Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 260 of 358

Sega mistakenly reveals sales numbers of popular games

Sales numbers, genres, and scale

  • Many are surprised Team Sonic Racing outsold Total War: Three Kingdoms, but others note cart racers and console titles have far broader appeal than PC-only RTS.
  • RTS is seen as relatively niche today; console-friendly, “critters doing zoomies” racing games are broadly accessible.
  • Some commenters initially misread the figures as dollars; once clarified as units, Sega’s total (~24M units/year) looks substantial, especially multiplied by typical price ranges.

Sonic, Persona, and Sega’s IP strategy

  • Sonic’s enduring strength is attributed to decades of cross-media presence (games, movies, TV, toys) and strong character design; some say Sonic’s “cool factor” beats Mario’s, even if Mario’s games are more consistently high-quality.
  • Debate over whether Sega is “quietly serving a loyal fan base” vs “milking IP dry,” with some arguing Sega is milder than Nintendo/Disney and relatively tolerant of fan content.
  • Persona 5 Royal’s 7M+ units spark surprise that Sega still treats Persona as somewhat niche; others point out Sega Sammy’s larger gambling/slots business makes console JRPGs a side line financially, even if very profitable per title.
  • Persona 5 spin-offs (rhythm, tactics, musou, mobile, anime, manga) show that Sega/Atlus are leveraging the brand heavily, even as fans wait for Persona 6.

Sequels, repetition, and consumer behavior

  • Long thread around “why do people keep buying the X‑th entry?” (Persona, Mario Kart, FIFA, etc.).
  • Counterpoints:
    • Each generation has its “first” entry; most buyers haven’t played all previous games.
    • Iterative improvements (mechanics, UX, graphics) can significantly change the experience even if the formula is stable.
    • People routinely enjoy repeated forms in other media (sitcoms, reality TV, sports) and life (favorite restaurants, hobbies); familiarity and “coming home” feel are valued.
    • Original IPs and experimental games do exist and often succeed; sequels are a risk-management tool, not a total substitute for innovation.
  • Critics worry constant recycling indicates creative exhaustion and starves attention and budget from new ideas; defenders argue the market supports both, and consumers freely choose comfort or novelty.

Competitive scenes, casual appeal, and account economics

  • Overwatch’s high sales despite a neglected pro scene prompts discussion that esports success is not a good proxy for mass popularity.
  • Several argue highly competitive environments, smurfing, and toxic ranked play can drive away casuals; secretly mixing in bots or lighter matchmaking (e.g., in battle royales and mobile titles) helps keep average players engaged.
  • Multiple-account buying and cheap replacement accounts for cheaters were cited as boosting unit counts in some games.

Redaction failures and PDF handling

  • Several commenters focus on the underlying story: Sega’s bad PDF redaction, not just the numbers themselves.
  • People share techniques:
    • “Foolproof” approach: permanently remove text, then render to raster or print-and-scan; some go as far as printing, taping/physically cutting out, and rescanning.
    • Warnings that simple black boxes or “flatten” operations may leave underlying text or metadata intact.
  • Anecdotes describe exploiting poor redaction (e.g., reversing “flattened” redactions in PDFs) in business contexts; some debate whether using inadvertently exposed data is ethically gray or simply the sender’s fault.

Like a Dragon / Yakuza series reception

  • Infinite Wealth and Like a Dragon draw praise as top-tier games, but sales still look modest beside Sonic/Persona, reinforcing the series’ niche status.
  • Barriers for newcomers:
    • Confusing entry points and many titles.
    • Shift from action brawler to turn-based JRPG for some entries.
    • Marketing that emphasizes bizarre/comedic side content over a clear tonal pitch.
  • Fans explain:
    • Yakuza 0 is often suggested as a starting point for action-style entries; Yakuza: Like a Dragon (and Infinite Wealth) for turn-based JRPG fans.
    • The appeal is in wild side quests, genre mashups, and playing middle-aged, down-on-their-luck men—simultaneously limiting mass appeal and giving the series a unique charm.

Retro Sega mobile games and preservation

  • A linked story about classic Sega mobile releases going “end of service” triggers concern about digital ephemerality.
  • Mitigating factor: in this case, ads and online services are being turned off while offline play remains, which some see as a relatively good outcome.
  • Others note that once distribution stops, only pirates/archivists preserve access; yet these same preservation efforts are often legally harassed.
  • Example given of Sonic CD mobile being “ruined” by a free-to-play, ad-heavy update, then partially redeemed by removing ads but leaving bloat.

