Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 226 of 356

TrackWeight: Turn your MacBook's trackpad into a digital weighing scale

Reactions to the idea

  • Many find the project delightful, “real Hacker News” material and a great classroom example of creative hardware hacking.
  • Others see it as a fun Rube Goldberg–style demo: cool to know it’s possible, but they’d still use a cheap dedicated digital scale.
  • A few note niche practical value (e.g., backpacking with a MacBook so you don’t also pack a kitchen scale), but overall it’s treated more as a novelty.

Usability & workflow

  • The requirement to keep a finger in contact with the trackpad while weighing is widely viewed as awkward.
  • People share tricks to satisfy capacitive sensing: hovering a finger, using wet sponges, foil shims, conductive foam, touchscreen stylus “nubs,” or even vegetables as capacitive styluses.
  • There’s some confusion and discussion about capacitive sensing needing a “human-sized” ground mass vs. how gloves and capacitive pens work.

Accuracy, range, and calibration

  • Several ask about precision and expected weight range; clear answers are limited.
  • One user reports readings up to ~7.3 kg by pressing as hard as possible, but warns against risking trackpad damage.
  • For objects, multiple reports say measurements are extremely inconsistent (same item giving wildly different values), suggesting the exposed API is tuned for finger force, not static loads.
  • Others suggest standard load-cell style calibration (2–3 known points) could improve results, and speculate Apple calibrates trackpads for consistent “feel,” not for weighing.

Private APIs & distribution

  • The app uses a wrapper over a macOS private framework (MultitouchSupport) to access raw pressure data not available in public APIs.
  • Commenters explain that private frameworks ship on macOS without headers; developers can reverse engineer headers and wrap them, but such use is barred from the App Store and possibly problematic for notarization.
  • Several people want a downloadable binary or .dmg; others note it’s more a tech demo meant to be built in Xcode by Mac developers.

Related sensor hacks & nostalgia

  • The thread recalls earlier “phone as scale” Web apps, barometer-based DIY scales, and older Mac/ThinkPad hacks using motion sensors for seismographs or gesture control.
  • There’s substantial nostalgia for iPhone 3D Touch, both as a weighing trick and as a superior UX mechanism that Apple removed.

UK backing down on Apple encryption backdoor after pressure from US

UK Backdoor Push and US Intervention

  • Thread centers on the UK’s demand that Apple add an encryption backdoor, and its subsequent retreat after pressure from the US executive branch and intelligence community.
  • Some expected UK–US alignment via 5 Eyes and are surprised the US opposed it; others suspect US agencies already have quieter access and don’t want a noisy, universal backdoor that adversaries could also exploit.
  • Several see this as evidence the post‑Brexit UK has little leverage and negotiating skill, and would have had more clout inside the EU.

Government Motives vs. Technical Reality

  • Many argue policymakers do understand the tech; the issue is authoritarian appetite for control, packaged as “child protection,” “law and order,” or “AI regulation.”
  • Others still blame a gerontocracy and non‑technical political class, but multiple comments note the security services and home‑affairs departments are very technically capable and drive these agendas.
  • Debate over whether demands for special access are “reasonable” extensions of traditional wiretaps vs. incompatible with modern mass surveillance capabilities.

UK Free Speech and Surveillance Climate

  • Commenters repeatedly cite UK arrests for “online communication offences” (thousands per year) as a warning sign, with examples of people jailed for inflammatory posts during riots.
  • One side calls this necessary action against racist incitement and harassment; the other sees it as criminalizing speech and approaching a “Stasi‑like” model.

Apple, Backdoors, and Trust

  • Strong skepticism that Apple’s “we have never built a back door” is the whole story, given its China compromises and push‑notification data sharing under secret orders.
  • Some assume “backing down” publicly just means access has been secured via other, secret mechanisms.

Broader EU/US Tech and Civil Society Angle

  • EU is criticized for its own “ProtectEU”‑style backdoor proposals; some Europeans advocate moving away from US tech entirely, though others doubt the EU can replace Big Tech.
  • Encryption is framed as a core tool for resisting increasingly authoritarian trends across Western governments.

Please, FOSS world, we need something like ChromeOS

Fragmentation, “choice”, and consumer usability

  • Many argue desktop Linux is shaped by engineers without product management: too many distros, desktops, package managers, and configuration choices for ordinary users.
  • This “9 clicks to shit” effect: first impression is good, but quickly degrades as users hit rough edges, inconsistent UIs, and integration bugs.
  • Others defend this diversity as “freedom and beauty”, seeing Linux as a customizable platform rather than a mass-market appliance.

Immutable, browser‑first OS vs traditional distros

  • Several comments stress that a basic Debian/Ubuntu/Mint install is not equivalent to ChromeOS:
    • Traditional package management drifts and breaks over time; atomic/A‑B systems with CI‑tested images are seen as closer to ChromeOS.
    • ChromeOS‑style simplicity is: “boot to browser, everything synced, no decisions about apps/desktops/packaging.”
  • Security isolation and immutability are emphasized: no sudo, no user‑writable host, verified boot; mistakes or malware disappear on reboot.

Hardware support and OEM preloads

  • A core obstacle: supporting the vast PC hardware matrix without a Google‑style certified device list.
  • Real‑world stories highlight Wi‑Fi, display, suspend, Bluetooth, and UEFI issues on general laptops and NUCs; long‑time Linux users often deliberately buy “Linux‑friendly” hardware.
  • Commenters note ChromeOS works largely because it is tightly coupled to specific hardware and ships preinstalled.

Business model and maintainer incentives

  • A ChromeOS‑like FOSS system needs many full‑time engineers doing unglamorous integration and QA; volunteers usually prefer scratching their own itches.
  • There’s “no money in consumer desktop Linux” unless it feeds another business (Google ecosystem, Apple hardware, Valve’s store).
  • Without a paying sponsor, a polished, locked‑down “just works” distro is seen as unlikely to be maintained long‑term.

Existing partial answers

  • EndlessOS, Fedora Silverblue/Bluefin, SteamOS/Bazzite, kiosk modes, and OSTree‑based systems are cited as close in spirit (immutable, curated, sometimes browser‑centric).
  • Their main gaps: limited preinstallation, hardware certification, and the absence of a large central entity to dictate and fund UX and integration.

