off stay the same; faster workers just get more tasks, not more reward.
  • Others say the “reward” is job security when peers are less productive, but this is seen by some as a poor consolation.
  • Some claim to use AI to dramatically increase throughput (more commits, more releases, multi-backend migrations) and are unbothered by systemic issues; others question whether those metrics reflect true value or quality.

Perceived vs actual productivity (METR study)

  • The METR RCT showing developers felt ~20% faster with AI but were ~19% slower is heavily debated.
  • One camp sees it as overdue counterweight to hype and proof that self‑reported productivity is unreliable.
  • Critics note small sample size, unfamiliarity with tools, and argue it mainly shows how hard it is to measure software productivity.
  • A key concern: developers are poor judges of whether AI use is speeding them up, so “it feels faster” isn’t evidence.

Experiences with AI coding tools

  • Positive reports: building complex systems one wouldn’t attempt otherwise; faster boilerplate and mundane tasks; reduced cognitive load even if wall-clock speed is unclear.
  • Negative reports: frequent low‑quality suggestions, extra time validating/fixing output, atrophy fears, and a “slot machine” effect where occasional wins mask overall slowdown.
  • Some think modest, task‑specific gains (autocomplete++ for simple work) are undeniable; large, general productivity leaps are disputed.

Interviews, skills, and tool use

  • Multiple commenters now allow LLMs in coding interviews and observe candidates hurting themselves: fumbling with tools, pasting bad code, failing to reason about it.
  • These interviews are used to distinguish people who can truly code and critically evaluate AI output from those who can only prompt and copy‑paste.
  • Consensus: even if AI is “the future”, humans still need deep understanding to review, debug, and adapt generated code.

Economic, societal, and hype dynamics

  • Some see AI as underhyped, akin to a tectonic shift; others compare its hype cycle to Segways, NFTs, or overblown “web3” claims.
  • Concerns include: capital misallocation and potential economic shocks; noise and “AI slop” (spam emails, bogus legal threats, resumes) degrading everyone’s productivity; environmental and labor impacts.
  • There’s tension between workers who logically fear job‑threatening productivity gains and those who view AI as analogous to open source: expanding what’s possible and ultimately increasing demand for software work.

Two narratives about AI

Developer productivity & evidence

  • Several comments debate a recent study on LLM-assisted coding (246 tasks on mature codebases) that found experienced devs believed they were faster but were ~19% slower with AI.
  • Critics argue the study used older models, gave participants little time to learn tools, and didn’t “ground” LLMs with project docs; supporters say it’s still the best empirical data so far and at least shows self-assessment is unreliable.
  • Others report longer-term rollouts (e.g., Copilot over 6–8 months) where productivity was flat or slightly worse at first, then improved sharply as devs learned how to use the tools.

Where AI helps vs fails in coding

  • Many see strong gains for:
    • Boilerplate, glue code, tests, small greenfield projects.
    • Common stacks with huge corpora (JS/TS, Python, Java).
    • “First pass” code review: catching nits, missed renames, doc/test inconsistencies.
  • Weak or negative results are reported for:
    • Large, complex, legacy codebases with lots of hidden constraints.
    • Systems programming, niche languages/DSLs, and critical/firmware work.
  • Several note huge variance: same tool alternates between brilliant and useless; results hinge on written instructions, test-first workflows, and how much context it can see.

Error shifting & long‑term code quality

  • A recurring framing: the industry tries to push errors “left” (into types, review, tests); LLMs risk pushing them “right” (into production) if used as probabilistic code generators without deep human understanding.
  • Others counter that AI can also support shifting left (e.g., by making safer languages like Rust more accessible, or by automating low-level checks and refactors) if kept inside existing guardrails.

Jobs, identity & economic fear

  • Emotional charge is higher than with crypto because AI touches core professional identity and skills, not just investments.
  • Anxiety focuses on:
    • Devaluation of developer labor and rising expectations (“same pay, more output”).
    • Fewer entry-level/junior roles if “grunt work” is automated.
    • Non-dev roles (customer support, some design/UX, copywriting) being easier to replace.
  • Some argue this is another automation wave people will adapt to; others warn that many will be pushed from “comfortable” to “barely livable” without policy responses.

Narratives, hype and what we actually know

  • One “camp” is CEOs, vendors, and execs loudly predicting near-term replacement of developers; another is practitioners and researchers with far more mixed, context-dependent experiences.
  • Several commenters think calling it “no one knows anything” is itself misleading: we understand a lot about how LLMs work technically, but societal and labor-market impacts remain unclear.
  • A recurring recommendation: ignore extremes, focus on concrete use in your own domain, and treat AI as a powerful but narrow tool—not magic, not useless.

Hulk Hogan Has Died

Emotional reactions & cultural impact

  • Many describe the news as surreal: Hogan was a fixture of 80s–90s childhoods even for people who didn’t follow wrestling.
  • His death, alongside other recent celebrity deaths, is framed as a “tough week” for those who grew up in that era and a reminder of mortality.
  • People recall specific media: WrestleMania vs. Andre the Giant, the Hulk Hogan cartoon, “Thunder in Paradise,” and his ring entrance/“hulking up” routine that still gives some viewers goosebumps.

Health, age, and cause

  • Cardiac problems at 71 are seen as sad but not surprising, especially given known steroid use.
  • One commenter notes his entire spine being fused, expressing relief that prolonged physical pain is now over.

Contested legacy and character

  • Strongly negative views: union‑busting, racism, misogyny, xenophobia, constant lying, sabotaging others’ careers. Some say he “will not be missed.”
  • Others argue he was iconic yet a “terrible human,” and that it’s appropriate to reassess childhood heroes as adults.
  • A counterview holds that judging people by private speech sets “unrealistic” standards; critics reply that repeated private racist speech still reflects character and likely affects behavior.
  • His leaked racist rant is cited as explicitly and profoundly offensive; a minority downplays it as “shitty words” but not disqualifying.
  • Personal anecdotes from people who worked with or met him describe him as warm, unfailingly “on” for fans, and genuinely friendly, while still acknowledging “troubled, old‑fashioned thinking.”