Interpretations of Sega’s business

  • Some commenters are surprised Sega “still exists” or assume they are small; others point out Sega earns billions in revenue, with a significant share from pachinko/slots and now casino-style gaming.
  • This context reinforces why even strong-selling console franchises (Persona, Like a Dragon) can still be treated internally as only part of a broader portfolio.

Signal – An Ethical Replacement for WhatsApp

Regional adoption & network effects

  • Multiple commenters say Signal is far from a drop‑in WhatsApp replacement because of network effects.
  • In Germany, UK, Turkey, South Africa and much of Europe, WhatsApp is described as mandatory for schools, clubs, work groups, and tradespeople; attempts to move such groups to Signal usually fail.
  • Some report subcultures where Signal is common (certain companies, clubs, activist/antifascist circles, parts of Canada), but most “normal” users still default to WhatsApp.
  • Several people note they effectively must run both Signal and WhatsApp; a few refuse WhatsApp entirely and accept losing or weakening some relationships.

Phone-number requirement & centralization

  • Strong criticism that Signal accounts require a phone number and are “phone‑first”; usernames hide numbers from contacts but don’t remove the phone dependency.
  • Centralized, single‑operator servers are seen as an ethical and strategic risk vs federated systems like Matrix or XMPP and email‑based DeltaChat.
  • Others argue that, compared to WhatsApp (also phone‑based and centralized), Signal is still a meaningful improvement in privacy.

Usability, features, and backups

  • Complaints: flaky multi‑device sync, forced re‑registration, one broken account stuck mid‑flow, missing cross‑platform migration (iOS↔Android), no exportable/plain-text backups (especially on iOS), and only limited history sync to new devices.
  • Feature gaps vs WhatsApp: photo timestamp handling, automatic photo backup to system albums/cloud, richer group tools (polls, live location, transcription), and weaker video‑call quality for some iOS–Android calls.
  • Others say multi‑device works fine for them and see limitations as deliberate privacy tradeoffs.

Backups vs ephemerality

  • One camp wants long‑term, portable chat archives, treating messengers as life diaries and photo albums; lack of robust export/backup is a deal‑breaker.
  • Another camp argues constant archiving is socially and politically dangerous and that short‑lived, harder‑to‑back‑up chats are a feature; they emphasize user over‑attachment to permanent logs.
  • Both sides insist the choice should ultimately lie with the user, not a “benevolent dictator.”

Alternatives discussed

  • Matrix is praised for federation and multi‑device E2EE but criticized for complexity, past key‑management bugs, and notification issues.
  • XMPP+OMEMO and DeltaChat (email‑backed) are cited as more open but have server/admin friction, throttling, and UX gaps.
  • SimpleX and Session are noted for numberless accounts but lack multi‑device, have delivery limits, or face cryptographic critiques.
  • Telegram is seen by some as “ethical enough” due to open clients, but others point to serious security/FSB concerns.

Ethics, privacy, and funding

  • Debate over whether Signal’s centralized, closed‑service model can be “ethical,” versus “moderate free software” or fully federated approaches.
  • Signal’s funding (donations, large founding gift, MobileCoin episode) and old privacy policy plus use of Google Captcha/third‑party pixels raise trust questions for some.
  • Others view criticisms as nitpicking relative to Meta’s tracking and see Signal as a pragmatic, significantly better option even if imperfect.

Samsung embeds IronSource spyware app on phones across WANA

What AppCloud/Aura Does and Where It Appears

  • Commenters say AppCloud (a Samsung system app by ironSource/Unity) monetizes users by:
    • Pushing install ads via notifications.
    • Silently installing apps.
  • It’s reported on A and M series (budget) phones, but multiple people say it’s also on S‑series and European, North American, Australian devices.
  • Similar behavior is reported under the name “Aura” in other MENA countries.
  • Some see it as adware/bloatware; others argue the open letter is light on technical detail and leans on “Israeli spyware” framing.

Impact on Low‑End Users and OEM Incentives

  • Cheap Samsung devices are seen as subsidized by ad/spyware; “real costs are hidden.”
  • In WANA/MENA and India, low‑income users often have no better‑priced alternative with cleaner software; Chinese brands at that price are said to be similar or worse.
  • Some defend Samsung’s hardware value (SD card, long support, S‑Pen) while criticizing the software.