Cloud, privacy, and philosophical mismatch

  • A browser‑first, cloud‑synced OS raises questions: who runs the cloud, who pays, and who can read/sell the data?
  • Some propose self‑hostable or S3‑backed, end‑to‑end encrypted sync; others say ChromeOS’s tight Google integration is exactly what FOSS people don’t want to build.
  • Several argue that “freedom is friction”: the very openness and user agency FOSS values are in tension with the frictionless appliance experience of ChromeOS.

You can now buy eggs from in-ovo sexed hens

Current practice & public awareness

  • Commenters emphasize that male chicks in egg production are typically killed almost immediately after hatching, often by maceration (industrial grinding) or gas, and are not raised or fed.
  • Several note how few consumers understand this; many mistakenly think males are raised for meat, or even that males can lay eggs.
  • There is confusion and disagreement about global and US chick-culling numbers, with people pointing out inconsistencies in cited figures and Wikipedia.

Economics and industry incentives

  • Some argue producers already have an economic incentive to adopt in-ovo sexing (saves on incubation, sexing labor, and handling), but current tech still adds a few cents per dozen eggs, making it more expensive for now.
  • Others think the share of eggs used to produce layers is small versus total egg volume, so savings might be modest until the technology gets cheaper.
  • There’s interest in whether this could reach widespread adoption given Europe’s early uptake.

Ethical debates: death, suffering, and “when life begins”

  • A major thread contrasts immediate death versus a short, stressful life in crowded conditions for hens. Some think instant death may be preferable; others see any chance at life as better.
  • In-ovo sexing is seen by many as a reduction in suffering, since embryos at 9–15 days are presumed not yet conscious, versus fully hatched chicks.
  • Others argue that focusing on male chick culling ignores the ongoing poor welfare and early slaughter of laying hens; some advocate veganism instead.

Perception of cruelty vs actual harm

  • Several point out that maceration is extremely fast and likely less painful than many natural or human deaths, but the visuals are viscerally disturbing.
  • Discussion touches on how emotional reactions can diverge from objective suffering, comparing lethal injection vs guillotine, and broader questions about the “sanctity of life.”

Technology details & open questions

  • Described methods include optical/spectroscopic imaging and sampling egg fluid for hormones or PCR-based sex-chromosome detection.
  • Clarification: fertilized eggs for breeding are sexed in-ovo; the eggs sold in stores are usually unfertilized, though fertilized eggs are also edible.
  • Some wonder if in-ovo destruction is morally much different from post-hatch culling, and whether the technology is genuinely impactful or just an ethical marketing tier.

I've launched 37 products in 5 years and not doing that again

Critique of “shotgun” product launching

  • Many see “37 products in 5 years” as emblematic of shallow, visionless building: tiny widgets chasing quick money and virality instead of real customer problems.
  • This is labeled “shotgun capitalism”: firing many low-effort shots hoping one hits, burning time, customers, and attention instead of coherently expanding around validated demand.
  • Several argue that these aren’t really “products” so much as quickly-cranked-out web apps with no moat, in hyper-competitive niches.

Customer discovery and market fit

  • Repeated theme: talk to real customers, ideally in domains you already know.
  • Suggested process: hang out where they are, become part of their community, run many conversations, find a handful of early adopters, iterate with them for months.
  • Books like The Lean Startup and The Mom Test are frequently cited as useful frameworks.
  • Others push back that spending years “finding a problem” can be just as wasteful; most people want a middle ground: use existing expertise to narrow ideas, then iterate.

Indie hacker ecosystem, influencers, and survivorship bias

  • Many commenters attribute this behavior to an influencer-driven “get rich quick” culture: build fast, tweet screenshots, sell tools to other builders.
  • Strong skepticism about copying well-known solo founders, whose later success is heavily brand-driven and subject to survivorship bias.
  • Some argue that much of the profit is in “selling shovels” (courses, templates, SaaS-for-SaaS) rather than solving real-world problems.

Ethics and quality of products

  • The spammy marketing product that was sold for six figures draws intense condemnation: AI-generated replies, deceptive “testimonials,” exploiting vulnerable people.
  • Commenters are disturbed that LLMs are so often used to create spam and low-trust content; some are glad those products don’t seem durable.

Marketing vs building; hobby vs business

  • Strong divide: builders who love crafting solid apps vs those focused on validation and revenue.
  • Several stress: if the goal is income, marketing and distribution matter more than code quality; if the goal is fun/learning, treat it as a hobby and drop business expectations.
  • Slow, patient growth and sticking with one problem space are repeatedly recommended, but many admit they struggle with patience.

Economics, exits, and burnout

  • The reported revenues and small acquisitions are seen by some as poor compensation for years of work; others note they could be life-changing in lower-cost regions.
  • Some see quickly selling small products as a way to clear mental debt (“idea #3487”) even if the cash is modest.
  • Several ex-indie hackers describe burning out on this cycle and switching to employment or more focused, long-term businesses.

What happens when housing prices go down?

Build-More Debate and Local Examples

  • Many argue “we haven’t really tried build-more”: decades of restrictive zoning, single-family mandates, and permitting bottlenecks in major cities.
  • Others counter with examples where supply did expand and prices softened or stabilized: Austin, parts of Texas and Florida, Vancouver/Toronto, Auckland’s mass upzoning, Cambridge MA ending single-family zoning.
  • Several note that builders build primarily where they can profit, not simply where need exists; land, infrastructure (runoff, utilities), and compliance costs push toward large, expensive projects rather than small, cheap units.

Supply vs Demand, and What ‘Demand’ Means

  • One thread claims policy only talks about supply and ignores demand. Others say demand is discussed, just indirectly via subsidies, immigration, and multi-home ownership.
  • Strong disagreement over definitions: some insist “demand” requires ability and willingness to pay at current prices; others talk about “unmet demand” from overcrowded, concealed, or homeless households priced out of the market.
  • Drivers of rising demand mentioned: more one-person and post-divorce households, strong preference for cities, immigration, and very limited willingness to share space long-term.

Landlords, Ownership Models, and Social Housing

  • A highly active sub-thread argues the landlord model is inherently unjust: tenants effectively pay off the asset yet never own it; proposals include banning landlords, limiting number of homes per owner, or requiring rent-to-own/co-ops.
  • Counterarguments: landlords take real financial risk, provide capital and mobility, and some projects fail; removing profit would sharply reduce new construction.
  • Social housing is proposed as an alternative; others recall failed or stigmatized public projects, while some point to successful programs and emphasize design, maintenance, and governance as key.