Wrestling career & kayfabe

  • Fans praise his charisma and storytelling: minimal moves but maximum crowd psychology.
  • Others list numerous wrestlers they consider far superior in-ring and as performers; they criticize his no‑selling, backstage politicking, and role in blocking a wrestlers’ union.
  • Several note how wrestling’s blurred line between character and reality mirrors modern politics and media; documentaries and video essays about wrestling’s “unreality” are recommended.

Politics, capitalism, and Gawker

  • His recent “hard right turn” sparks a broad side-debate about conservatism, MAGA, capitalism, and fears of authoritarianism.
  • The Gawker sex-tape lawsuit sharply divides opinion:
    • One camp calls him a tool for a billionaire vendetta that chilled adversarial journalism.
    • Another says Gawker’s invasion of privacy and courtroom defiance justified its destruction and that “nothing of value was lost.”

There is no memory safety without thread safety

Go’s data-race issue in practice

  • Several commenters recount hard-to-debug Go races, including one where a loop counter overflow turned some requests from ~100ms into minutes; race detectors didn’t catch it.
  • Others say they’ve almost never seen this specific “torn read of fat pointers/slices” in production despite large Go deployments.
  • Uber’s study (linked in thread) found 2,000 races across ~50M LoC / ~2,100 services (1 race per 25k LoC), but most did not cause serious outages.
  • Consensus: the bug is real and nasty when it happens, but empirically infrequent; many teams rely on patterns, tooling, and paranoia rather than language guarantees.

What “memory safety” should mean

  • One camp: “memory safety” is binary and means “no UB-style memory corruption in any program written without explicit unsafe,” including in concurrent code. Under that definition Go is not memory safe.
  • Another camp (security-oriented): “memory safety” is a term of art meaning “no practically exploitable memory corruption vulnerabilities”; by that standard Go qualifies until someone shows a convincing RCE in real-world Go.
  • Long subthread on UB vs unspecified behavior; some argue Go’s data-race-induced type confusion clearly violates typical academic/PL definitions of memory safety, even if exploitation is hard.
  • Java, C#, OCaml, Swift ≥6, Rust, etc. are cited as languages whose models ensure races cannot produce invalid pointers or out-of-bounds memory, distinguishing them from Go.

Rust, Go and productivity tradeoffs

  • Go is praised for “easy concurrency” (goroutines, channels) and high productivity for web services and glue code; many SaaS backends accept some correctness risk for speed of delivery.
  • Rust is viewed as excellent for traditional shared-memory concurrency and eliminating data races, but with higher cognitive load (lifetimes, ownership) and rougher async story.
  • Some practitioners claim Rust’s up‑front cost is repaid by far fewer production incidents and lower total cost of ownership; others insist Go (and Python, C# etc.) keep them faster overall, especially once experienced.
  • There’s disagreement over whether Rust’s productivity now matches Go’s in practice; internal Google data is mentioned claiming similar team productivity.

Concurrency models and channels

  • Despite “share memory by communicating,” real Go programs frequently share memory directly. Channels don’t prevent races without a notion of ownership or sendable types.
  • Example given where sending bytes.Buffer.Bytes() over a channel races with Reset() and mutates data being processed; reviewers/tools might catch it, but the language can’t.
  • Some argue channels + discipline are “concurrency 101”; others reply that subtle, indirect sharing in large codebases still routinely slips through reviews.

Security and exploitability debate

  • A published Go data-race based exploit shows type confusion leading to arbitrary code execution, but relies on highly contrived patterns.
  • Security-focused commenters demand an exploit against a non‑toy, real Go service before reclassifying Go as “memory-unsafe” in the security sense.
  • Others counter that once UB exists, conservative engineering must assume worst-case (potential RCE), even if no public exploit exists yet.

Language ecosystems and evolution

  • Swift is in the middle of a painful transition to data‑race freedom; its new concurrency model is seen as safer but complex and tooling-heavy.
  • Zig’s and Pony’s claims about safety are questioned; without a Rust‑like ownership model, concurrency may still be unsound.
  • There’s meta‑discussion that tool and language “politics” skew these debates; many note most real-world bugs stem from higher‑level logic or database concurrency, not just language memory models.

Blender: Beyond Mouse and Keyboard

Touch devices, tablets, and platforms

  • Excitement about a touch‑optimized Blender, especially for sculpting and drawing, given how well pen tablets and devices like Wacom screens already work on Linux and even low‑power hardware.
  • Some want the new touch paradigm on existing x86 2‑in‑1s (Asus Flow, Surface Pro, Yoga) rather than only iPad/Android; they argue these are already powerful Blender machines and better testbeds than a new platform.
  • Question about whether the simplified UI can be enabled on small Linux touchscreens; answer: likely yes, via configuration or compiling with appropriate flags.

iPad, Procreate, and artist workflows

  • Many note Procreate’s dominance among students and professionals: low cost, great Pencil integration, portability, and “digital sketchbook” role.
  • Teachers criticize Procreate for small‑screen ergonomics, limited support for complex workflows (matte painting, compositing), and difficulty integrating student work into desktop pipelines.
  • Consensus: tablets are great for sketching and certain kinds of concept work, but not yet a full replacement for high‑end desktop workflows.

Competing and complementary 3D apps

  • Discussion of Nomad Sculpt, Feather 3D, uMake, Shapereality, etc. View that there’s plenty of room for focused, performant touch‑first 3D tools even if Blender comes to iPad.
  • Suggestions to differentiate by specializing (e.g., CAD/architectural, B‑rep/NURBS, texture painting) rather than chasing Blender parity.
  • Some argue Blender still needs competition despite being open source; others counter that commercial tools like Maya, 3ds Max, Cinema 4D remain dominant in studios, so Blender is still an underdog there.

Modeling paradigms and Blender’s “start with a cube”

  • Several replies stress Blender supports many workflows: sculpting from a high‑poly sphere, box/poly modeling, metaballs, CSG/booleans, NURBS/patches, extrusion from 2D sketches, geometry nodes, scans/photogrammetry.
  • Broader comparison with CAD/parametric tools (SolidWorks, Fusion, Rhino, OpenSCAD) and text/coordinate‑driven modeling; Blender’s Python API highlighted for scripted pipelines.

Beyond mouse and keyboard: VR, 6DoF, BCI

  • Some expected 6DoF or voice/AI control; Blender already supports space‑mouse‑style NDOF devices and has experimental VR scene inspection and third‑party VR modeling add‑ons.
  • Debate on VR modeling: intuitive for beginners but often more fatiguing, less precise, and screen‑limited than traditional setups; better suited for review than production.
  • Brain–computer interfaces seen as far off for noninvasive “thought control”; implants may allow fine motor signals, but high‑level thought decoding is considered distant.

