Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 222 of 356

I drank every cocktail

Favorite Cocktails & Experiments

  • Commenters latch onto specific standouts (Rabo de Galo, Porto Flip, Bijou, Negroni, Jack Rose, Dirty Martini, Betón, Sgroppino) and share riffs and substitutions.
  • Strong emphasis on bittersweet, spirit‑forward classics (Negroni variants, Bijou, Hanky Panky, Rusty Nail).
  • Some note that certain “official” cocktails are obscure or regionally skewed (Pornstar Martini popular in UK, White Lady not obscure, Monkey Gland’s odd history).

IBA List, Authenticity & “Every Cocktail”

  • Several argue that saying “every cocktail” but using the IBA list is misleading; the list is narrow, rotates over time, and omits popular drinks (Dirty Martini, Gimlet, Jack Rose, etc.).
  • Debate over whether you can really claim to have had certain classics when key ingredients no longer exist (Vesper with Kina Lillet; Chartreuse scarcity and non‑substitutability).
  • Some feel brand‑specified recipes can be annoying at home; others say certain brands (Green Chartreuse, Kina Lillet) effectively are unique ingredients.

Ingredient Quality, Technique & Home Bartending

  • Repeated advice: know when quality matters. Fresh citrus, good vermouth, and good cherries have big payoff; high‑end vodka is usually poor value in cocktails.
  • Detailed spirit buying heuristics across gin, rum, tequila, whiskey, rye, vodka; warnings about Canadian “rye” and big‑brand rum/tequila.
  • Strong focus on technique: ice quantity, dilution, and temperature as “hidden ingredients”; some recommend a pinch of salt to balance bitterness/sourness.
  • Encouragement to make simple syrups and grenadine at home, refrigerate vermouth, and taste ingredients neat.

Alcohol Use, Health & Culture

  • Discussion around whether “2 drinks a night” constitutes a problem: answers range from “normal, especially in Europe” to concern about dependence, sleep quality, and HRV effects.
  • Nordic participants describe high taxes and state alcohol monopolies; debated as both protective and burdensome.

Learning Tools, Apps & Resources

  • Multiple tools shared: a checklist app for the IBA list, open‑source cocktail apps, paid apps that optimize recipes by your inventory.
  • Recommendations for books, blogs, and YouTube channels that teach cocktail “grammar” (sour ratios, Manhattan/Negroni families) rather than just recipes.

Reaction to the Blog Post & Broader “Lists”

  • Many found the write‑up charming and well‑written, praising the prominent trigger warning about alcohol.
  • Several are inspired to adopt similar long‑term “lists” (cocktails, sci‑fi, etc.) as slow, open‑ended life projects rather than speedruns.

Show HN: Tinder but it's only pictures of my wife and I can only swipe right

Overall reaction & tone

  • Many commenters found the idea “adorable”, “wholesome”, and genuinely uplifting; several said it made their day or improved their evening with a partner.
  • A minority felt uneasy or saw it as potentially “psychological torture” or “deeply disturbing” that such an app might “need” to exist, though others stressed it’s clearly a parody / fun side project.

Features, UX, and implementation

  • Core behavior: choose an album of partner photos; only right swipes, plus swipe-up to share a photo with the partner.
  • Built with SwiftUI; no Android version yet (just a waitlist). No backend server; photos are on-device, with Firebase analytics as the only external service.
  • Photos must be placed into an album manually (e.g., using Apple’s face recognition in Photos, then selecting that album in the app).
  • Bug reports: shared albums not working, setup permissions sometimes failing, UI cut off on smaller iPhones, and issues with “unable to connect” likely related to Cloudflare.

Planned direction

  • Author doesn’t plan major new features; intends to open source so others can extend (chat, “poke”, matchmaking, etc.).

Monetization & startup satire

  • Long joke chain about needing an AI angle, microtransactions, loot boxes, B2B/SSO, YC funding, and MRR.
  • Dark-humor suggestions: premium mode to swipe on others’ spouses, divorce-attorney automation, ex-partner photos that trigger alerts, polycule support.

Legal and branding concerns

  • Some expect trademark or patent trouble from Tinder/Match (name similarity, swipe gestures).
  • Others argue there’s no obvious trademark confusion and that noncommercial use is less risky, while noting copyright vs trademark are distinct.

Relationship dynamics & use cases

  • Several couples tried it immediately and reported it sparked laughter or affection.
  • Suggestions ranged from toddler/family albums to narcissist/self-photo mode, to using it as a “boss key” or prank.

Meta & broader ideas

  • Meta-discussion about HN vs Reddit humor and “Reddit leakage” into HN threads.
  • Tangents spawned ideas for Tinder-like swiping on arbitrary content for private groups, reminiscent of StumbleUpon or group curation tools.

Shallow water is dangerous too

Shallow water and child risk

  • Multiple stories describe near‑drownings or deaths in very shallow water: fountains, puddles, bathtubs, mop buckets, and kiddie-pool depths (<30 cm / ~1 ft).
  • Several commenters emphasize that drowning can be silent and extremely fast; parents often won’t hear a fall or struggle.
  • A recurring theme: kids can drown if they fall unconscious face‑down, get trapped upside down in floatation devices, or simply can’t get their mouth above the surface.

Regulation vs “nanny state”

  • One view: any standing water feature below ~1 m high should be fenced if children are expected; Australia is cited as an example of strict fencing laws plus lifeguard requirements, correlated with fewer pool drownings of under‑4s.
  • The opposing view: broad fencing rules are overreach, costly, and often based on “if it saves one life” logic without clear causation; parents should supervise and teach swimming instead.
  • There is debate over whether strict rules should apply even where no children live or to all bodies of water vs only pools.

Teaching kids to swim & inequality

  • Some say early swimming lessons (from infancy) are normal and even part of school curricula in parts of Europe, credited with big reductions in drownings.
  • Others argue it’s common in many parts of the US too, especially where water is central to life (e.g., hot climates, high pool density).
  • A long subthread covers access barriers: cost, scheduling, geography, and historical closure or segregation of public pools; swimming proficiency correlates with socioeconomic status and race.
  • Some argue public provision of lessons is a basic state responsibility; others say access via YMCAs, city pools, churches, etc. is already sufficient and the main gap is parental prioritization.

Recognizing and responding to drowning

  • Shared resources stress that drowning is quiet and doesn’t look like movie-style splashing; key indicators include vertical posture, glassy eyes, gasping, and no forward progress.
  • Autistic children are noted as having dramatically elevated drowning risk, especially under non-parent supervision.
  • Several anecdotes highlight how crucial constant visual supervision is, regardless of flotation aids.

Other water hazards and safety heuristics

  • Wave pools, low-head dams, riptides, and floodwaters are repeatedly called out as unusually dangerous and hard to lifeguard.
  • Some surfers describe routinely rescuing people from riptides; advice is to understand currents rather than fight them.
  • A simple rule offered for child safety focus: “cars, dogs, and water” as everyday things that can kill quickly with little warning.
  • Brief tangents debate whether fear of heights is innate vs learned, and poke fun at exaggerated non-water hazards (e.g., garage door springs).

Meta: relevance to HN

  • One commenter questions why this story is front-page material; others note HN’s “second chance pool” and broader remit of intellectually interesting, safety-related discussions, especially when comments are substantive.