Price Drops, Construction Cycles, and Finance

  • Several commenters say the article confuses cause and effect: more supply leads to lower prices; lower prices then naturally slow new building once profitability falls—“mission accomplished” if affordability has improved.
  • Others emphasize financing structure: falling prices can make lenders and large developers pull back, especially with high interest rates, thin margins, and long build pipelines, potentially stalling needed supply.
  • Political economy looms large: homeowners and financial institutions are powerful constituencies; large, sudden price declines threaten perceived wealth and often prompt policy responses (rate cuts, bailouts, zoning resistance).

NIMBYism, Zoning, and Structural Issues

  • NIMBY opposition (property values, parking, “neighborhood character”) is described as a major brake on infill, ADUs, and “missing middle” housing, even when local politicians want more units.
  • Some see housing problems as symptoms of broader financialization: housing as a primary investment vehicle, leveraged by cheap money and protected by regulation and bailouts, rather than treated as basic infrastructure.

France launches criminal probe of X over alleged algorithm ‘manipulation’

Scope and Legal Basis of the Probe

  • Commenters note the investigation targets “alteration of the functioning of an automated data processing system” and “fraudulent extraction of data” by an organized group, under France’s cybercrime articles (323-2, etc.).
  • A legal analysis (cited in the thread) argues that secretly distorting a recommendation algorithm can be punished like hacking, even when done by the platform itself.
  • Some stress this is still just an investigation, not formal charges, and that French law hinges heavily on intent.

Is Changing Your Own Algorithm a Crime?

  • One camp is alarmed that anti‑hacking provisions might be extended to owners modifying their own systems, calling it dangerous overreach.
  • Others respond that the key issue is deceptive manipulation of users for political influence; if intent to distort public debate is proven, the analogy to hacking could hold.
  • There is speculation that even without criminal findings, the probe could push X toward being treated as a “publisher” rather than a neutral host.

Algorithmic Bias, Foreign Interference, and Evidence

  • Some argue that amplifying far‑right or extremist content, including via Grok’s antisemitic and racist outputs, fits “disproportionate propagation” and potentially foreign interference.
  • Skeptics say engagement-driven algorithms naturally favor more active (often right‑leaning) users and that small experiments showing bias are weak evidence.
  • There is debate over what counts as “disproportionate” and whether bias is intentional or emergent.

Free Speech vs. Hate Speech and Democratic Norms

  • Multiple comments contrast US-style broad speech protections with French/EU limits on hate speech, Holocaust denial, and incitement; some insist these limits enhance freedom for minorities, others see them as censorship.
  • One side worries this is part of a broader European trend toward surveillance, de-anonymization, and “social credit”-style control.
  • The counterpoint: other media (TV, radio, print, outdoor ads) are already tightly regulated in elections; social platforms with opaque algorithms should not be exempt.

Data Demands and Cross-Border Concerns

  • Some propose subpoenaing X for data on suspected foreign-influence accounts (IP, email, VPN use) and banning the service if it does not comply.
  • Others warn this is a “fishing expedition” that could let any state obtain data on dissidents under a vague “foreign influence” label, citing worries about authoritarian misuse.

Political Motivation and Partisan Framing

  • Several see the probe as politically motivated, tied to hostility toward Musk/X and to European fears about rising right-wing influence online.
  • Others reply that holding a powerful platform and its billionaire owner accountable under democratically enacted law is precisely what the rule of law requires, and that platforms long ago passed the “just hosting” line.

I wasted weeks hand optimizing assembly because I benchmarked on random data

Java and low‑latency / trading use cases

  • Several commenters note real-world trading systems whose “hot path” is in Java or C#, often with patterns like: no allocations in the hot path, GC disabled or effectively idle, and huge RAM/CPU overprovisioning.
  • Others see this as “writing C in Java”: lots of primitives, object pools, very limited String use, and even custom JIT tweaks or JVM forks.
  • Some argue Rust/C/C++ would be more natural for ultra‑low latency; others counter that Java offers strong memory safety, a large talent pool, and JIT tricks (pointer compression, dynamic realignment) that can make it surprisingly competitive.

GC behavior and memory model debates

  • Azul’s “pauseless” C4 collector is cited; another commenter clarifies that GC always has work to do, but C4 does it concurrently so application pauses are negligible.
  • Long thread on whether Java’s boxing and String design impose a “heavy cost” vs. generational GC making allocations almost just pointer bumps.
  • Counterarguments stress GC pressure, cache misses, and pointer chasing, especially with arrays of boxed types.
  • Future/value types (Project Valhalla) and .NET’s value/Span machinery are discussed as attempts to fix long‑standing layout/boxing pain.

Benchmarking and data distributions

  • Central lesson: microbenchmarks must use data distributions that match production; random data can either be “too adversarial” (as in the article) or “too nice” (e.g., well‑conditioned random matrices).
  • Identifying representative scenarios is described as one of the hardest parts of performance work, especially on the web. Tools mentioned: continuous profiling, RUM, tracing, JS self‑profiling APIs.
  • Legal/privacy often block simply capturing real production inputs; even aggregate statistics can be sensitive.
  • Profile‑guided optimization (offline or built into JITs) helps, but cannot replace good workload modeling.

Optimization stories, value, and risk

  • Multiple anecdotes echo the article: elaborate optimizations beaten by a trivial fast path for the dominant case; huge engineering effort yielding modest real‑world gains.
  • Some see “wasted” assembly work as valuable skill‑building and proof‑of‑concept experience; others warn about burnout and the risk of losing sight of end‑user impact.
  • A recurring theme: write simple, obviously correct code first; only optimize after profiling on realistic loads, and be prepared to throw experimental code away.

Varint / LEB128 performance discussion

  • Commenters dig into LEB128/varint encoding: SIMD can greatly accelerate worst‑case multi‑byte decodes, but real workloads often consist mostly of 1–2 byte values where simple branches win.
  • Alternative encodings (e.g., MKV’s) are praised as more self‑synchronizing and stream‑friendly.
  • Streaming and very large messages complicate SIMD tricks, since you can’t safely over‑read or pre‑buffer arbitrary bytes.