Complexity, accessibility, and UI trade‑offs

  • One camp fears “tabletizing” Blender will force oversimplification, reduce power, and confuse users unless clearly branded as a separate “Blender Lite.”
  • Others respond that the tablet UI will be an optional application template, not a replacement, and aligns with Blender’s mission of accessibility and experimentation.
  • Broader thread on why 3D tools remain extremely complex: many believe the complexity is inherent to high‑control creative work, not just legacy UI; others hope AI, gesture, or speech could eventually enable radically simpler interfaces without losing power.

Use Your Type System

Types as Documentation, Validation, and “First-Line Tests”

  • Many commenters endorse using richer types to document data models, aid refactoring, and “make bad state unrepresentable.”
  • Domain-specific types (IBAN, AccountId, UserId, Money, Percentage, TempC/TempF, absolute vs delta time/temperature) allow validation at construction and encode invariants once.
  • Some describe a workflow akin to TDD but with the type checker: tighten types until a bug causes compile-time failure, then fix.

Newtypes, Value Objects, and Primitive Obsession

  • The core pattern is widely recognized: newtypes / strongly typed identifiers / value objects / painted types / “safety through incompatibility.”
  • It’s contrasted with “primitive obsession” / “stringly typed” code where everything is string or int.
  • Examples span many languages: Go named types, Rust newtypes, C# marker-generic Id, TS branded and template-literal types, Python NewType, Nim/Ada/Pascal subranges, F# units-of-measure, etc.

Range, Refinement, and Dependent Types

  • Several want bound integers and refinement types (“int in [0,10)”, array indices guaranteed in range, HTTP-status-to-response typing).
  • Ada, Pascal, Nim, ATS, TypeScript tricks, F# measures, Idris, Liquid Haskell, and Wuffs are cited as partial realizations.
  • Others warn of undecidability, type-level “puzzles,” recursion limits, and gnarly types that hurt usability.

OOP, Constructors, and Correct-by-Construction

  • “Correct by construction” is emphasized: enforce invariants via constructors or factory functions; make it hard to create invalid UUIDs/IDs.
  • Debate over exceptions vs Result/Either: checked exceptions viewed by some as powerful type-level contracts, by others as ergonomically “contagious” and noisy.

Costs, Over-Typing, and Dynamic Alternatives

  • Skeptics report painful codebases where “everything is a unique type,” leading to boilerplate conversions, awkward interop, and performance worries (heap allocation, excessive conversions).
  • Some argue that in many domains good tests, schemas, and dynamic validation (e.g., Clojure Spec/Malli) are more flexible and less brittle, especially for startups.
  • Consensus: strong, domain-aware types are extremely valuable, but can be overdone; types, tests, and runtime checks are complementary tools, not substitutes.

A list of changes to make it easier to build beautiful and walkable places

Regulation, Red Tape, and Feasibility

  • Many readers are shocked by how many separate rules block walkable, “European-style” urbanism, especially in the US/California.
  • Some find the list “daunting” and politically unrealistic; others counter that many top items have already been implemented in NYC, LA, Nashville, Austin, etc.
  • Several note that the list itself is a useful way to start a public dialogue and reveal invisible constraints (setbacks, parking minimums, height limits, etc.).
  • A recurring theme: most items are removing regulations rather than adding new ones, often with no direct fiscal cost.

Developers, Markets, and Regulation

  • Debate over “greedy developers”: one side argues this is an unserious trope; another cites fraud and failed projects to justify skepticism.
  • One camp: loosen regulations, let developers build more, and prices will eventually fall (citing Austin and long-term underbuilding).
  • Counter-camp: “market forces” stop building when prices fall; real affordability needs government-funded/social housing and cost-plus models.
  • Further pushback: US housing is deeply financialized; large price drops could destabilize many households and institutions.

Quality Standards vs Affordability

  • Example tension: soundproofing in multifamily/row houses. Some want strict noise and fire standards; others argue every mandate raises costs and prices out poorer households.
  • Middle ground suggestions include mandatory disclosure/testing of noise performance rather than blanket bans on “lower-quality” units.

Public Safety, Crime, and Disorder

  • One viewpoint: walkability is pointless without fixing what’s seen as a “dramatic decline” in public safety (homelessness, public drug use, visible disorder).
  • Others respond with crime statistics showing long-term declines since the 1990s, arguing fear is driven by visibility of poverty and media focus on a few neighborhoods.
  • Distinction emerges between crime vs disorder: some concede crime is down but feel day-to-day public environments have become less pleasant.

Homelessness, Drugs, and Punishment

  • Hardline position: walkability is meaningless unless cities remove drug users, homeless people, litterers, vandals—primarily through punishment.
  • Opposing view: punitive cycling between jail and encampments fails; root causes include unaffordable housing near jobs and lack of services.
  • Another camp insists drugs and untreated mental illness are the primary drivers of street homelessness, not housing costs alone; without addressing addiction, other interventions are seen as futile.

Cars, Traffic, and Safety

  • Several argue cars are the dominant public-safety threat (tens of thousands of deaths), but are culturally normalized while homeless people are treated as the main danger.
  • Others highlight specific corridors where reducing car lanes for “walkability” feels dangerous due to heavy regional traffic and emergency access needs.
  • Some emphasize design fixes (roundabouts, wider and better-lit sidewalks/bike paths) and note that car congestion itself slows emergency vehicles; dedicated bus/bike/emergency lanes are suggested.

Car-Free Visions, E‑bikes, and Behavior

  • Some dream of car-free districts where people walk, bike, or use mobility scooters; others see past denials of “we’re not coming for your cars” as political bait-and-switch.
  • E-bikes are praised but also criticized: “unlocked” high-speed models behave like small motorcycles on bike paths, creating new safety problems amid weak enforcement.
  • Several note that behavior and social norms matter as much as vehicle type: inconsiderate riding/driving stresses others regardless of mode.