AI overviews cause massive drop in search clicks

Google’s incentives and business model

  • Many see AI Overviews and “AI mode” as Google’s attempt to keep users on Google pages, even at the expense of outbound clicks and the broader web.
  • Debate on monetization: some expect ads/product placement inside AI answers; others say that’s hard to do without destroying trust, which may explain why it’s not fully rolled out yet.
  • Some argue this is defensive: Google is trying not to lose search share to standalone LLMs, even if it risks cannibalizing search ads.
  • Others note “money queries” (commercial searches) remain mostly link‑based, so ad revenue hasn’t yet crashed, but informational queries are being absorbed by AI.

User experience: why people use or avoid AI Overviews

  • A large group finds the overviews convenient for quick factual queries (“what temp is pork safe at”, flight numbers, definitions), avoiding SEO spam, cookie walls, and hostile UX.
  • Another group disables or hides overviews (query hacks, udm=14, userscripts, adblock filters) because they prefer raw results or distrust the summaries.
  • Many compare AI Overviews to reading Hacker News comments instead of the article: a faster but potentially distorted shortcut.

Accuracy, safety, and hallucinations

  • Numerous reports of blatantly wrong answers: fabricated game hints, wrong population numbers, unsafe cooking temperatures, incorrect legal/medical/organizational info.
  • Overviews sometimes contradict their own cited sources or misinterpret simple pages; some say they hallucinate more than high‑end LLMs.
  • This creates real‑world harm: misdirected calls to businesses, users arguing about event fees or policies based on AI, and confusion in health and legal contexts.
  • Some believe non‑technical users over‑trust AI outputs, while others say the general public is more wary than technologists assume.

Impact on publishers, SEO, and the web’s economics

  • Many publishers and small sites report traffic drops of ~40–50%, threatening ad‑funded content and niche hobby/educational sites.
  • Concerns that Google is “stealing” their work: ingesting pages into models, answering on‑page, and intercepting both traffic and revenue.
  • Fear of a “dead internet” loop: less incentive to create quality content → less fresh training data → more AI‑generated slop → overall quality spiral.
  • SEO is morphing into “GEO”/LLM‑SEO: optimizing content to be quoted by AI engines instead of merely ranked in blue links.

Workarounds and alternative tools

  • Users share tactics to avoid AI: profanity triggers, -ai in queries, udm=14 parameter, custom Firefox search engines, CSS/JS to hide the overview.
  • Increasing interest in alternatives like Kagi, Perplexity, Marginalia, library‑style or local LLMs; praise for Kagi’s paid, ad‑free model and per‑site up/down‑ranking.
  • Cloudflare’s “pay per crawl” and robots controls are cited as early mechanisms to charge or block AI crawlers.

Long‑term concerns: data, law, and information ecosystem

  • Open questions about how future models will get training data if web content becomes paywalled, blocked, or economically unsustainable.
  • Worries that AI providers dodge liability by blaming “the algorithm” while now clearly publishing their own synthesized content.
  • Legal and ethical debates around defamation, libel, business harm, and whether AI platforms should be treated as publishers rather than neutral intermediaries.
  • Some hope this collapses ad‑driven SEO sludge and revives passion‑driven, non‑monetized “small web”; others fear only propaganda and commercial content will remain worth producing.

AMD CEO sees chips from TSMC's US plant costing 5%-20% more

Cost Premium and Product Impact

  • Many commenters are surprised the US-fab premium is only 5–20%, calling it a “bargain” for leading-edge nodes.
  • Rough back-of-envelope math suggests that for a ~$350 Taiwan-made GPU die, a 20% fab cost increase adds ~$70, which is only a few percent of a $2,000 retail card.
  • Others note margins differ: AI GPUs and high-end GPUs can absorb this easily; commodity CPUs and lower-margin parts feel it more.
  • There’s debate over how much manufacturing cost matters versus total development and BOM (HBM, packaging, etc.).

Resilience, Security, and Geopolitics

  • Strong support for paying a moderate premium to reduce dependence on Taiwan given invasion/earthquake risk and China–US tensions.
  • Some argue that even maintaining 5–10% of global leading-edge capacity in the US is strategically huge: it preserves skills, equipment, and a base to scale in crisis.
  • Others counter that for non-US buyers, Taiwan or “anywhere-but-US” is safer given US sanctions, export controls, and tariff volatility.
  • A minority worries that more US capacity could reduce US willingness to defend Taiwan; others argue the opposite: the Arizona fab increases Taiwan’s leverage.

Partial Onshoring and Supply-Chain Gaps

  • Several point out that wafers from Arizona are often still packaged in Asia; however US-based packaging (Amkor Arizona, Intel NM, others) is ramping.
  • Boards, passives, specialty films, and many “low-profit, high-barrier” components remain overwhelmingly Asian; without these, US fabs don’t fully solve dependency.
  • Shipping cost and carbon from moving dies back and forth is argued to be minor versus fab energy use; leading-edge chips are often air-freighted anyway.

Tariffs, Subsidies, and Who Pays

  • One camp sees this as validation that modest tariffs plus CHIPS-style subsidies can level costs without massive consumer pain.
  • Another stresses that any 10–20% cost rise, once passed through layers of the stack and compounded by tariffs, is effectively a large indirect tax on consumers.
  • Some insist businesses, not end-users, should bear more of the cost (lower margins, government subsidies), while others argue customers ultimately pay either via prices or taxes.

Intel, TSMC, and Long-Term Industry Structure

  • Long side-thread debates whether Intel is “cooked” or can recover; many blame decades of financialization, mismanagement, and fab delays.
  • Consensus that TSMC currently dominates state-of-the-art; Samsung is a distant second; Intel’s future as a competitive foundry is uncertain.
  • Several note that long term, leading-edge fab economics may support only one or a very small number of global players, making geographic diversification politically but not economically natural.

AccuWeather to discontinue free access to Core Weather API

AccuWeather Change & “Enshittification”

  • Many see the end of AccuWeather’s free API as part of a broader pattern: once ecosystems are built on free APIs, the terms shift to paid-only or “rent-only” subscription tiers.
  • The announcement’s marketing language (“excited,” “elevate your experience”) is mocked as corporate spin for simple monetization.
  • Some defend the move: running an API costs real money and staff; if developers value it, they should expect to pay.

NWS/NOAA, Politics, and Project 2025

  • Multiple commenters stress that U.S. National Weather Service (NWS) APIs remain free and are the true upstream source most commercial services repackage.
  • There is significant fear that NWS/NOAA will be “sabotaged” or privatized, citing:
    • Longstanding lobbying by AccuWeather to restrict NWS public outputs.
    • Trump‑era budget cuts and appointments tied to commercial weather interests.
    • Project 2025 language attacking climate and weather agencies as supporting “climate alarm.”
  • Others push back, calling this fearmongering and noting that a private company charging for its API is not itself government censorship. There’s also skepticism about how predictive Project 2025 is of actual policy.

Public Good vs Privatization & Deficit Claims

  • Strong pro‑public-good argument:
    • Weather data underpins aviation, shipping, agriculture, logistics, disaster response, and everyday safety.
    • NWS’s relatively small budget reportedly yields large economic ROI; cutting it is likened to “turning off a light to pay the mortgage.”
    • Examples from the UK and mapping (Met Office, Ordnance Survey) are used to argue that paywalled public data suppresses innovation and soft power.
  • Libertarian/deficit‑focused responses:
    • The U.S. debt is unsustainable; everything, including nice‑to‑have APIs, should be on the table.
    • Counter‑argument: recent huge tax cuts and larger-ticket spending make it implausible that gutting public weather is really about fiscal responsibility.