Writing is thinking

Relationship between Writing and Thinking

  • Several commenters report that writing exposes gaps, contradictions, and unstated assumptions in their ideas; the revision process itself feels like the thinking.
  • Others argue writing is often a symptom of prior synthesis: people think for days/weeks, then write once the structure is already in mind.
  • A common compromise view: writing is a tool for thinking, not identical with it; other tools include discussion, brainstorming, and teaching.
  • Some emphasize that how you write matters: iterative outlining, rearranging fragments, and visually laying things out can reveal structure and improve reasoning.

Alternative Modes of Thought

  • Commenters note that many people in the past (e.g., classic authors, orators) reportedly developed complex works largely in their heads, sometimes dictating them quickly later.
  • Abstract thinking is seen as especially aided by writing because external text acts like extra working memory or “cache,” making it easier to juggle many ideas.
  • Similar claims are extended to speaking, coding, drawing, and teaching as forms of “thinking out loud.”

Reading vs. Writing

  • Reading is variously described as “thinking someone else’s thoughts,” fine‑tuning one’s own “weights,” or even becoming a “stochastic parrot” if done passively.
  • Active reading (annotating, rewriting in one’s own words, “smart notes”) is framed as closer to thinking than passive consumption.

LLMs as Threat or Tool

  • One camp: letting LLMs write is letting them think for you, analogous to calculators weakening mental arithmetic or writing weakening memory.
  • Concern centers on students and early learners offloading too much, risking weaker development of reasoning and expression.
  • Another camp: LLMs, used judiciously, expand thinking—summarizing noisy sources, drafting, rephrasing to meet limits, improving grammar, or serving as a “rubber duck.”
  • There’s debate on whether LLMs can meaningfully assist with scientific papers beyond copyediting and formatting; critics see them as glorified typists, proponents as helpful with structure and style.

Gatekeeping, Style, and the Future

  • Good grammar and “native-like” style are seen as affecting peer review outcomes; LLM-based copyediting may reduce bias against non-native writers.
  • Others find AI-polished prose increasingly “grating” or homogenized, and worry about polluted training data and collapsing quality.
  • Several predict that, as with writing and calculators, thinking itself will adapt to ubiquitous LLMs; the key question is whether we use them as crutches or as thinking partners.

How to handle people dismissing io_uring as insecure? (2024)

Stale reputations and “once bitten” attitudes

  • Several comments compare io_uring’s reputation to PHP, Perl, Btrfs, MySQL, CoffeeScript, etc.: people freeze their opinion at an early, painful experience and ignore later improvements.
  • This “scar tissue” leads many to avoid a technology entirely, even if it is now materially better.

Where the “io_uring is insecure” meme comes from

  • The Wikipedia article is seen as a major source: it cites Google’s claim that ~60% of 2022 kernel exploits submitted to their bug bounty involved io_uring and notes it was disabled on Android, ChromeOS, and Google servers.
  • A later Wikipedia addition asserting that io_uring is now “no less secure than anything else” is criticized as being poorly supported and self-citing this very discussion.
  • Some point out Android’s history of shipping old kernels, implying many issues were already fixed upstream, but others note io_uring still has a steady stream of serious bugs and Google continues to find CVEs.

CVE counts and their meaning

  • One comment lists io_uring CVEs per year, showing a rising count through 2024, with some high‑severity issues still in 2025.
  • Others argue CVE volume is hard to interpret: it scales with adoption, kernel policy tends to assign CVEs liberally, and many entries are ordinary bugs or panics.
  • There is disagreement on whether this history justifies labeling io_uring “insecure,” or simply “complex and still maturing.”

Security model gaps: filtering and containers

  • A concrete security weakness today: io_uring “syscalls” cannot be filtered as precisely as classic syscalls via seccomp‑BPF/eBPF/LSMs, which weakens standard container hardening.
  • You can block io_uring globally (disable its syscalls or compile it out), but that makes software depending on it harder to deploy in locked‑down environments.
  • Security tool authors dislike that io_uring was designed with little initial consideration for filtering/auditing and later grew features like ioctl support, which are notoriously hard to sandbox.

Usage, threat models, and complexity

  • Some would happily use io_uring on dedicated, performance‑critical systems (HPC, finance, specialized servers), but avoid it in multi‑tenant or highly locked‑down environments until filtering/auditing catches up.
  • Others highlight non‑security concerns: the API is hard to use correctly; buffer and completion management can easily introduce subtle races and catastrophic failures under load.
  • A counterpoint is that per‑thread rings and careful design can simplify things, and io_uring uniquely enables fully async patterns (e.g., async file open) that improve concurrency models.

How to respond to “io_uring is insecure”

  • Several comments stress: don’t start from “critics are wrong.” Instead, acknowledge the real history of critical bugs and Google’s decision to disable it, then:
    • Present concrete data (CVE history, severity trends, comparison to other subsystems).
    • Be explicit about what io_uring does and does not change: it increases kernel attack surface; it doesn’t automatically make an individual application’s logic less secure.
    • Admit that trust must be rebuilt over time via a long period of quiet operation and better integration with security tooling.
  • Practical strategies suggested:
    • Formal verification of the front‑end validation layer to address both real flaws and reputation.
    • Gaining vendor endorsements (RHEL enabling it by default, major clouds allowing it in managed runtimes).
    • Being honest about trade‑offs: if your software targets environments where seccomp‑based hardening is standard, you may need to avoid or gate io_uring.
  • One meta‑point: it is acceptable to “agree to disagree”—for some threat models, disabling io_uring entirely remains a rational choice.

Log by time, not by count

Logs vs Metrics: Definitions and Roles

  • Many commenters say the post is really about metrics, not logs: “logging by time” is essentially emitting metrics at a fixed interval.
  • Common framing:
    • Logs = discrete, human-readable events for diagnostics and postmortem analysis.
    • Metrics = quantitative measurements over time, usually aggregated, used for dashboards, alerting, capacity planning.
  • Several note that at scale logs should be structured (JSON/logfmt) so they can be filtered and partially treated like metrics, but the conceptual goals differ.