Politics, NIMBYism, and Implementation

  • Walkable neighborhoods are in high demand and expensive, yet locals often oppose change that would make more such areas, especially near them.
  • Commenters note that those who love walkability may still object when a neighbor’s lot is upzoned or fully built out.
  • Some stress that entrenched interests (drivers, existing homeowners, city staff tied to regulation) make reforms politically difficult, even when fiscally cheap.

International Comparisons and Lived Experience

  • Multiple references to Dutch, Norwegian, Finnish, German, and Eastern European cities: quiet centers, heavy bike use, frequent small grocery trips, and integrated bike/foot paths.
  • People who have lived in walkable areas say it’s hard to go back to car-dependent life; others strongly prefer large private property over urban convenience.
  • Several argue that “nice places to be” (clean, safe-feeling, socially cohesive) are what ultimately make walkability succeed; zoning and transit then follow demand.

PSA: SQLite WAL checksums fail silently and may lose data

Purpose of SQLite WAL checksums

  • Several commenters argue WAL checksums are primarily to detect partial / out‑of‑order writes, not arbitrary corruption or “bit rot.”
  • Checksums let SQLite know when a transaction was fully written and fsynced so it can safely treat it as committed and distinguish complete vs incomplete journal entries.
  • SQLite uses checksums on both rollback journal and WAL; database file pages themselves are not checksummed by default (except via optional VFS extensions).

Why truncating at first bad frame is seen as correct

  • Once a checksum fails, all subsequent frames are untrustworthy, because:
    • The WAL describes page‑level B‑tree changes; skipping frames can break structural invariants and cause deeper corruption.
    • Later frames may depend on earlier ones (e.g., page splits, pointer rewrites), so applying them without the missing changes is unsafe.
  • Chaining checksums means corruption in the middle is treated like a “rockslide”: replay up to the obstruction, then stop; this leaves the DB in a state that definitely existed.
  • Many see this not as “data loss,” but as rolling back untrustworthy transactions to the last known‑good state.

Disagreement over “silent” behavior and recovery options

  • The article’s author and some commenters want:
    • Errors raised on checksum failure.
    • An option to preserve the WAL for manual / tool‑driven recovery or partial salvage in special cases (e.g., corrupted frames that aren’t logically needed).
  • Others counter that:
    • Most applications just want a consistent DB that opens; refusing to start on WAL issues would be worse.
    • Attempts at partial application or heuristic recovery would be arbitrary and dangerous for transactional semantics.

Checksums, algorithms, and corruption scope

  • Debate over Fletcher vs CRC:
    • CRCs can sometimes correct 1–2 bit errors and have stronger detection; Fletcher is seen as weaker and somewhat outdated.
    • Counter‑argument: for SQLite’s purpose (detecting partial writes), Fletcher is sufficient; full anti‑bit‑rot protection would also require page checksums on the main DB.
  • Some note real corruption can occur in transit (controller, bus, memory) despite SATA/NVMe ECC, though rates and seriousness are debated.

Filesystem and storage assumptions

  • SQLite assumes reasonably correct fsync semantics; if fsync “lies” or the filesystem silently corrupts data, SQLite cannot fully defend against that.
  • Discussion of ZFS, ext4, btrfs:
    • ZFS’s strong checksumming is praised, but its interaction with SQLite fsync and txg timeouts can cause hangs unless tuned (e.g., sync=disabled), which then risks data loss.
    • Many databases and common filesystems still use relatively weak 16–32‑bit checksums, often disabled or metadata‑only.

Critiques of the article’s framing

  • Several commenters think calling this a “PSA” about data loss is misleading:
    • The behavior is intentional, documented, and primarily about crash safety, not end‑to‑end corruption detection.
    • The simulated WAL‑only corruption scenario is considered contrived compared to broader risks (main DB corruption, full sector loss, missing .db‑shm, etc.).
  • Some also object to implying SQLite is hard to contribute to or “limping along,” noting that corruption‑detection features (checksum VFS) and clear design assumptions already exist.

200k Flemish drivers can turn traffic lights green

How the System Works and What’s New

  • Many note that traffic‑actuated lights using inductive loops or radar are decades old; the Flemish system mainly adds app‑based prediction on top of existing “smart” infrastructure.
  • Clarified model: navigation apps share approaching vehicles’ positions (and sometimes next turn) so controllers can turn green before cars, bikes or ambulances arrive, smoothing flow rather than just reacting at the stop line.
  • Several posters stress this is a protocol integrated into existing apps, not a standalone “traffic light app” that drivers actively fiddle with.

Cost, Complexity, and Alternatives

  • Supporters argue app integration is cheaper and easier to retrofit than digging up roads for more loops or cameras, and can be upgraded via a small box at the light.
  • Skeptics see it as over‑engineered and fragile over a 20‑year lifecycle, citing IoT products that break when networks or apps disappear.
  • Alternatives proposed:
    • Better use of existing loop/IR/camera sensors.
    • Turning or flashing lights off at night with yield/stop signs.
    • Wider use of roundabouts, which self‑balance flow and reduce crashes in many contexts.
  • Some question the claimed long‑range prediction: one commenter familiar with Flanders says current practice is ~1 minute ahead and still mostly loop‑driven.

Privacy and Data Concerns

  • Strong thread on privacy: continual sharing of location and route intent with government and commercial apps is seen as intrusive, especially when data can reveal origins/destinations and emergency‑vehicle movements.
  • Emergency services themselves reportedly balked at similar systems over concerns about tracking and potential misuse (e.g., criminals predicting police/EMS positions).
  • Others counter that governments can already track phones via networks, and prefer state access over big‑tech data mining.

Equity, Commercial Influence, and “Pay to Play”

  • Concern that only users of certain commercial apps gain priority, disadvantaging others and creating a de‑facto “pay to win” mobility layer.
  • Worry about private firms effectively influencing public infrastructure and monetizing government‑backed incentives with little transparency.
  • A minority think this is “obviously good”: worst case it behaves like current dumb lights; best case reduces waiting, fuel use, and stop‑and‑go traffic.

Cyclists, Pedestrians, and Usability

  • Frustration that many sensor‑based systems ignore cyclists, forcing them to rely on cars or “beg buttons.”
  • Some cities report good results with bike‑targeted detection (induction tuned for bikes, radar, or warm‑body sensors) and even bike‑priority apps.
  • Multiple commenters emphasize that any system must avoid requiring manual phone interaction while driving.