API Quality, Abuse, and Scraping

  • Some developers find NWS APIs clunky compared to commercial offerings, which add station networks, preprocessing, and better formats.
  • Others note that truly free APIs get hammered by bots and hobby projects; one operator shut down a weather site after a scraper inflated pay‑per‑call costs.
  • People discuss rate limiting, bot detection, and even serving fake data to bots. Some announce they will just scrape AccuWeather or its mobile app.

Alternative Weather Data Sources

  • Numerous free or low-cost alternatives are shared:
    • Government: NWS (US), Environment Canada, Norwegian MET/yr.no, KNMI (Netherlands), various European services.
    • Open/community: Open‑Meteo (heavily praised), Pirate Weather, wttr.in, RainViewer (radar), plus Home Assistant integrations and personal weather stations (Tempest, Ecowitt, PurpleAir).
    • Commercial with free tiers: OpenWeather, Apple WeatherKit (via paid dev account), others.
  • Several projects and libraries aggregate official national services (e.g., UniWeather.js) to bypass commercial middlemen.

Wider Internet & Climate Context

  • Commenters link this to a broader trend toward walled and “wallet” gardens, in part accelerated by AI-era mass scraping.
  • Climate politics loom large: some see undermining public weather infrastructure as part of a broader anti-science, anti-climate policy agenda; others frame it as ordinary conservative policymaking rather than coordinated conspiracy.

Major rule about cooking meat turns out to be wrong

What the article actually claims

  • Thread agrees the title is clickbait: the practice of resting isn’t “wrong,” but old explanations are.
  • The core claim: resting’s main purpose is managing carryover cooking and hitting target internal temperature, not “locking in juices.”
  • Experiments cited show no meaningful difference in perceived juiciness between rested and unrested meat when final slicing temperature is controlled.

Resting: juiciness vs temperature control

  • Many commenters insist anecdotally that resting “keeps juices in,” pointing to puddles of liquid when cutting immediately.
  • The newer model: juice loss depends on temperature at slicing (vapor pressure/thermal pressure), not on rest time per se. Resting only helps insofar as it changes temperature.
  • Some argue the article under‑emphasizes that ideal practice is: pull early, let temperature rise via carryover, then cool somewhat before slicing.

Carryover cooking and practical technique

  • General consensus: pull meat 5–15°F (sometimes more) below target, especially for thick cuts, and let carryover finish the cook.
  • Thin items (skirt steak, shrimp) need very short rests; large roasts or barbecue can benefit from long, warm holds.
  • Several people highlight predictive / multi-sensor thermometers as game‑changers for timing pull and rest.
  • Environment matters: air temp, resting surface, and whether you hold in a warm oven or insulated box significantly change the curve.

Sous vide, reverse sear, and BBQ competitions

  • Sous vide (and low‑temperature reverse sear) largely eliminates carryover; many say no rest is needed there.
  • Side thread on BBQ competitions: many apparently ban sous vide/low‑temp water baths to preserve “authentic” smoked‑meat technique and difficulty, not just flavor.

Science, tradition, and disagreement

  • Some see this as a classic case of folk “rules” that worked but had the wrong physics, later corrected by measurement.
  • Others say serious kitchens have long used resting explicitly to ride carryover to target doneness, not for mystical “juice reabsorption.”
  • A few criticize the article as product-adjacent or rehashing older work; others praise it for clear experiments and for debunking searing/resting myths with data.

How to increase your surface area for luck

Perceptions of the advice

  • Several readers see the piece as re-packaged self‑help/networking advice: “grow your network,” “act like the job you want,” “say yes more.”
  • Others like it because it frames things as memorable mindsets (curiosity, giving first, airing weirdness), which they feel are easier to recall and act on.
  • One critique is that it’s fuzzy and unstructured: you can burn out chasing “microlucks” without real progress unless you’re more strategic about where you look for luck.

Hosting events and social serendipity

  • Strong support for “host events”: hosting is seen as higher‑leverage than passively attending, and many note that most scenes lack enough organizers.
  • Concrete example: a weekly “project night” where people bring personal projects led to a thriving community and steady inflow of new people.
  • Some pushback: coordinating people is exhausting, cancellations are common, and managing others can feel like “herding.”

Curiosity, authenticity, and personality fit

  • Multiple commenters credit intense curiosity as central to their success; others feel stuck because curiosity doesn’t easily translate into sharable output or career change.
  • “Air your weirdness” resonates: hiding quirks is seen as counterproductive, though there’s a caution against faked eccentricity.
  • Introverts worry the model implicitly assumes extreme extroversion; suggested workaround is “role‑playing” an extrovert persona at events.

Luck, privilege, and preparation

  • Big thread on structural luck: being born in a rich country with computers is framed as a massive, often squandered advantage.
  • Some argue success is mostly about seizing opportunities given your starting point; others insist initial conditions dominate outcomes and Western narratives underplay this.
  • A reconciliatory view: luck delivers opportunities randomly; work, skill, and preparation determine whether you can use them.

Risk, failure, and strategy

  • Debate over “fortune favors the bold”: one side urges more risk‑taking and not overestimating imagined dangers; another stresses underappreciated catastrophic risks.
  • Idea of “bulk positive randomness”: increase variance where downside is small (meeting people, trying projects), reduce it where downside is large (health, safety).
  • Some advocate studying failures and “non‑ergodic” dynamics (avoid ruin) rather than obsessing over copying rare success stories.

Concept and origins of “luck surface area”

  • Commenters reference an earlier formulation: luck ≈ doing × telling—build real things and talk about them publicly.
  • Compared to that, the article is seen by some as drifting toward style and mindset, away from concrete “build in public” and “be visible” tactics.

Employee – CEO pay gap historically wide

Proposed fixes: caps, taxation, and worker power

  • Some want hard legal limits on CEO pay relative to lowest worker pay or “Jack and Jill” averages, or very high marginal tax rates (e.g., 90%) to discourage extreme packages.
  • Pushback: high rates invite loopholes, offshoring, and personal relocation; incentives for “top talent” and high earners could be damaged.
  • Others argue the focus should be on strengthening labor: more unions, guilds, and collective action (including strikes) over issues like RTO mandates, surprise layoffs, weakened benefits, and AI deployment.
  • Skeptics note workers’ fear of losing jobs, high cost of living, health insurance tied to employment, and visa dependence all undermine strike leverage.

Power structures: technofeudalism, oligarchy, and antitrust

  • Several frame the situation as “oligarchy” or “technofeudalism,” where a small elite owns assets and rents everything to everyone else (including software/LLMs).
  • There is debate over whether tech workers are “lords” or just skilled blacksmiths still at the mercy of corporate “lords.”
  • Some call for aggressive antitrust action and breakup of large tech firms to restore competition and bargaining power.

CEO pay: value, risk, and fairness

  • One camp argues huge CEO pay can be rational if markets expect strong performance (e.g., citing a CEO hire that coincided with a large stock jump), and that compensation aligns with legal, strategic, and reputational risk.
  • Critics respond that many CEOs face little real downside—golden parachutes, rapid re‑hiring, and minimal legal consequences—while workers live paycheck to paycheck. “Risk” is seen as overstated.
  • Others question the moral and political power concentration; even if cutting CEO pay doesn’t massively raise wages, they still see high pay as corrosive.