Time-Based vs Count-Based Logging

  • Support for the post’s intuition: count-based “every N items” logs can overwhelm readers and backends; time-based summaries are often what humans actually want.
  • Critiques: if you want periodic summaries, that’s a metric; use a metrics system instead of repurposing logs.
  • Some point out a subtle bug: if your processing loop blocks when there’s no work, “log every T seconds” may not actually give a consistent log rate.
  • Others argue time-based throttling is useful in multithreaded code because it avoids global contended counters.

Observability Practices and Tooling

  • Strong SRE/ops sentiment:
    • Logs are for “why,” metrics are for “is it healthy,” and tracing is for following a request across services.
    • Do not rely on logs for health checks or alerting; use dedicated metrics (Prometheus, Datadog, etc.) and health endpoints.
  • Modern observability stacks ingest structured events, then derive metrics and traces later (OpenTelemetry, columnar backends, “wide events”).

Volume, Sampling, and Aggregation

  • At high volume you cannot log everything:
    • Metrics aggregate (counts, sums, max, etc.).
    • Logs are sampled or throttled (by time or probability).
    • Traces are sampled at the “request/span” level.
  • Several emphasize “filter and aggregate after ingestion, not in application code,” if storage allows.

Logging Best Practices and Pitfalls

  • Recommended patterns: per-request IDs, log important branches and errors, dynamically adjustable log levels (even per-user), structured logs.
  • Warnings against: using log search as a metrics system, unbounded verbose logging, and treating log stream behavior as a production interface that’s hard to change later.
  • Distinction between program logs, audit logs (e.g. flight data recorders), write-ahead logs, and event-sourcing streams is highlighted as often overlooked.

Man wearing metallic necklace dies after being sucked into MRI machine

Facility type and setting

  • Street View suggests this was a small, freestanding “open MRI” shop, not a hospital radiology department.
  • Several commenters find the setting “terrifying” and see it as evidence that low‑overhead outpatient centers may cut corners on staffing, training, and access control.
  • Others push back, saying non‑hospital imaging centers are common, can be excellent at a single specialty, and provide cheaper, faster access than hospitals.

Access control, responsibility, and negligence

  • Key point: the victim was not the patient but the patient’s husband, who entered the magnet room wearing a ~20 lb chain used for weight training.
  • MRI staff are faulted for allowing any non‑patient into the room and for apparently lax control between “zones” that should screen and block access.
  • Some argue the husband and wife share responsibility (ignoring warnings, treating it like a normal room), while others insist the burden is entirely on trained staff and facility design.
  • Several commenters note that in many units there are strong policies: locked doors, metal detectors or wands, stripping patients to undergarments, and no visitors in Zone IV.

Why “turning it off” isn’t simple

  • Multiple explanations: MRI magnets are superconducting coils with persistent current; “off” requires a “quench” that boils off liquid helium, costs tens of thousands of dollars, and takes tens of seconds to minutes for the field to decay.
  • Powering down like a normal electromagnet isn’t possible; the current loops indefinitely as long as it’s cold.
  • A side debate covers whether all modern MRIs have emergency quench buttons (most do) and how fast the field actually falls.

Should they have quenched immediately?

  • One camp: the moment a person is pinned to the magnet, cost and downtime are irrelevant; you hit the quench and do everything possible to save them (and you must shut down anyway to remove the chain/body).
  • Others note that damage from a 20 lb chain being yanked by thousands of pounds of force is likely catastrophic within milliseconds, so quenching may not change the outcome, though staff can’t know that in the moment.
  • Some worry about “trolley‑problem” tradeoffs (weeks of lost MRI capacity), but most respondents reject this as irrelevant once a life‑threatening accident is happening.

MRI hazards and safety culture

  • Commenters share examples of objects flying into magnets: pens, tools, oxygen tanks; even “safe” metals can heat from RF energy and cause burns.
  • MRI technologists describe complex screening: implants, clips, masks, joint hardware, etc., with many items “conditionally safe” depending on field strength.
  • Metal‑detector gates are widely proposed; MR techs reply that detectors are already used but generate constant alarms from small, usually safe metals, which can normalize ignoring alerts.
  • Several healthcare workers emphasize that most MRI suites follow strict protocols and that such lethal incidents are extraordinarily rare compared with the volume of scans.

Risk perception and communication

  • Many admit they did not realize the magnet is “always on.” Some recall minimal verbal explanation when scanned.
  • There is criticism of media framing (calling it a “necklace,” vague about “medical episode”) and missed opportunities to explain why the machine could not simply be “turned off.”
  • Broader point: humans intuitively fear snakes and heights, not invisible 3‑tesla fields; warnings need to be concrete (e.g., “this will rip your keys out of your pocket”) rather than abstract.

Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say

Scope of the SharePoint Hack

  • Thread centers on mass exploitation of an on‑premises SharePoint vulnerability (command injection leading to RCE via signed cookies).
  • Cloud versions (SharePoint Online / M365) are repeatedly noted as out of scope; the issue affects self‑hosted servers exposed to the internet.
  • Commenters highlight that many affected orgs likely had outdated, poorly maintained, internet‑facing SharePoint instances.

On‑Prem, Internet Exposure, and “Zero Trust”

  • Many are surprised anyone would run on‑prem SharePoint directly internet‑facing; they expected VPN‑only access.
  • Others argue VPNs are no longer enough, advocating “zero trust” models where every request is authenticated and encrypted, sometimes via brokers or reverse proxies.
  • There’s debate over whether these architectures truly reduce exposure versus just adding complexity and new single points of failure.

Speculation Around FBI / Epstein Files

  • Some point to reporting that Epstein/Maxwell files were distributed via loosely permissioned FBI SharePoint/Share drives.
  • A few speculate—without evidence—that the timing of disclosures might be linked; others treat this as coincidence or unclear.

Why SharePoint Is So Entrenched

  • Multiple comments: SharePoint is disliked, confusing, and historically fragile, but deeply integrated:
    • Backbone for OneDrive, Teams file storage, M365 Groups, and parts of Power Platform.
    • Tight integration with Exchange and Active Directory makes it the “default” for large orgs and governments.
  • Decision‑makers favor “nobody gets fired for buying Microsoft,” eDiscovery capabilities, and liability deflection over technical elegance.