Diet, not lack of exercise, drives obesity, a new study finds

Diet vs. Exercise as Drivers of Obesity

  • Many commenters agree the article’s core message matches their experience: diet changes move weight much more than typical exercise levels.
  • Common heuristic: “Diet to manage weight, exercise to manage fitness.”
  • Several people report large weight loss from diet alone (keto, low-carb, cutting soda/processed food) with minimal or unchanged activity.
  • Others note periods of intense training (martial arts, cycling, manual labor, hiking) where they could eat “anything” and maintain or lose weight, but concede this volume is unrealistic for most people.

Calories, Metabolism, and ‘Outrunning a Bad Diet’

  • Strong consensus that long‑term weight change is governed by calories in vs. calories out, with many pushing careful tracking (scales, apps, TDEE).
  • Debate over how adaptive metabolism is: some argue bodies strongly adjust expenditure (constrained-energy model), others think that adaptation is limited and deficits still dominate.
  • “You can’t outrun a bad diet” is defended as broadly true for average people; critics point out elite athletes and extreme exercisers clearly can, but are rare.
  • Timing approaches (intermittent fasting, OMAD, weekly 24h fasts) are described as useful mainly because they enforce lower intake, though some insist insulin dynamics matter independently.

Processed / Hyperpalatable Foods and Food Environment

  • Many tie modern obesity to cheap, ultra-tasty, low-satiety foods engineered to encourage overconsumption.
  • Some are skeptical of vague labels like “processed”/“ultra-processed,” calling them ill-defined and “vibes-based.”
  • Others reply that classifications (e.g. NOVA) do exist and that the real issue is high calorie density, low fiber/micronutrients, and ease of overeating chips, sweets, snack foods, etc.
  • Side discussion on food being dramatically cheaper and more abundant than in previous decades, making passive overeating easy.

Diet Strategies, Drugs, and Psychology

  • Approaches mentioned: low‑carb/keto, intermittent fasting, strict portion control, calorie counting, higher-protein/low-carb, avoiding snacks and sugary drinks.
  • Some emphasize that “eating clean” without measuring portions often fails; hidden calories (oils, nut butters, “just a handful” of snacks) derail deficits.
  • GLP‑1 drugs (e.g. Ozempic) are praised by some for eliminating “food noise”; others voice concern about side effects and long-term dependence.
  • Several note that different methods work for different people; sustainability and hunger management matter more than macronutrient ideology.

Exercise, Muscle, and Health Beyond Weight

  • Commenters stress that exercise has major benefits independent of weight loss: cardiovascular fitness, strength, aging, mood, stress.
  • Strength training is widely recommended to preserve/build muscle, improve function, and modestly raise resting expenditure; others caution that the extra calorie burn per pound of muscle is often overstated.
  • Light, consistent activity (walking, low-intensity cardio) is seen as more sustainable than high-intensity efforts that spike appetite.

Study Design and Media Framing

  • Multiple readers criticize the NPR headline as over-causal for an observational study.
  • The dataset excludes athletes and focuses on differences across economic development; interpretation: daily expenditure doesn’t differ enough to explain obesity gaps, so diet/food environment likely dominate.
  • Some note similar findings have been published before; this work is viewed as refinement, not a revolution.

Vet is a safety net for the curl | bash pattern

What vet does and why it exists

  • vet is a wrapper around the curl | bash pattern: it fetches a remote script, shows it (with a pager/diff), and only runs it if the user explicitly confirms.
  • Several commenters like it as a pragmatic harm‑reduction measure: you won’t stop people from using one‑liners, so you might as well make the default “inspect first, run second.”
  • Others argue it adds minimal real security: you could already curl > file; less file; bash file, and vet doesn’t solve deeper supply‑chain problems.

Risk model: scripts vs binaries

  • A recurring argument: if you don’t trust the project enough to run its install script, why do you trust the much larger, opaque binary it installs?
  • Counterpoint:
    • Package managers add vetting, signatures, predictable file locations, and a clean uninstall story.
    • Install scripts often run as root, modify system paths, add repos, create users, open ports, or “yolo” into /usr/local or $HOME. That’s a different, more invasive risk than just running a single binary.
    • Even if both are arbitrary code, scripts can be poorly written and non‑standard, breaking systems in subtle ways.

Rust / rustup as a case study

  • Rust’s official docs prominently recommend curl --proto '=https' ... | sh for installing rustup.
  • One side calls this “crazy” for a language that markets safety.
  • Others respond:
    • rustup itself can be (and is) packaged in many distros and Homebrew; the curl‑pipe is just a uniform, low‑friction option.
    • The real toolchain churn is in compilers and crates; rustup is stable enough for repos.
    • If you care, it’s possible to avoid curl|bash entirely by manually installing rustup, using distro packages, or tools like mise.

Server compromise & targeted curl|bash attacks

  • People note that servers can detect “curl | bash” and selectively serve malicious payloads only to piped requests.
  • Some argue this is mostly theoretical; others share real‑world phishing examples that use this trick.
  • Consensus: once you trust a compromised server, both scripts and binaries are suspect; hashes or signatures from a separate channel are the only strong defense.

Sandboxing and alternatives

  • Multiple suggestions: run installers in containers, VMs, separate users, or tools like firejail/bubblewrap; inspect filesystem diffs before adopting the result.
  • Some point to Nix/Guix, Fedora Silverblue/distrobox, Flatpak, and similar approaches to isolate third‑party software, revert easily, and avoid curl|bash entirely.
  • Others mention specific tools (e.g., try, probox) or workflows (devbox + nix, home‑manager) to never need curl | sh.

Culture, usability, and package management

  • Many blame fragmentation and lagging distro repositories for the popularity of curl | bash: developers want a single, cross‑distro install, users want the documented “latest,” and packaging everywhere is hard.
  • Others counter that this leads back to Windows‑style entropy: ad‑hoc installers that don’t integrate with the system, update weirdly, and rarely uninstall cleanly.
  • Debate over “safer behavior”: some insist on “use your distro’s package manager first,” others say real‑world needs and outdated repos make curl|bash or custom repos unavoidable.

Critiques of vet and “security theater”

  • Skeptical voices call vet “enterprise fizzbuzz” that mainly prettifies curl | bash without fixing core issues (trust, sandboxing, supply chain).
  • Supporters respond that making the default path “review before execute” still meaningfully raises the bar, especially for copy‑paste one‑liner culture.