Metrics and narratives

  • Multiple commenters challenge the headline and commonly cited ratios: the S&P 500 CEO-to-worker gap is up year over year but below a recent peak; comparing top 500 CEOs to all workers (or to all CEOs) is called misleading.
  • Wage-only comparisons exclude equity, which dominates executive compensation, but worker total compensation and tax progressivity are also contested.
  • Some see the CEO–worker ratio as emotional “agitprop”; others see it as a useful signal of extreme inequality even if it’s an imperfect statistic.

Broader structural factors

  • Suggested contributors include weak antitrust, policy choices like performance-based pay tax rules, offshoring and China trade integration, and immigration regimes (e.g., H‑1B) allegedly used to depress wages.
  • There is disagreement over which of these are primary drivers and how much any single law or court case (e.g., shareholder primacy doctrines) really explains today’s pay gaps.

CARA – High precision robot dog using rope

Overall Reception and Presentation

  • Commenters are highly impressed by both the engineering and the clarity of the video; many call it a “masterclass” in DIY robotics and communication.
  • The cinematography and structured explanation (problem → design → testing → iteration) are praised as unusually good for YouTube.
  • Several people express personal motivation and even “jealousy in a good way” about the quality of the portfolio.

Capstan Rope Drive, Materials, and Wear

  • The capstan drive is lauded for high torque, speed, compliance, and essentially zero backlash compared to gears.
  • Dyneema/UHMWPE rope is highlighted as a “game changer”: very strong, light, low stretch; compared favorably to steel cables (lighter, less fatigue, easier handling) but more heat-sensitive than Kevlar or steel.
  • There is curiosity and skepticism about long‑term fatigue and wear; others point to the creator’s earlier multi‑week endurance test with low backlash drift.

Precision, Gear Ratios, and Kinematics

  • Debate over why an “exact” 8:1 ratio matters:
    • One side: extra digits don’t inherently mean more precision.
    • Other side: knowing the exact ratio is crucial for inverse kinematics, easier debugging, and repeatability.
  • Simple, “clean” ratios help verify behavior by counting rotations and aligning marks.

Control Algorithms and Discovery Algorithms

  • The robot reportedly uses relatively simple gait/control algorithms (e.g., cycloid-based timing), making the performance more impressive and leaving room for future RL/optimization.
  • A long sub‑thread critiques YouTube’s discovery and search algorithms—over‑fitting to recent views, poor handling of near‑exact search terms, and difficulty discovering older “goldmine” channels—despite evidence that very niche robotics videos do sometimes get surfaced.

Ethics, Dread, and Future Warfare

  • Some express dread: advances that make hobby robot dogs possible also lower the cost of semi‑autonomous weapons and “borderless warfare.”
  • Others argue autonomous weapons might eventually reduce human casualties or that fears are overblown; strong disagreement follows, with discussion of Ukraine, Gaza, nuclear deterrence, and cartel use of drones.

DIY Robotics and How to Start

  • Multiple commenters feel this is a “golden age of DIY engineering” thanks to cheap 3D printers, electronics, and online instruction.
  • Suggested starting points for newcomers: Arduino, hobby servos, small robot kits, plotter‑style arms like Brachiograph, and tutorials from hobby electronics sites.

Creator Careers and Platforms

  • There’s debate on whether a highly capable builder should:
    • Stay independent with YouTube, sponsorships, and possibly a startup;
    • Or join an established R&D team to avoid business overhead.
  • Monetary viability is seen as mixed: some creators do very well, others earn less than equivalent corporate engineering roles but value autonomy and reduced corporate stress.

YouTube AI Translation and UX Issues

  • Several people encounter an unwanted auto‑dubbed AI translation track (e.g., German) on the embedded video, calling it jarring and misleading.
  • Explanation: YouTube has begun auto‑adding AI voice translations by default; viewers can manually switch audio tracks, and uploaders must explicitly opt out per video.
  • At least one user references a browser extension to disable these auto‑translations.

Power, Applications, and Comparisons

  • Commenters speculate about power consumption and duty cycle of such robots, comparing them to MIT’s Cheetah and Boston Dynamics dogs; rough figures from prior research suggest ~30 minutes of intense running on a sizable battery.
  • Some brainstorm alternate applications for capstan drives, such as telescope mounts, or improving rolling‑contact geometries for long‑distance legged locomotion.
  • Reactions to “robot dogs” themselves are mixed: some are excited for future personal/security use, others find the idea unsettling or undesirable.

The Promised LAN

Nature and goals of TPL

  • Described as a “virtual permanent LAN party” for a small, tightly knit group, more akin to building a mini-Internet than a gaming VPN.
  • Built to recreate a pre-algorithmic, non-commercial, “small internet” for friends: IRC, SIP “red phones”, LAN-only email, NAS swaps, thermal printers, and other odd services.
  • The linked manifesto is widely praised as the best explanation and an inspiration to build similar networks, not an invitation to join this one.

Membership, privacy, and social dynamics

  • Membership is explicitly closed and based on long-standing offline relationships and trust; not intended as a public community or recruitment vehicle.
  • Some see this as a “no girls allowed treehouse” vibe or exclusionary; others argue it’s healthy and normal for close-knit groups to have private spaces.
  • The project is framed as a model for others to copy with their own friend groups.

Technical architecture & protocol choices

  • Built as an L3 overlay: multiple independently run backbone nodes (Debian/strongSwan, OpenBSD/iked) peered with IPSec and BGP, forming a small routed network.
  • IPSec is defended as “industry standard,” well-understood by many, and supported natively on mainstream OSes; critics call it tricky and wish for WireGuard.
  • Discussion notes that L2 behavior (for legacy/IPX games, broadcast discovery) is easier via L2TP/IPsec or GRE, but TPL appears to be mostly L3.
  • Some are disappointed by IPv4-only and lack of WireGuard; others say the tech stack matches the operators’ backgrounds and the “fun of doing it the hard way.”

Alternatives and “just use X”

  • Tailscale/Headscale, WireGuard meshes, SoftEther, ZeroTier are raised as simpler ways to achieve similar connectivity.
  • Supporters counter that the “custom jiggery pokery” is the point: the network itself is the hobby and a way to deepen real-world networking skills.

Use cases: gaming vs socializing

  • Multiple commenters assume it’s for video games and are frustrated the site doesn’t list what’s played.
  • Insiders clarify that few or no games are played; it’s mostly socializing, IRC, weird services, and hardware tinkering. The network is the toy.

Security, trust, and exposure

  • Some members fully expose home LANs; others isolate via VLANs and limited segments.
  • Security concern: malware from one household potentially spreading across the shared network.
  • Defenders argue the model depends on strong social trust and norms that don’t scale to “everyone on the internet,” which is deliberate.

LAN vs WAN semantics and nostalgia

  • Debate over whether this is really a LAN (single broadcast domain) or a WAN/VPN; many say “LAN party” now reasonably includes virtual LANs.
  • Long subthread of nostalgia for 90s/00s in-person LAN parties, CRT hauling, IPX/SPX, BNC cabling, and school/office lab game hijinks.

Broader reflections

  • Some call it “reinventing the internet” or a gimmick that doesn’t fix reliance on the public web for content and communication.
  • Others see it as a concrete, joyful answer to dissatisfaction with today’s ad-driven, AI-laden Internet: small, trusted, self-run networks among friends.