Alternatives and the Linux/FOSS Debate

  • Alternatives mentioned: Nextcloud (+Collabora), Synology, various wikis/CMSs, Google Workspace, Zoho, Liferay, custom Git‑based setups.
  • Consensus: these can replace pieces (file sharing, docs, wikis) but not the full M365/SharePoint ecosystem, especially for legacy PowerApps/PowerAutomate workflows.
  • Long debate over whether Linux/FOSS would really be more secure:
    • Some argue monoculture and Microsoft’s incentive structure are the problem.
    • Others note FOSS also has severe CVEs (e.g., log4j), and security is fundamentally about process and incentives, not just OS.

Government, CISA, and DOGE/China Concerns

  • Anger that US agencies rely so heavily on Microsoft while cutting cybersecurity funding (CISA headcount reductions cited).
  • Strong criticism of Microsoft using China‑based engineers on DoD cloud programs; seen as obviously risky even if technically legal.
  • Several see this breach as part of a broader “war” in cyberspace, with US institutions under‑resourced and captured by cost‑cutting and outsourcing.

Peep Show is the most realistic portrayal of evil I have seen (2020)

Reception of the article and core thesis

  • Many readers enjoyed the character analysis but felt the central claim about “redefining evil” doesn’t quite hold; it reads more like a thoughtful fan essay than a decisive moral theory.
  • Others felt it resonated, especially the link between low self-worth and malicious behavior that feels “justified” in the moment.

Empathy, protagonists, and “we are the baddies”

  • Split views on identifying with Mark and Jez: some never empathized with them and see them as clearly awful; others see a lot of their own neuroses in the characters.
  • Discussion of how creators manipulate identification with flawed leads (Peep Show, Breaking Bad, The Sopranos, Seinfeld, The Office, Fawlty Towers, Blackadder, 30 Rock).
  • Several note that modern TV often makes you oscillate between rooting for and despising the protagonist, mirroring real-world rationalizations of bad behavior.

Cringe, social horror, and realism

  • Peep Show is widely classified as extreme “cringe humor” or even “social horror” because of its first-person shots and inner monologues that make viewers physically cringe.
  • Some question the article’s stress on realism: shows like The Thick of It feel totally unrealistic scene by scene yet capture corruption and incompetence with eerie psychological truth.

Low self-esteem, rationalization, and everyday evil

  • Multiple comments endorse the idea that low self-esteem and insecurity can be a significant driver of cruelty, often framed as “punching up” or as what a “loser” naturally does.
  • Others stress rationalization and cowardice: people bend reality to excuse small crimes or morally dubious consumption, and much harm comes from passively going along with systems.

Arendt, Eichmann, and the term “evil”

  • Extended side-debate about Hannah Arendt’s “banality of evil”:
    • One side emphasizes evidence that Eichmann was an eager, ambitious perpetrator, not a mere clerk.
    • Another clarifies that “banal” referred to his self-conception and bureaucratic normality, not to minimizing his crimes.
  • Some argue “evil” is a religious, anti‑intellectual label that obscures real causes of atrocities; others counter that dropping the term risks softening clear moral judgment.

FFmpeg devs boast of another 100x leap thanks to handwritten assembly code

Clarifying the “100x” Claim

  • Commenters note the article inconsistently says “100x” and “100%” speed boost; screenshots and mailing list posts show ~100.73× for a single function, not 100%.
  • That 100× applies to rangedetect8_avx512, not to FFmpeg overall. The whole filter may see closer to ~2×, and FFmpeg as a whole much less.
  • Baseline C code was compiled with -march=generic -fno-tree-vectorize, making the comparison very favorable to hand-tuned AVX-512. With vectorization enabled, independent benchmarks show more like 2.65× vs optimized C, not 100×.
  • Several people criticize the headline/marketing as misleading, even if the technical work is good.

Scope and Real-World Impact

  • The optimized function belongs to an “obscure filter” that detects color range (full vs limited) and related properties; it is not a general encoder/decoder speedup.
  • The filter is new, not yet committed, and only runs when explicitly requested by users who know they need that analysis.
  • For typical conversions—even large-scale pipelines—this is unlikely to change overall throughput in any noticeable way.

SIMD, AVX2/AVX-512, and Architecture Limits

  • The gains are primarily from SIMD vectorization (AVX2/AVX‑512) on 8‑bit data, not from “assembly magic” per se.
  • AVX‑512’s width and single‑instruction min/max on many bytes make the 100× microbenchmark speedup plausible on tiny hot-cache data.
  • Commenters note AVX-512 support is fragmented across x86 CPUs, and you can’t always rely on specific AVX‑512 subsets being present.

Auto-Vectorization vs Hand-Written SIMD/Assembly

  • Some argue modern compilers (GCC/Clang, MSVC) auto-vectorize simple loops very well and often schedule instructions better than humans.
  • Others report that auto-vectorization is brittle, varies across compilers/architectures, and cannot handle more complex kernels, data layouts (AoS vs SoA), or gather/scatter patterns.
  • ISPC is discussed: it can force vectorization but suffers from hardware gather/scatter inefficiencies, language limitations around access patterns, and precision and calling-convention quirks.
  • Consensus: for hot, complex kernels and non-trivial data structures, manual SIMD (intrinsics or assembly) is still routinely needed.

Benchmarking Skepticism and Macro vs Micro

  • Many emphasize that microbenchmarks (small buffers, hot caches, isolated functions) exaggerate speedups compared to real-world workloads with cache pressure and many interacting components.
  • Some suspect past FFmpeg “×90”–type claims were vs unoptimized (-O0) C; others stress that in any case these are tiny, rarely used code paths.
  • Several call for macrobenchmarks over realistic videos and filter pipelines; others describe statistical methods (blocking designs) that allow comparing versions without dedicated hardware.

Tough news for our UK users

Scope and Enforcement of the UK Online Safety Act

  • Commenters note the Act applies very broadly to any “user‑to‑user” or interactive service with UK users, not just big platforms.
  • Ofcom’s checker suggests even small forums or niche tools with UK visitors can fall in scope; the “significant number of UK users” concept is seen as vague.
  • Categorisation thresholds (millions of users) apply only to extra obligations; everyone else still gets a “duty of care” plus documentation and risk assessments.