Open Source Maintenance Fee

What WiX Toolset Is and Technical Context

  • Thread clarifies this is WiX Toolset (Windows installer tooling), not the website builder.
  • Several describe WiX as powerful but extremely complex, with poor or historically outdated docs; others note it exposes the full (ugly) MSI/Windows Installer model, so much of the pain is inherent to Windows.
  • Some praise WiX’s build/CI integration and flexibility versus GUI-based commercial tools; others say they’d gladly pay for easier, better-documented alternatives.

How the Open Source Maintenance Fee (OSMF) Works

  • Source remains under an OSI license; the fee applies to:
    • Official binaries (GitHub releases, NuGet packages).
    • Using the project’s issue tracker/discussions if you generate revenue from it.
  • Non-paying users may:
    • Use the source freely and build their own binaries, including commercially.
    • Redistribute their own builds, subject to the OSS license.
  • Fee tiers are low monthly amounts by org size; maintainers frame it as payment for maintenance/support, not for the code itself.

License Compatibility and Enforceability Debates

  • Some argue the chosen license allows charging for official binaries but forbids adding extra restrictions to redistribution; others think an additional EULA on binaries is fine.
  • Multiple comments note anyone can legally fork, build, and publish binaries, making the fee partially “honor system.”
  • Questions are raised about:
    • Whether restricting GitHub “Releases” clicks is compatible with GitHub’s own terms.
    • How this interacts with various OSS/FOSS definitions and with GPL-family licenses (compatibility is asserted but not fully resolved in-thread).
  • Skeptics worry the README/EULA wording (“if you use this to generate revenue, the fee is required”) is misleading relative to the actual license rights.

Impact on Users: Indies, Companies, and Contributors

  • Concern: small indie developers with tiny revenue might be deterred; responses say they can self-compile or that $10/month is trivial for a real business.
  • Some fear a “two-class” system (paid maintainers vs. unpaid contributors); others say almost nobody contributes to boring maintenance anyway.
  • Corporate angle:
    • Maintainers report many companies are willing to pay once there is a formal requirement that activates legal/procurement.
    • Others say their legal departments would just ban the tool as too risky/complex.

Broader Views on Funding Open Source

  • Supporters see OSMF as a pragmatic, Red-Hat-like model: free code, paid convenience and support, aimed at reducing maintainer burnout and “entitled” users.
  • Critics see it as “subscriptionizing” open source, edging toward corporate creep and undermining the “gift economy” ethos.
  • Alternative ideas discussed: better corporate culture for donations, bounties, new licenses with profit-sharing or commercial-use restrictions.
  • Several note this won’t be a silver bullet but could be one useful pattern; some other projects have reportedly started experimenting with OSMF.

Web fingerprinting is worse than I thought (2023)

Browser behavior and real-world tests

  • Multiple commenters tested fingerprint.com and similar demos:
    • Brave, Firefox, Chrome (even with “hardest” settings) often still yielded stable IDs across normal and private sessions; Tor Browser was the main case that consistently broke tracking.
    • Safari (especially Private mode) often produced different IDs between normal and private windows; some saw it as significantly better than Chrome for privacy.
    • Mullvad Browser + VPN could still be tracked by fingerprint.com for some users.
  • Brave’s built‑in fingerprinting protection and Shields were viewed as weaker than advertised; blocking scripts can break demos but may just hide the identifier UI.
  • Firefox’s privacy.resistFingerprinting and related privacy modes can reduce leakage but:
    • They break or degrade many sites (timezone forced to UTC, canvas glitches, Cloudflare loops, bot flags, finance sites issues).
    • Several users reported still being uniquely fingerprinted or re-identified, especially when IPs are static.
  • Librewolf and plugin-heavy Firefox setups often trigger more captchas and bot checks, indicating that “hardened” profiles themselves become fingerprints.

How fingerprinting works and its limits

  • Signals mentioned: browser/OS versions, CPU count, screen/viewport size, fonts, codecs, timezone/locale, touchpoints, GPU/canvas/WebGL artifacts, extensions/adblockers, timing/CPU performance, and TLS/JA3/JA4 fingerprints.
  • On homogenous platforms like iPhones, fingerprinting is weaker but still possible via regional settings, font sets, rollout timing of versions, and subtle rendering differences.
  • IP address:
    • Some see it as a major signal (stable home prefixes, household-level ID).
    • Others note IPv6 rotation and MAC randomization, though home prefixes can remain static for years.
  • Stability over time: Fingerprints can ignore fast-changing attributes (like browser version) and rely more on hardware and network invariants; un-hashed/raw attributes let trackers link “old” and “new” fingerprints.

Mitigations, tradeoffs, and arms race

  • Techniques like spoofing user agents, randomizing canvas/fonts, or blocking JS can:
    • Make you stand out as “privacy-ext user” and increase fingerprintability or risk of blocking.
    • Break legitimate functionality (graphics, terminals, layout adaptation, downloads per-architecture).
  • Some argue that removing or heavily gating high-risk APIs (canvas, WebGL, capability queries) would help, but others note modern “web app as VM” design inherently enables fingerprinting.
  • Split setups (locked-down browser vs. “clean” browser for banking/government) are a common coping strategy.

Legal and regulatory debates (GDPR, cookies, enforcement)

  • Several comments assert that under GDPR and ePrivacy, fingerprinting is legally on par with tracking cookies and requires consent; “cookie banners” are in fact broader tracking-consent dialogs.
  • Others emphasize:
    • Enforcement difficulty: fingerprinting happens via JS and server-side matching; unlike cookies, there’s no local artifact to inspect.
    • Industry has turned consent UIs into dark patterns to force opt-in and blame GDPR for UX pain.
  • Disagreement:
    • Some say doing fingerprinting without consent is “almost certainly illegal” in the EU.
    • Others claim that purely client-side, non-stored, non-shared measurements might be compliant (unclear; multiple “I am not a lawyer” caveats).
  • Strong skepticism that regulators will meaningfully act, given corporate lobbying and low political payoff.

Legitimate vs abusive uses

  • Cited “legit” uses:
    • Bot detection, rate limiting (e.g. JA3/JA4 TLS fingerprints), preventing ban evasion and fraud.
  • Abuses:
    • Commercial services that “de‑anonymize” site visitors by merging fingerprints with data brokers and selling identity/PII for retargeting.
    • Vendors marketing this as “privacy-compliant” and skirting GDPR/CCPA spirit while claiming legality.