You can now disable all AI features in Zed

AI control & philosophy

  • Strong approval for a single setting to disable all AI; many see this as “respecting the developer” and necessary for interviews, focus, or moral/privacy reasons.
  • Some prefer AI to remain decoupled (separate tools or terminals) rather than tightly embedded in the editor.
  • Others still want finer-grained control: enum-style modes, feature-by-feature toggles, or “disable_llm but keep classic autocomplete.”
  • A few note that Zed’s AI has always been optional via scattered settings; this new flag mainly centralizes control.
  • Naming disable_ai: false draws criticism as a confusing double negative; some argue for enable_ai: true, others say “disable” better conveys that everything is off.

AI feature quality & competition

  • Multiple users feel Zed’s AI is lagging Cursor and Copilot, especially in tab completion; Cursor’s context-aware completions are described as “mind-reading.”
  • Agent/chat mode in Zed is seen as decent but behind “background agents” workflows (e.g., offloading small maintenance tasks, upgrades, and fixes).
  • Some are happy with Zed’s agent and overall UX and are willing to accept weaker autocomplete to avoid VS Code–derived editors.

Core editor UX, performance & rendering

  • Zed’s speed and low input latency are widely praised, especially on macOS; several call it a spiritual successor to Sublime.
  • On Linux, experiences are mixed: some report worse latency and font rendering than VS Code; others say it’s fine but still early/“beta.”
  • GPU and battery usage can be high; turning off the minimap is a common workaround.
  • The multi-buffer/diff UI is polarizing: some call it Zed’s best innovation, others find it confusing and want single-file, full-context diffs. Tips: click line numbers, use Alt+Enter, enable double_click_in_multibuffer: "open".

Modal editing & configuration

  • Opinions on Vim mode diverge: some say it’s one of the best emulations they’ve used; others find it an “afterthought” vs Helix/Neovim.
  • No .vimrc import, but custom keybindings (e.g. mapping j k to Escape) are possible via JSON config.
  • Some users dislike the raw JSON settings with no GUI or commented skeleton.

Design, themes & ecosystem

  • Several users dislike Zed’s default themes and UI styling, calling them bland or low-contrast, especially autocomplete popovers.
  • Workarounds include porting VS Code themes, using community themes, or hand-rolling custom schemes.
  • Plugin/ecosystem gaps, Git log/diff limitations, weaker C# tooling, and less capable search/fuzzy navigation keep some on VS Code/JetBrains/Neovim.

Business model, trust & telemetry

  • Sustaining a free, open editor is a recurring concern. Users worry incentives will push toward “enshittification” via AI upsell or tracking.
  • Zed’s CLA and permissive-dependency policy are seen by some as positioning for future relicensing/enterprise builds.
  • Telemetry and the possibility of phoning home (even if disabled by a flag) make a few users uneasy; some suggest firewall rules in addition to config.

Neil Armstrong's customs form for moon rocks (2016)

Customs Forms and Space Travel

  • Many commenters see Armstrong’s customs form as a light-hearted stunt, confirmed by a NASA spokesperson in a linked article, while others emphasize that astronauts routinely file travel paperwork even when rules don’t strictly fit (e.g., ISS missions, trips via Baikonur).
  • Debate over why rules apply in edge cases:
    • Some argue it’s easier to follow existing procedures than carve out exceptions.
    • Others criticize “rules at all costs” as wasteful and absurd.
    • Mention that US regulations often contain broad carve-outs (“at the discretion of…”), so human judgment can be used.

Legal Status of Space and the Moon

  • Several comments frame the customs form in the context of the 1967 Outer Space Treaty: space and the Moon are “international” and not claimable as national territory.
  • Discussion compares space to:
    • International waters and US Navy ships (US jurisdiction follows the vessel).
    • Antarctica (as a “legal dead zone” model chosen for space governance).
  • Some suggest NASA wanted to stress the civilian, non-militarized nature of spaceflight by having astronauts go through normal customs.

Apollo Quarantine: Theater vs. Real Precaution

  • One branch argues Apollo quarantine and similar measures were mostly “publicity theater” or security theater.
  • Others push back:
    • Archival evidence (as summarized in linked articles) suggests NASA thought contamination risk was low but non-trivial and took it seriously.
    • The system had many gaps and bureaucratic silliness (e.g., lunar soil tested on “germ-free” mice; flawed indium seals; impractical glove boxes), but this is characterized as imperfect precaution, not purely for show.
  • A first-hand anecdote (from a lunar sample scientist’s notes) describes multiple agencies asserting jurisdiction, creating unnecessary constraints and failed technical approaches.

Borders, Passports, and Bureaucracy

  • Thread digresses into a long argument about historical borders and passports:
    • One view: modern passports restrict previously freer human movement and symbolize state control.
    • Counterview: borders and guarded crossings long predate modern passports; passports actually facilitate more predictable, safer movement than earlier arbitrary treatment at borders.
  • Multiple anecdotes about customs oddities (oil platform declared as one item, military/naval travel, accidental “invasions,” paratrooper reenactments) illustrate how rigid systems collide with unusual situations.

Astronauts, Insurance, and Human Angle

  • Discussion of “Apollo insurance covers” (autographed postal covers for families if astronauts died) prompts criticism that a country could send people to the Moon without fully securing their families’ financial future, though others note existing military/government survivor benefits.
  • A few comments highlight the charm of the original editor’s anecdote and the analog nature of forms, and one commenter expresses lingering doubt about modern capability to repeat Apollo, hinting at moon-landing skepticism.

US AI Action Plan

Geopolitics and AI “Race”

  • Many see the plan as formalizing a US–China AI arms race, with AI framed as national power and security.
  • Some argue China’s authoritarian system gives it an advantage in coordinated AI and infrastructure pushes; others reject the idea that the US should become more autocratic “to compete.”

Ideology, Free Speech, and “Woke AI”

  • Strong focus on “free speech” and “American values” is widely read as code for enforcing a particular political ideology.
  • A linked executive order on “preventing woke AI” explicitly bans concepts like unconscious bias, intersectionality, systemic racism, and “transgenderism” from federal models.
  • Commenters note this directly contradicts claims of neutrality and free speech, and predict models used by government will be forced to align with the ruling administration’s “truth.”

Open-Source / Open-Weight Models

  • Some welcome explicit support for open-source/open-weight models and see it as a counterweight to proposals to ban them.
  • Others call the language vague “vibe signaling” with no real funding or concrete support, and warn open weights are harder to monitor and can be repurposed for large-scale misinformation.
  • Debate over whether political neutrality is even possible; several argue all models inevitably embody human ideologies.

Energy and Climate Policy

  • The plan calls for “vast AI infrastructure” and more “dispatchable” power, while rejecting “radical climate dogma” and barely mentioning renewables.
  • Many expect this will mean deregulation for fossil fuels and delayed solar/wind buildout, despite nuclear restarts being highlighted.
  • Long subthread on solar vs nuclear costs, land use, water use, and storage; no consensus, but broad concern that clean energy strategy is being subordinated to short‑term politics.

Healthcare and “Try-First” Culture

  • The push for a “try-first” AI culture in sectors like healthcare alarms many, given existing safety and liability regimes.
  • People predict aggressive AI deployment for billing and claim denials rather than patient care, reinforcing already dystopian incentives.
  • A minority points to early research where AI can outperform doctors on some diagnostic tasks, but most insist this is not ready for unregulated rollout.