Compliance Burden and Small Sites’ Response

  • Many argue the administrative and legal workload (thousands of pages of guidance, 70+ page summaries, risk matrices, potential £18m fines and criminal liability) is impossible for small teams or hobby projects.
  • Examples cited: a hamster enthusiast forum temporarily closing, a solo search engine (Marginalia) and personal forums considering or implementing UK geoblocks.
  • Several say it is rational to block UK IPs or UK signups rather than hire specialists and build age‑verification systems for a tiny user base.

JanitorAI, Porn, and Child Safety

  • People who clicked through describe JanitorAI as uncensored or lightly moderated AI chat, much of it sexual; many agree it clearly falls into “pornographic service” territory and thus high‑risk.
  • Some think the blog post underplays that risk and that this sort of service is exactly what lawmakers had in mind.
  • Others separate that from the structural problem: the same framework also hits benign small communities.

Age Verification, Parenting, and Harm

  • Strong debate over who should protect children: parents vs platforms vs government.
  • One camp insists “it’s parenting,” and laws will have big side effects while determined kids bypass checks anyway.
  • Another camp argues parental capacity is wildly uneven, online extremity is qualitatively worse than past eras, and pure “parental responsibility” is unrealistic.
  • Some support the goal (limiting children’s access to hardcore or violent material) but condemn this Act as heavy‑handed and likely ineffective.

Jurisdiction, Extradition, and VPNs

  • Questions raised: what if a site is run from abroad and ignores the law? Answers include blocking UK payments, arrest on entry, and theoretical extradition.
  • Detailed discussion on how countries like Germany treat UK extradition requests, especially post‑Brexit and given UK prison conditions.
  • VPN use is seen as the obvious workaround; several warn that platforms hinting at VPN circumvention might increase their legal exposure, since the Act prohibits helping users bypass checks.

Civil Liberties, Surveillance, and Political Context

  • Multiple comments see the Act as part of a broader UK drift toward censorship, over‑broad terrorism and hate‑speech laws, and eventual digital ID–linked surveillance.
  • Others push back, calling this a normal democratic outcome: both major parties backed “online safety,” and lawmakers, not just civil servants, voted it in.
  • There is concern that regulation with no size calibration entrenches large incumbents, accelerates “balkanisation” of the internet, and drives small, experimental sites offline or behind national geofences.

EU commissioner shocked by dangers of some goods sold by Shein and Temu

Overlap with Amazon and Other Platforms

  • Many commenters note that the same low-quality or unsafe Chinese goods are widely sold via Amazon, AliExpress, Allegro, local “dollar stores,” and even rebranded in brick‑and‑mortar shops.
  • Some argue Amazon has only marginally more accountability; counterfeits and non‑compliant electronics are said to be common there too.

Perceived EU Agenda and Geopolitics

  • Several see a campaign of “manufacturing consent” to restrict direct consumer imports from China, favoring EU intermediaries.
  • Others tie this to broader US–EU alignment against China and Russia, with talk of trade war, rearmament, and preserving Western industrial capacity.
  • A counter‑view: the EU’s primary mission is free trade and internal market harmonization; it has historically been lenient toward global trade, not protectionist.

Price Gaps, Middlemen, and Markups

  • Dramatic examples: scooters, bikes, zippers, art supplies costing 5–20× more in EU shops than on Taobao/Temu, sometimes seemingly identical items.
  • Defenders of local pricing cite VAT, customs, warehousing, warranties, staff, and regulatory compliance. Critics call much of it rent‑seeking and “institutionalized scam.”

Safety, Quality, and Accountability

  • Strong concern around cheap electronics: relays, chargers, lithium batteries, toys, plastics with heavy metals.
  • Experienced buyers report wild quality variance in unbranded Chinese goods; “lottery” dynamics vs. relatively predictable quality from established brands.
  • Debate over China’s own enforcement: some cite harsh domestic punishments for scandals; others insist Chinese goods remain “poisoned garbage” and distrust even for Chinese consumers.

Regulation, Enforcement, and Over‑Regulation

  • Many support enforcing EU safety, environmental, and warranty standards on all sellers, including Temu/Shein/Amazon.
  • Others complain of EU “overregulation” (e.g., drawstring rules) and say compliance becomes a paper exercise that raises costs without real safety gains.
  • Enforcement is seen as hard: sellers reappear under new names; proposals include making platforms fully liable, banning certain shippers, or removing de minimis tax thresholds.

Consumer Trade‑offs and Proposed Fixes

  • Consumers weigh 10–250× price differences against safety and ethics; some openly choose Temu and accept the risk, others prefer curated or premium retailers.
  • Suggested policies include much longer mandatory warranties (scaled by price) to favor durable goods, though critics fear it would stifle innovation.

Staying cool without refrigerants: Next-generation Peltier cooling

Background: Peltier Cooling Use and Decline

  • Commenters recall using Peltiers on late‑90s CPUs (e.g., K6), working “well enough” at ~20–30W TDP.
  • As CPU TDPs climbed to 100–300W+, Peltiers became impractical: they add substantial waste heat and have limited heat‑pumping density.
  • Main historical appeal: cooling below ambient for overclocking. Problems: condensation, algae/mold growth, and complex dew‑point management.

Efficiency, Scaling, and COP Debate

  • Thread repeatedly notes Peltiers don’t destroy heat, they move it and generate extra heat.
  • Typical thermoelectric COP is said to be ~0.5–0.7 (10% “efficiency” vs Carnot), far below vapor‑compression systems (COP ~2–4, ~45% of Carnot).
  • Others correct earlier misconceptions: at small ΔT, standard TECs can reach COP >1 (e.g., 20W pumped with 8W input), but this collapses quickly as ΔT grows.
  • Key constraints: thin devices with non‑zero thermal conductivity cause significant back‑leak; stacking modules increases ΔT but explodes power and complexity.

Samsung / JHU Claims and Skepticism

  • Article and JHU release claim ~75% better efficiency and COP ~15 at ΔT ~1.3°C using thin‑film structures.
  • Many see this as impressive only at tiny ΔT and likely far from practical refrigerator conditions (ΔT ~20–40°C).
  • Some critique the measurement methodology (indirect heat-flow estimates, small temperature differences, potential large systematic error).
  • Several ask what “75% better” concretely means and want real‑world kWh vs compressor fridges.