Broader sentiment

  • Many view browser fingerprinting as more dangerous than cookies and believe it should be outright illegal, but:
    • Some argue purely legal approaches are weak and we need technical defenses too; others see technical-only responses as an endless arms race.
  • There is deep distrust of ad-funded browser vendors and large platforms; several comments frame the problem as structural: tracking is aligned with their core business models.

What does connecting with someone mean?

What “connecting” means and why it matters

  • Many agree with the article’s framing: connection = mutual empathy, shared values/experiences, and a sense of safety to say what’s really on your mind.
  • One commenter notes that their best life experiences are overwhelmingly about connection, but others caution that this may overfit the past and neglect new, solitary or inner experiences.

Small talk and “How are you?”

  • Big thread around “how are you?” as greeting:
    • In the US it’s often seen as a shallow ritual, not a real question; honest answers can be socially punished.
    • Others report that in some US regions it is answered honestly and is a useful context-setting opener.
    • Several European perspectives: equivalent phrases exist but are typically perfunctory; some cultures skip them, which reduces easy openings.
  • Some see “how are you?” as an attention-grabber rather than a true question; others dislike it as fake and prefer more open prompts (“what keeps you busy?”, context-based questions, rating your day 1–10).

Small talk vs depth

  • One camp defends small talk as the “MVP of connection”: safe, low-stakes, a way to test rapport and gradually build trust.
  • Another camp finds it boring, a crutch that avoids real connection and crowds out meaningful topics.
  • Several note that “clicking” often happens very fast—within minutes—through cues and mannerisms more than words.

Vulnerability and oversharing

  • The “right” level of vulnerability is seen as highly context-dependent: time/place, relationship, and the other person’s signals.
  • Some argue you can’t be vulnerable without risk; you learn the line by occasionally crossing it.
  • Definitions of “oversharing” vary: for some it’s when the listener clearly isn’t interested; others doubt the concept and emphasize that people mostly don’t care as much as we fear.

Connecting across value gaps and with “bad” people

  • Strong disagreement here:
    • One side, inspired by a famous quote about knowing those you dislike and examples of befriending extremists, argues that understanding and empathy can sometimes change harmful views and reduce polarization.
    • The other side (including minority perspectives) insists they don’t owe emotional labor to racists or homophobes; policy disagreements are one thing, but denying someone’s right to exist is another.
    • Debate continues over how changeable “values” really are, and whose responsibility it is to try.

Empathy, social media, and other practices

  • Several see empathy as central to connection but argue it’s eroded by anonymous, reward-driven online culture.
  • One perspective: the deepest common ground isn’t shared ideology but shared human fragility—our conflicted, irrational minds—so patience and compassion matter more than agreement.
  • Social dancing is suggested as a way to practice nonverbal connection; others mention conversation skills and a recent book on “seeing others deeply” as useful tools.

Odds and ends

  • A humorous aside reinterprets “connecting” as joining two USB‑C cables with a coupler.

Itch.io: Update on NSFW Content

Immediate situation and scope

  • itch.io has removed or hidden >20k NSFW games/books after its credit card processors threatened to cut off service.
  • Commenters see this as part of a broader pattern: Steam’s recent policy change, Pornhub/OnlyFans pressures, and similar actions against VPNs, Tor, Sci‑Hub, Wikileaks.

Who is driving the censorship?

  • Disagreement over the main driver:
    • Some blame a small number of ideologically motivated billionaires and evangelical or “anti‑porn feminist” NGOs like Collective Shout.
    • Others point to government “jawboning” (Operation Choke Point–style pressure) and regulators using banks/cards as indirect censors.
    • A minority argue it’s mostly economics: higher fraud/chargeback rates and legal risk around adult content.
  • Several note that advocacy letters alone seem insufficient to move Visa/Mastercard, implying unseen political or regulatory pressure.

Legal vs fictional harm

  • Many stress that the banned games are legal, fictional depictions (including coercive/rape scenarios) sold under clear NSFW tags.
  • They contrast this with:
    • Porn sites that hosted non‑consensual/trafficked content (seen as legitimately requiring intervention).
    • Violent games and TV (GTA, Skyrim, Game of Thrones) which depict murder and torture but face no comparable payment bans.
  • Some are personally “icked out” by rape/blackmail content but insist that fictional depictions should remain lawful and purchasable.

Payment processors as de facto regulators

  • Strong concern that a global Visa/Mastercard duopoly has become an unelected moral censor and sovereignty issue: local laws permit content that global processors can effectively outlaw.
  • Several call for treating payment infrastructure as a common carrier or public utility: no service denial except for illegality/fraud, with risk priced via higher fees, not bans.

Alternatives: crypto, bank rails, and new systems

  • Crypto advocates argue this is a textbook use case for Bitcoin/stablecoins: censorship‑resistant, borderless payments.
  • Critics respond that today’s crypto is slow, UX‑hostile, scam‑ridden, and still dependent on centralized exchanges that can be pressured.
  • Others highlight national or interbank schemes (UPI, Pix, Interac, SEPA, domestic card networks) as proof that non‑Visa/Mastercard rails are feasible, but note cross‑border gaps and political capture risks.

Policy and political responses

  • Some push US bills like the “Fair Access to Banking Act” that would bar financial institutions from inhibiting lawful transactions; others are unsure if the text actually protects marginalized users.
  • Suggested structural fixes include: stricter antitrust action, regulating card networks like utilities, or even nationalizing/creating state payment networks to provide neutral competition.

Culture-war and feminism tangents

  • Long subthreads debate whether groups opposing sexualized content represent feminism, religious conservatism, or both.
  • Related arguments flare around “attractive women” in games, body standards, breast sliders, trans inclusion, and bathroom politics, illustrating how NSFW censorship quickly entangles broader culture‑war disputes.