Alternatives: iPhone, Pixel, Other Android Vendors

  • Suggestions:
    • Used/refurbished iPhones as more private and long‑supported.
    • Pixels with custom ROMs (GrapheneOS, LineageOS), though Tensor SoC heat/perf and availability by region are criticized.
    • Fairphone + e/OS, Moto, Sony, Nothing, OnePlus, Zenfone.
  • Counterpoints:
    • iOS also has bloat and opaque carrier integrations; Apple’s privacy is called partly “marketing,” though others cite ATT and App Store rules as meaningful constraints.
    • Fairphone and custom ROMs get criticized for late patches, bugs, and degraded Play Integrity support.

Can Users Remove or Disable AppCloud?

  • Technically:
    • Can often be disabled via system settings or adb shell pm uninstall --user 0 …, but APK remains on read‑only system partition.
    • Some OEMs/carriers mark packages “nondisable” or cause them to reappear after updates.
  • Debate over calling it “unremovable”:
    • One side: if users can’t truly delete or easily disable it, it’s effectively unremovable.
    • Other side: if it can be disabled so no code runs, that’s “removed enough,” and it doesn’t really affect user storage.
  • Many note that 99% of users won’t touch ADB, terminals, or custom ROMs.

Root, Verified Boot, and Attestation

  • Strong thread arguing that lack of root on owned hardware is illegitimate; remote attestation + Play Integrity locks users out of banking/gov apps if they flash custom ROMs.
  • Others warn widespread root would massively expand malware/ransomware risk for non‑technical users and justify some lockdown.
  • Verified boot is defended as part of a “trusted computing base”; critics call it DRM that shifts power from owners to vendors.
  • Some propose legal regimes:
    • Mandate that general‑purpose devices must allow any OS.
    • Prohibit service providers from denying service based on device attestation.

Surveillance, National Security, and Geopolitics

  • Several comments connect embedded tracking/ads, data brokers, and mobile spyware to:
    • Targeting of Iranian nuclear scientists and officers.
    • Drone and precision strike capabilities.
    • The idea that privacy is now a national security issue, not just a civil‑rights concern.
  • Others argue “old‑school” human intelligence and state data leaks (e.g., sold gov databases) can explain targeting just as well.
  • There is extended back‑and‑forth on:
    • Israeli spyware vendors (Pegasus et al.), alleged CPU backdoors, and tinfoil vs. plausible threat models.
    • Whether Chinese, US, or other vendors are more/less trustworthy; some insist all big powers abuse telecom and cloud infrastructure.

Unity / ironSource / “Israeli Spyware” Framing

  • ironSource, long known as a “sleazy” game ad network/installer, was acquired by Unity for billions; this raises questions about:
    • Trustworthiness of Unity’s ad/analytics stack.
    • Whether Unity‑based games should be assumed to include invasive tracking.
  • Some object that branding this as “Israeli spyware” is sensationalist:
    • The behavior (adware, silent installs) is already bad enough.
    • Over‑the‑top “Pegasus‑like” insinuations may undermine legitimate criticism.

Wider Disillusionment: Smartphones, Capitalism, and Democracy

  • Multiple commenters express total distrust of consumer phones:
    • Some have moved to UMPCs with modems + VoIP, or feature phones.
    • Samsung smart TVs and keyboards are cited as additional tracking vectors (clipboard access, aggressive data collection).
  • Broader political critiques appear:
    • Phones and ad‑tech as instruments of corporate/state surveillance and “manufacturing consent.”
    • Claims that “voting with your wallet” is illusory when production and options are controlled by capital and geopolitics.
  • Overall mood: anger at Samsung, deep skepticism that any major platform (Samsung, Google, Apple, Chinese OEMs) truly serves user interests, and a sense that regulatory responses are far behind the threat.

Plastic bag bans and fees reduce harmful bag litter on shorelines

Interest and motivation

  • Some lament that environmental posts get less engagement than gaming topics, seeing this as a symptom of skewed public priorities.
  • Others argue it’s natural that people find leisure more interesting than “plastic bag politics,” and that this is a tech/startup forum, not an environmental one.
  • Several note cultural factors (e.g., caring about litter seen as uncool or “soft”) that hinder engagement.

Bans, freedom, and “authoritarianism”

  • One camp sees bans/fees on plastic bags as incremental authoritarianism and “performative” green policy.
  • Opponents counter that it’s reasonable to restrict products with clear negative impacts when alternatives exist, and that equating plastic bag rules with authoritarianism is a stretch.

Evidence of impact vs. lifecycle concerns

  • Multiple anecdotes from various countries: small levies or bans quickly reduced visible bag litter and normalized reusable bags.
  • Some highlight that very long-term reuse (e.g., the same bags for decades) makes reusables clearly superior.
  • Others cite lifecycle analyses showing some reusable bags (especially cotton) need dozens to thousands of uses to “break even” on climate metrics, arguing many people don’t reach that.