Legal System and Synthetic Media

  • The “Combat Synthetic Media in the Legal System” pillar is read as mainly about deepfake evidence and watermarking standards.
  • Commenters note tension between promoting generative models everywhere and trying to keep AI-generated media out of courts.

Implementation, Capture, and Competence

  • Widespread skepticism that the government has the state capacity or talent to execute beyond speeches and large contracts.
  • Expectation that major winners will be entrenched contractors and big AI vendors (Palantir, cloud giants), not the public.
  • Several view the Trump-heavy branding and personality‑cult aesthetics of the site as a preview of how “AI alignment” will be politicized.

Missing Pieces and Broader Fears

  • Notably absent: serious treatment of workforce displacement, social impacts, or making skilled immigration easier.
  • Some foresee AI being used primarily as a propaganda and control tool; a few call for global bans on AGI development, but acknowledge that this view is now marginal.

Building better AI tools

Pace, incentives, and organizational reality

  • Several comments doubt industry will “slow down” or prioritize learning-first workflows in competitive corporate contexts.
  • Committees and shared responsibility are seen as blocking bold rethinks of tooling; people fear “rocking the boat.”
  • Others argue Innovator’s Dilemma and organizational incentives, not lack of creativity, are what really block change.

Interfaces: chatbots vs “intelligent workspaces”

  • Many want richer, tool-heavy “intelligent workspaces” instead of raw chatbots: environments tightly integrated with logs, code, infra, and explicit controls.
  • It’s acknowledged this is harder and costlier than “AI in a textbox,” so vendors skew toward selling to management vs building better UX.
  • Team-context sharing between coding agents (Claude Code, Cursor, etc.) is desired, but concerns arise about loss of control over context and potential for abuse or miscoordination.

Human-in-the-loop vs autonomous agents (especially in ops)

  • Strong debate over how far incident-response agents should go:
    • One side: AI should mostly suggest, not act, due to non-determinism, safety, and the need for humans to practice diagnostic skills.
    • Other side: many investigative steps (log queries, state dumps, anomaly detection) are low-risk and computers are inherently better at them; blocking automation there “wastes time.”
  • Broad agreement that unsupervised destructive actions (e.g., Terraform apply, dropping data, DB wipes) are unacceptable today.

Skills, learning, and “deskilling”

  • Many worry AI coding erodes deep fluency, like GPS eroding navigation or calculators eroding arithmetic; practice (“paint-the-fence”) is seen as key for design skill and mental models.
  • Others counter that higher-level thinking is the real bottleneck; code can become an “implementation detail” if reviewed well.
  • Some report AI actually deepens learning via debugging its flawed output or using it for scaffolding while still reasoning through designs.
  • Parallel debate over creativity: is AI a “bicycle for the mind” or a “credit card for the mind” that eventually presents a cognitive bill?

Designing better AI tooling

  • Many resonate with starting from architecture, specs, and tests, then delegating implementation to AI; AI works best with clear structure, types, and docs.
  • Preference for HITL tools that guide, question, and nudge (Clippy-like) over “magic wand” agents that spit out final answers.
  • Some highlight that current models already support this via careful system prompts; the real gap is product design philosophy, not raw capability.

Proxmox Donates €10k to the Perl and Raku Foundation

Size and significance of the €10k donation

  • Some feel €10k is small given Perl’s centrality to Proxmox, but others argue it’s far more than most companies using open source ever give back.
  • A commenter notes this sum is roughly a quarter of the Perl/Raku Foundation’s yearly revenue, which is both worrying (low overall funding) and encouraging (Proxmox’s impact is real).
  • Others emphasize that Proxmox is not a giant cash-printing enterprise and that its success relies on much more than Perl alone, making the donation proportionate.
  • The Foundation explicitly wants more sponsors in this range instead of depending on rare six‑figure donors; publicizing Proxmox’s gift is seen as a way to attract peers.

Proxmox’s tech stack and value-add

  • Proxmox is heavily based on Perl (plus HTML/JS and some Rust), atop QEMU/KVM and other free software.
  • Debate over whether Proxmox is “just a UX wrapper around QEMU”: several replies push back, citing clustering, SDN, Ceph integration, containers, backups, REST APIs, RBAC, and long-term upgrade paths as substantial engineering beyond a thin UI.
  • It’s popular in homelabs due to ease of use and being fully FOSS, but also reportedly used in sizable VMware replacement deployments.
  • Users praise its value for small businesses and labs, especially ease of managing ZFS and “pet” VMs.

Perl’s current status and use in new projects

  • Multiple participants confirm Perl 5 is actively maintained with recent releases and strong backward compatibility; very old code still typically runs.
  • There’s extended discussion of how rare language-level breaking changes are, with hash key ordering randomness cited as a notable but documented shift.
  • Some organizations continue to write greenfield backends in Perl, citing:
    • Cross‑platform reliability.
    • Strong text/file processing, especially with regex.
    • CPAN’s breadth.
    • Fast development and execution and low churn over decades.
  • Others consider choosing Perl for new systems a red flag and prefer Python or other languages; many “Perl shops” now use a second backend language.

Raku / “Perl 6” debate

  • Confusion persists around Perl 6: some call it a huge breaking change; others stress it was always a separate redesign and is now Raku.
  • Several lament that calling it “Perl 6” misled people into thinking Perl 5 was obsolete. Renaming to Raku is widely seen as the right move but late.
  • Raku is portrayed as niche but technically interesting (grammars, Unicode handling, lazy evaluation, hyper-operators), maintained by a small motivated team.

LLMs, idioms, and “one best way”

  • People report that modern LLMs can generate usable Perl, including with newer class syntax, though sometimes mixing in Moose/Raku concepts.
  • Some find Perl hard because of idioms and “there is more than one way to do it”; they wish for clearer “best practice” paths.
  • Others recommend resources like “Modern Perl” and “Perl Best Practices”, along with tools (perltidy, Perl::Critic) to standardize style and reduce choice overload.

Open-source funding and corporate culture

  • Multiple commenters describe failed attempts to direct budget surplus to OSS projects: managers see no precedent and balk at “paying for what we already have”.
  • Comparisons are drawn to individuals resisting paying for services they use heavily (e.g., YouTube Premium), and to microtransactions exploiting this psychology.
  • Suggestions include:
    • Framing donations as marketing/sponsorship (“brand awareness” at conferences) rather than altruism.
    • Emulating ESG-style reporting: a visible “we fund our open-source dependencies” section in annual reports.
    • Contributing code, QA, and bug reports when money isn’t feasible.
  • There’s broader frustration that it’s easier to raise millions for trendy products than thousands for foundational infrastructure like Perl or OpenSSL.

Regional and economic side-discussion

  • A tangent contrasts perceived frugality of many European tech companies (cheap hardware, cost-cutting culture) with higher spending norms at US firms; others partly confirm this but note structural differences (industry mix, margins, regulation, insolvency regimes).
  • Some push back on turning this into an anti‑EU narrative and point out that this particular donation story originates from a US-based foundation highlighting an Austrian company.

Community sentiment toward Perl and Proxmox

  • Several commenters express nostalgia and gratitude: Perl was foundational to their careers, and Proxmox delivers remarkable free value.
  • Others admit they assumed Perl was “dead” until this reminded them it’s still in active use and development.
  • A minority view calls further investment in Perl/Raku “beating a dead horse”, but this is countered with evidence of conferences, ongoing releases, and real-world deployments still generating significant revenue.