Electric cars produce less brake dust pollution than combustion-engine cars

Tire Wear on EVs vs ICE Cars

  • Many anecdotes of rapid EV tire wear (10–20k miles), especially on Teslas, Kia/Hyundai EVs, and some Niro/EV6/EV9 models; others report 30–70k miles or more, even on performance EVs.
  • Proposed causes: higher vehicle mass, instant torque, “sporty” large rims with low-profile, soft-compound OEM tires, and aggressive driving (hard launches, fast cornering).
  • Several people point to poor factory alignment/camber (notably on some Teslas, some FWD crossovers) and lack of tire rotation. Others blame low-rolling-resistance or shallow-tread “eco” tires.
  • Counterpoint: many EV owners say tire life is normal or better than past ICE cars; suggest bad tires, alignment faults, or driving style when sets die at 10k miles.

Brake Dust and Regenerative Braking

  • Consensus that EVs and strong hybrids use friction brakes far less due to regenerative braking.
  • Multiple stories of pads lasting 50k–250k miles; some hybrids/EVs still on original pads after a decade.
  • Some report brake rotors rusting from disuse; manufacturers sometimes deliberately engage friction brakes (or disable regen briefly) to keep discs clean.
  • Discussion of blending strategies: many EVs map regen into the brake pedal; some (notably Tesla) rely on accelerator lift-off and use friction only at low speed or high SOC.

Net Particulate Emissions (Brakes, Tires, Road)

  • Commenters quote the article’s figure: even adding tire, brake, and road wear, BEVs emit ~38% less particulate pollution than ICE cars before counting tailpipe emissions.
  • Skeptics emphasize heavier EV weight (10–20% more than comparable ICE) and suggest tire particles and road wear may scale worse than linearly with mass. Others note delivery trucks for gasoline also damage roads.
  • Some worry about tire microplastics and black carbon, but several argue EVs are still much cleaner overall than ICE vehicles.

Hybrids, Engine Braking, and Comparisons

  • Hybrids are noted to get similar brake benefits from regen; some see essentially no pad wear on Prius/Yaris/Volvo PHEVs.
  • ICE drivers discuss engine braking and careful driving extending pad life, but others point out clutches and drivetrains then take some of that load.

Infrastructure, Policy, and Equity

  • Strong advocacy for banning ICE cars in cities vs. others favoring carbon pricing or incentives over bans.
  • Major concern from renters and urban dwellers with no home charging: retrofitting garages, street chargers, and grid upgrades is seen as expensive and logistically hard.
  • Some argue resources should prioritize public transit, cycling, and fewer cars overall; EVs alone don’t solve congestion, safety, or land-use issues.

BYD Bets on Budget EV Boom with Atto 1 Debut in Indonesia

US Access to BYD and Role of Tariffs

  • Many commenters want BYD‑class cars in the US but see high tariffs on Chinese EVs as the main obstacle.
  • One side argues tariffs distort markets, entrench bloated US automakers, and hurt consumers.
  • Others see tariffs as strategic industrial policy: preserving domestic manufacturing capacity (and Tesla) even at consumer expense.
  • There’s concern that heavy protection will cause the US auto industry to “rot from inside,” becoming uncompetitive globally.

Small Cheap Cars vs American SUV Culture

  • Debate over why the US gets electric Hummers instead of tiny EV hatchbacks.
  • Some say consumers simply don’t buy small hatchbacks (Fit, Yaris, etc.), and automakers rationally reallocated capacity to more profitable crossovers.
  • Others argue regulations, tax code, and classification of SUVs as “trucks” push the market toward larger vehicles, then advertising and culture lock it in.
  • Used‑car behavior: many people who want small, practical hatchbacks buy them used, shrinking new‑car demand.

Chinese EV Pricing, Subsidies, and Policy

  • BYD’s ~$12k Atto 1 is seen as plausible and in line with other Asian EVs; the Chinese domestic price war pushed some models down to $6–8k.
  • Several comments describe a “fantasy land” price war fueled by provincial subsidies and cheap debt, causing bankruptcies and prompting Beijing’s recent crackdown.
  • Others note China’s broader pivot from real estate to EVs/clean energy as a national employment and industrial strategy, expecting long‑term price declines.

Prospects for the US Auto Industry

  • Some predict much of the US auto sector will be wiped out within a decade by Chinese competition; others think tariffs will simply keep Chinese cars out.
  • BYD is repeatedly described as offering Tesla‑class performance and better interiors at roughly half the price, though claims about “Porsche handling” and “Toyota reliability” are disputed.
  • US legacy automakers are criticized for financial engineering (e.g., stock buybacks) instead of investing to compete; others emphasize structural constraints from investor expectations and interest rates.
  • There’s a side debate over whether the real problem is “expensive labor” or management choices and corporate structure.

Demand for Ultra‑Cheap EVs in the US

  • Several argue a $10–15k new EV wouldn’t sell well in America: buyers either move up to better‑equipped crossovers or buy used.
  • Examples: the Chevy Bolt and Equinox EV had attractive effective prices (after incentives) but limited uptake; consumers prefer more expensive models.
  • Others still ask why no entrant is attempting a truly stripped‑down $10–15k EV; one startup (Slate) is cited as trying exactly that by avoiding “gimmicks” like self‑driving.

Quality of Chinese EVs (BYD, etc.)

  • Experiences are mixed but skew positive:
    • In low‑end segments, Chinese cars are described as “best for the money,” though sometimes with rough edges (buggy UIs, coarse driving dynamics, plasticky interiors).
    • Ride‑share users report BYD Atto as surprisingly good for a cheap car; Geely ICE examples reach ~100k km without major failures.
    • Some say China‑domestic BYDs feel flimsier than export versions; others contest this and stress intense domestic competition leaves little room for chronic low quality.
  • Consensus that Chinese manufacturers are ahead in batteries (LFP, sodium‑ion, solid‑state ramping) and EV integration; US firms, including legacy OEMs, are seen as having under‑invested here.

Global Market Shifts and Emerging Economies

  • BYD’s low‑cost EVs are already reshaping markets: in Brazil, the “Dolphin Mini” is a hit and BYD has reportedly overtaken Toyota in sales.
  • Commenters expect Chinese brands (BYD, SAIC, Geely, GWM, Xiaomi, etc.) to dominate developing and emerging markets first, then increasingly pressure Western markets via local factories to sidestep tariffs.
  • Some note Indonesia’s lack of a strong domestic auto brand compared with Vietnam’s VinFast, tying this to broader development and “commodities trap” concerns.
  • Cheap EVs are seen as democratizing car ownership and thus traffic—but with far less local pollution than combustion cars.