Hybrid Fridge Design and Temperature Control

  • Samsung’s “hybrid” fridge uses a compressor for bulk cooling and Peltiers for peak loads or fine control.
  • Some argue they’d prefer a larger or better‑controlled compressor; others note oversized compressors can short‑cycle.
  • Discussion branches into annoyance with wide fridge temperature swings, food-safety guidance (≈3–5°C), and uneven internal gradients.
  • A few see value in Peltiers for precise stabilization and more uniform temperatures if energy use is acceptable.

Noise, Silent Cooling, and Alternatives

  • Strong demand for quieter fridges, especially in studios; Peltiers and absorption fridges are mentioned as silent options, each with trade‑offs in cost, reliability, and efficiency.
  • Ideas include moving compressors outdoors or centralizing heat pumps for multiple home appliances; others note refrigerant plumbing, complexity, and regulatory hurdles.

AI Branding and Marketing Critique

  • Widespread mockery of terms like “Bespoke AI Hybrid Refrigerator” and “AI compressor”; most see only simple sensor‑driven logic or PID control.
  • Some note real uses of AI in materials discovery and process optimization, but agree the product’s “AI” appears to be pure marketing.
  • General sentiment: solid underlying thermo research, buried under buzzwords and vague efficiency claims.

Payment processors' bar on Japanese adult content endangers democracy (2024)

Democracy, Sovereignty, and Payment Power

  • Some argue centralized, surveillance-friendly payment networks that can “debank” people for disfavored but legal activities are inherently anti-democratic, since voters never chose this regime.
  • Others counter that it’s overstated: processors are choosing what they will facilitate, not setting binding “country-wide policy.”
  • The Japan case (e.g. Manga Library Z losing all payment contracts under foreign pressure) is cited as foreign corporations effectively bypassing Japanese democratic processes; skeptics reply that Japan has domestic payment options and could choose to use them.

Morality vs Risk: Why Processors Shun Adult Content

  • One side sees this as moral crusading or capitulation to small but loud activist groups targeting platforms and their payment partners.
  • Another insists it’s mainly economics: adult content has high chargeback/fraud rates, bad optics, and thus higher risk; some industries use “high-risk” processors or alternate methods (crypto, niche providers).
  • There’s disagreement over how willing major card brands are to work with porn; some say they happily process it, others cite real restrictions on platforms like Pornhub and bans by mainstream PSPs.

Global Attitudes to Adult Content

  • Several comments stress that many democracies (e.g. India, Russia, Ukraine, Australia) restrict or criminalize porn, often for non-religious reasons; the Western laissez-faire model is framed as the exception, not the norm.
  • Japan is described as officially censored yet practically saturated with adult media; others note recent laws and ratings decisions as evidence of tightening control.

Crypto and Alternative Rails

  • Crypto advocates present Bitcoin/Monero/self-hosted processors as the “cure” for centralized financial censorship and a practical workaround for adult content.
  • Critics highlight huge energy use, poor UX, volatility, regulatory KYC, fraud issues, and the fact that many crypto payment processors also ban adult industries. Some call crypto “a cure worse than the disease.”
  • Others push for public or neutral rails: instant bank transfers (Bizum, Pix, EU TIPS/IPR, FedNow-type systems) and “payment neutrality” akin to net neutrality, though many doubt legislatures will act.

Broader Trend: Control and Neutrality

  • A recurring theme is that governments use payment rails as a lever of extra-legal control (against porn, protests, risky speech).
  • Some conclude that both payment neutrality laws and widespread crypto adoption face long odds in an era of growing surveillance and centralized control.

Speeding up my ZSH shell

Oh-My-Zsh (OMZ) Bloat & Impact on Zsh

  • Many commenters say “zsh is fine; OMZ is the problem.” OMZ is seen as huge, slow, alias-heavy, and cluttering the namespace for little gain.
  • Several note that new zsh users are funneled into OMZ by online guides, then blame zsh for OMZ’s slowness.
  • Some consider OMZ borderline unsafe or “supply-chain risk” due to its size, auto-update behavior, and dependence outside the system package manager.
  • Others say OMZ works fine for them and prefer its convenience over hand-tuning zsh.

Lean Configs & Alternative Zsh Frameworks

  • Multiple people report large speedups by:
    • Removing OMZ entirely and re-implementing just the 3–4 features they actually use.
    • Using minimal plugin managers (Antidote, Antigen, ZimFW, Prezto, zgen, zimfw, zsh4humans) instead of OMZ.
    • Building small “lean” OMZ forks, or manually copying only needed OMZ plugins.
  • Advice: start with no plugins and add only what’s necessary; profile first to find real bottlenecks.

Prompts, Plugins, and Performance

  • Powerlevel10k is widely praised (instant prompt, transient prompt); concern that it’s “discontinued,” but others say it’s feature-complete and mostly in maintenance mode.
  • Starship is frequently recommended: fast, cross-shell, compiled; some warn it can be slow if language integrations call heavy tools (git, pyenv, etc.), so they disable many modules.
  • Spaceship users are encouraged to switch to Starship; fish users are pointed toward Tide or async prompt plugins.
  • Tools like fzf, Atuin, zoxide, and syntax-highlighting/autosuggestion plugins are cited as powerful but can add latency if overused or poorly configured.

Version Managers as Major Culprits

  • nvm is repeatedly identified as a top source of zsh startup lag.
  • Remedies:
    • Lazy-loading nvm via OMZ options or zsh-nvm.
    • Switching to faster alternatives: fnm, mise, or custom znvm; mise praised for supporting many languages.
  • For Python in Starship, replacing pyenv with uv is suggested for speed.

Zsh vs Fish vs Bash (and Others)

  • Several switched to fish (often with Starship) and report great UX and speed out of the box.
  • Strong pushback from users who need POSIX/bash syntax compatibility, copy-pasting from bash-based playbooks, or frequent SSH into bash-only servers; they find fish’s different syntax (variables, heredocs) too annoying.
  • A few revert to bash (or mksh/ksh) for minimal latency and maximal predictability, delegating “fancy” behavior to external tools.

Completion & compinit Handling

  • Some skepticism about only regenerating the completion cache once per day; key point is to run compinit exactly once after all fpath changes.
  • Others note quirks like zcompdump mtime not updating unless you explicitly touch it.
  • Several argue that if zsh shipped with its advanced completion fully enabled by default, frameworks like OMZ would be largely unnecessary.