Uber will let women drivers and riders request to avoid being paired with men

Scope of the Feature & Fairness Debate

  • Central question: Why is same-sex matching offered only to women? Many argue equality means men should have the same option (e.g., men fearing false accusations from women passengers).
  • Others counter that this is “institutionalized discrimination” but justified by safety, not unlike allowing patients or massage clients to choose provider gender.
  • A faction insists discrimination is discrimination regardless of power dynamics; they argue that if this logic is accepted for sex, it would be unacceptable for race, so the standard is inconsistent.

Safety, Harassment, and Lived Experience

  • Numerous anecdotes of women being harassed, propositioned, stalked, or assaulted by male rideshare drivers; some are afraid to report or give low ratings because drivers know their home address.
  • Some note that background checks can only catch people with prior records; fundamentally it is “getting into a car with a stranger.”
  • A smaller thread highlights male fears of frivolous accusations, with some drivers installing cameras for self‑protection.

Segregation vs Integration

  • One side worries this normalizes gender segregation (analogies to separate bathrooms, women‑only train cars, some religious societies), arguing it may ultimately harm equality.
  • Others say optional women-only spaces are necessary for safety and comfort and don’t force anyone; they frame it as equity for a group already excluded by fear.
  • Debate over whether “safety for women” is an overused justification that can be abused to limit women’s freedom or trans inclusion.

Legal and Economic Questions

  • Unclear legality: tension with sex‑based discrimination rules in employment and public accommodation, complicated by Uber’s contractor model.
  • Comparisons made to women-only gyms, babysitter and doctor directories that allow gender filters, and “bona fide occupational qualification” carve‑outs.
  • Expected market effects: women choosing female drivers likely face higher prices or longer waits due to limited supply (often estimated far below 50%). Some foresee pressure to effectively pay women drivers more, raising discrimination concerns.

Alternatives and Longer-Term Fixes

  • Proposed alternatives: better vetting, more serious handling of complaints, mandatory or built‑in cameras, “safe and quiet” style filters, and ultimately self‑driving taxis.
  • Broader societal suggestions: reduce objectification of women, improve support for victims, and invest in education and cultural change rather than relying on segregation.

Why Elixir? Common misconceptions

Adoption, mindshare, and industry use

  • Many feel Elixir/BEAM is extremely well-suited to backend and “microservice-like” workloads, yet remains niche compared to Node/Java/Go.
  • Explanations offered: lack of marketing, resume-driven adoption, JS/TS hype cycle, organizational inertia, and language popularity being only weakly correlated with technical quality.
  • Some argue plenty of real systems run on Elixir (national data portals, banks, telecom, large chat platforms), but these deployments don’t get much visibility.
  • Others point out some early showcase companies have moved parts of their stack away, reinforcing perception risk.

Interop, ecosystem, and infra fit

  • Early DB tooling was perceived as Postgres-first and weaker for Oracle/SQLite, though others report Oracle and SQLite support are now workable.
  • Push to use BEAM primitives like ETS instead of Redis is seen by some as technically valid but “adoption-unfriendly” because it doesn’t align with common stacks.
  • Strong disagreement on Kubernetes fit: some say Elixir’s “do it all in one node/cluster” model clashes with ephemeral containers; others say Elixir works fine on k8s and is complementary if you understand both.
  • Concern that BEAM’s strengths (stateful processes, clustering, hot upgrades) are underused when Elixir is treated as “just another microservice.”

LiveView and frontend approaches

  • LiveView is praised for productivity and “no-JS” workflows, especially for internal/CRUD-style apps.
  • Critics argue it quietly turns a stateless web into a stateful, websocket-heavy system that’s fragile under crashes, deploys, or flaky connections, and that these tradeoffs are under-acknowledged.
  • Some prefer React/GraphQL or other frontends with Phoenix (Inertia, Vite, Channels); a few wish Phoenix embraced React more directly for consumer-grade UIs.

Erlang vs Elixir and learning path

  • Broad consensus: you can become highly productive in Elixir without learning Erlang first; Erlang knowledge is “nice to have” for deeper BEAM/OTP understanding, not a prerequisite.
  • Some prefer Erlang’s more “bare-metal” feel; others stress that processes, message passing, and behaviors are first-class in both and that they’re more like dialects than different languages.

Types, reliability, and “let it crash”

  • Lack of static typing is the single biggest hesitancy for many; others report years of productive use without it.
  • Supporters say pattern matching, guards, immutability, small set of core types, specs + Dialyzer, and strong test culture mitigate much of what people want from static types.
  • Opponents, especially in large codebases, say dynamic typing makes refactoring and onboarding harder; they miss compiler guarantees and precise tooling.
  • Ongoing work on gradual/set-theoretic types is noted, but several say it’s still far from TS/Go/Rust-level guarantees.
  • Long thread on “let it crash”:
    • Pro side: supervision trees and process isolation make crashes localized and auto-recoverable; better to optimize for recovery than attempt to preclude all failures.
    • Skeptical side: this doesn’t prevent logic/type bugs from reaching users; static typing and fault tolerance solve different problems and both can be valuable.

Developer experience, tooling, and docs

  • Many praise Elixir’s standard library consistency (especially around the pipe operator), OTP’s breadth, and exceptionally good, “how and why” style documentation.
  • The REPL, introspection into running systems, and BEAM observability are repeatedly called out as major quality-of-life wins.
  • VS Code LSP support (ElixirLS) exists and is actively used, though some still perceive the overall IDE story as weaker than mainstream typed languages.
  • Syntax divides people: control flow feels approachable to some, but pattern-matching/binary syntax and macros can look alien or intimidating.

Performance and where BEAM fits

  • BEAM is viewed as outstanding for IO-bound, highly concurrent, fault-tolerant systems, but not ideal for raw CPU-heavy workloads due to scheduling overhead and immutability costs.
  • Typical recommendation: keep performance hotspots in NIFs/ports or other languages, and orchestrate them from Elixir.
  • Some argue that AI/ML libraries like Nx/EXLA are impressive but lag far behind Python’s ecosystem and model coverage for practical ML/LLM work.

Alternatives: Gleam and others

  • Gleam frequently comes up as “Elixir + static typing”: BEAM-based, interops with Elixir/Erlang, and attractive to teams who like BEAM semantics but require static types.
  • Several commenters say they’d bet heavily on Gleam long term, or that their positive Elixir experience has made them look at Gleam.

Jobs and career calculus

  • Multiple people mention lack of Elixir job openings as a primary deterrent, even if they like the language technically.
  • This creates a chicken-and-egg problem: companies avoid Elixir due to perceived hiring pool risk; developers avoid it due to perceived job scarcity.

What to expect from Debian/Trixie

Upgrade & rollback concerns

  • Strong warning that Debian release upgrades (including to Trixie) are effectively one‑way: “system downgrade” is theoretically documented but practically fails and can leave systems unbootable.
  • Databases (MySQL/MariaDB) are highlighted as particularly irreversible because on‑disk formats are migrated.
  • Others counter that this has never been supported and Debian docs explicitly require full backups before release upgrades.
  • Several people suggest LVM, btrfs, or ZFS snapshots (and tools like Timeshift/Snapper or Mint’s snapshot rollbacks) as the realistic way to “revert”.
  • Comparisons with Windows/macOS rollback features; some feel Linux is behind here, others say imaging/snapshots cover the need if planned.

/tmp on tmpfs, swap, and memory behavior

  • New default of /tmp on tmpfs is controversial: critics worry a misbehaving program can easily exhaust RAM and destabilize the system, especially with large downloads.
  • Clarifications: default tmpfs is capped (typically ~50% of RAM per mount; newer systemd adds additional quotas). It won’t literally consume all memory, but multiple tmpfs mountpoints can still be problematic.
  • Advocates like the performance and SSD wear reduction for short‑lived temp files and note it’s easy to revert via tmp.mount or fstab.
  • Long, heated subthread on swap:
    • One camp: disable swap for better behavior under memory pressure and more effective OOM killing.
    • Other camp: a modest amount of swap greatly reduces I/O thrash and random OOM kills, especially on servers.
  • Trade‑offs around hibernation (requires swap), laptops vs servers, and kernel OOM behavior are heavily debated.

Network interface naming & systemd

  • Discovery that systemd has many evolving “predictable” naming schemes leads to frustration: interface names still change across upgrades, even in VMs.
  • Some administrators argue old MAC‑based naming (udev rules) was more stable; others note MACs aren’t always immutable and hardware replacement was a real problem.
  • Workarounds: pin net.ifnames=0 to keep eth0 style names; use .link files to set custom names; NamePolicy=keep discussed.
  • Critics see repeated churn and brittle behavior; defenders point to real enterprise bugs that motivated the change.

SSH, DNS, and other systemd‑integrated services

  • Reports that OpenSSH server is now socket‑activated under systemd on some installs; changing the port must be done in the socket unit, not just sshd_config. Some call this “madness” because SSH is the main admin lifeline.
  • Others say socket activation for sshd is longstanding Unix practice (inetd‑style) and offers benefits like smooth restarts and simpler dependencies.
  • systemd‑resolved + NetworkManager is described as fragile; some users lock /etc/resolv.conf with chattr +i to keep manual DNS.
  • Broader unease about systemd’s breadth and attack surface (referencing the xz/libsystemd incident); others stress individual systemd components can be disabled or replaced.

Packaging, filesystems, and distro comparisons

  • Multiple links to Debian packaging guides and policy; suggestion to use sponsorship/DD/DM process or pragmatic internal .deb approaches.
  • One commenter finds Debian’s native packaging tooling “far from sane” compared to RPM or BSD‑style ports; others ask if RPM‑based, btrfs‑friendly, LTS distros (openSUSE, Oracle Linux, Alpine) are better fits.
  • Discussion of btrfs support on various RHEL rebuilds and openSUSE flavors.

Experiences with Trixie/testing and advice

  • Many users report Trixie/testing as “boring and functional” on laptops, desktops, and even RISC‑V boards (with ZFS root), often for months.
  • Positive experiences with newer KDE/Plasma and Wayland, GNOME, sway gestures, updated Python (3.13), Podman/Quadlet, and current hardware enablement.
  • Caution: people who track testing (or stable) instead of codename (bookworm, trixie) get surprise major upgrades when releases flip. Strong advice: always pin by codename, especially for newcomers.
  • Some see Debian as extremely stable and ideal for “just works” servers; a minority report frequent breakage on Debian/Ubuntu vs Fedora and call Debian’s integration “hacky”.

Mail stack and service compatibility

  • Warning: Dovecot 2.4 in the new stable removes replication/director features and can break existing configs; some plan to stay on Bookworm or containerize Dovecot 2.3.
  • Concerns that Dovecot’s HA features are becoming commercial‑only; alternatives like Stalwart or third‑party replication tools are mentioned.

Miscellaneous Debian behavior & lifecycle comments

  • Noted long‑standing annoyances: su vs su - PATH behavior; Raspberry Pi firmware package interfering with backports kernel upgrades.
  • Some want better cloud‑native automation (Ignition/Butane‑like) rather than relying on cloud‑init/Ansible.
  • A few complain about constant churn in core stacks (GTK/Qt, firewalls, etc.) and wish an OS of this age changed less; others embrace the pace as acceptable given Debian’s stability focus.

Cops say criminals use a Google Pixel with GrapheneOS – I say that's freedom

Privacy, rights, and the “nothing to hide” trope

  • Many commenters reject the idea that only criminals need privacy; privacy is framed as a precondition for democracy, free speech, and healthy personal relationships.
  • “Nothing to hide” is criticized as both dishonest and dangerous: laws change, authorities can be corrupt, and you also hold other people’s private data (contacts, messages, photos).
  • Some argue it’s acceptable—and even healthy—for some “criminal” behavior to evade total enforcement, since many historically beneficial acts were once illegal.

Policing, profiling, and surveillance logic

  • Core worry: treating privacy-seeking (GrapheneOS, encrypted messaging) as inherent suspicion blurs the line between legitimate security work and mass surveillance.
  • People note that once surveillance infrastructure exists, it’s routinely abused, from petty vendettas to political repression; Snowden and Pegasus are cited as examples of systemic overreach.
  • Others counter that if, in a specific region, Pixel/GrapheneOS usage is heavily overrepresented among serious criminals, using that as one profiling signal is statistically rational—though still civil-liberties‑risky.

European policy and anti-privacy drift

  • Strong criticism of EU moves like “ChatControl” and broader anti-encryption trends; these are seen as backdoor mandates sold as child-protection but enabling cross-border political persecution.
  • Several comments describe mail-opening laws, drug-war justifications, and cooperation with US intelligence as evidence that privacy protections are being quietly dismantled.

Technology neutrality and “tools for criminals”

  • Recurrent analogy: banning or stigmatizing privacy tools (GrapheneOS, mixers, encryption) because criminals use them is like banning knives, fridges, or cash.
  • Debate around Roman Storm / Tornado Cash: some view it as a neutral privacy tool unfairly criminalized; others say operating a live mixing service is closer to active participation in money laundering.

GrapheneOS, hardware, and alternatives

  • Many users report positive experiences with GrapheneOS and see police hostility as validation that it meaningfully raises the bar for investigations.
  • Strong consensus that only Pixels currently meet GrapheneOS’ security requirements (secure element, update cadence, relockable bootloader without blowing fuses). Fairphone and similar devices are called “repairable but insecure” due to missing secure elements and slow patching.
  • Some are put off by GrapheneOS’ public relations style, describing the project as technically excellent but socially combative toward other privacy projects.

Trust, baseband, and “honeypot” worries

  • A minority argue that as long as the modem/baseband and firmware are closed, any mobile OS offers only partial protection; the stack ultimately serves vendors and possibly state actors.
  • Others respond that open source plus verifiable builds improve trust, even though you still trust builders unless you compile yourself.

Usability tradeoffs and ecosystem lock-in

  • Main practical downside repeatedly mentioned: no Google Pay / NFC payments (by design, due to SafetyNet/Play Integrity). Some banking apps and government attestation schemes also fail.
  • Sandboxed Google Play can be used for most apps, but SafetyNet‑dependent functionality remains an issue; users must weigh convenience vs. privacy.

Scope of the original “cops say” claim

  • Several point out the entire controversy traces back to a single offhand quote from one Spanish officer in one article, amplified through multiple tech news sites.
  • Some see this as overblown clickbait; others argue that even such small signals matter when they normalize equating privacy tools with criminality.