Unintended consequences of current bans

  • Common complaint: “single-use” bags once reused as trash liners are replaced by thicker store “reusables” or separate trash bags, increasing total plastic mass.
  • Concern that studies count items, not plastic weight or microplastic generation, potentially overstating gains.
  • Some report households accumulating semi-reusable plastic bags from deliveries and discarding the excess.

Littering behavior and enforcement

  • Beach residents and divers disagree on sources: some see local beachgoer trash as dominant; others cite data that most marine plastic comes from fishing, shipping, rivers, and industry.
  • Several stress that littering culture and weak enforcement are the core problem; heavy fines and social shame are suggested as more direct tools.
  • Others note design/incentives matter: deposit systems for bottles, cart deposits, and festival cup deposits are cited as highly effective.

Broader plastic problem and policy scope

  • Many criticize focus on bags and straws while most plastic at beaches/oceans comes from other sources (nets, packaging, synthetic turf, microplastics from tires and clothing).
  • There is broad but not universal support for deposits, taxes on “junk” low-durability plastics, and bans/fees targeted at items with clear, workable non-plastic alternatives.

The FPGA turns 40

Economics and Use Cases

  • FPGAs are structurally “too expensive at scale”: once a product sells in large volume, an ASIC almost always wins on cost, power, and performance per watt.
  • Despite that, FPGAs remain attractive where: volumes are modest, standards evolve (e.g., wireless base stations), respins are risky/slow, or upgrades in the field are critical (network gear, SDR, broadcast, HSMs, military).
  • Several comments note huge list prices (even 6-figure parts) but emphasize that real-volume pricing is dramatically lower; FPGA vendor pricing models are described as opaque and extreme.
  • There is disagreement on the continued relevance of “FPGA-to-ASIC” conversion services: some say they still exist (e.g., eASIC), others say major programs were discontinued or were never true ASIC.

Tooling, Languages, and Open Source

  • Toolchains are widely criticized: proprietary, brittle, slow, non-reproducible without seed control, and locked behind opaque P&R heuristics for NP-hard problems.
  • SystemVerilog dominates but is seen as messy and non-deterministic; VHDL is more deterministic but also disliked. “Easy” FPGA programming (HLS, LabVIEW-style flows) is viewed as perpetually promised but limited.
  • Some report good experiences with open-source stacks (Yosys, nextpnr, OpenXC7, F4PGA) and note they drive sales for Lattice, which is considered comparatively open-friendly. Others argue reverse‑engineered toolchains are still too fragile for serious commercial use.

Performance, Architecture, and Comparison to GPUs/ASICs

  • For acceleration, many say GPUs have “eaten FPGAs’ lunch” for most throughput-heavy workloads; FPGAs shine mainly in deterministic, ultra–low-latency I/O and streaming pipelines (radio, telecom, packet processing).
  • There’s disagreement on performance gaps: one side quotes ~4–5× slower clocks; another cites research showing ~18× slowdown vs ASIC for a RISC‑V core.
  • Lack of abundant, fast floating-point on mainstream FPGAs is seen as a major barrier outside AI/vision niches; fixed‑point retargeting is described as high-effort and error‑prone.

Dynamic / General-Purpose Reconfigurable Computing

  • Several participants are enthusiastic about the long-standing vision of OS-like systems that swap FPGA circuits per task, but note that partial reconfiguration tools are poor and past efforts largely stalled.
  • Cloud providers reportedly started with FPGAs (e.g., smart NICs) but are said to be moving toward “smart ASICs” with limited programmability.

AI and Future Directions

  • Some speculate FPGAs (or CGRAs) could resurge once models can “directly” produce bitstreams; others are skeptical since P&R is NP-complete and not a language task.
  • Consensus: LLMs are already useful for generating HDL/HLS scaffolding, but full bitstream generation will still require classical EDA flows for the foreseeable future.

BYD begins testing solid-state EV batteries in the Seal

Charging speeds, power levels, and safety

  • Commenters note the “12 minutes for 932 miles” implies close to 1 MW charging (around 1500V, 600A).
  • Some see this as only an incremental extension of current DC fast charging; others worry about risk from water‑cooled, very high‑current cables.
  • Several argue that, properly engineered, 1500V DC isn’t fundamentally more dangerous than today’s 480V fast chargers, as both are lethal and require heavy interlocks and monitoring.

Use cases beyond cars (home and grid storage)

  • Original question: could this tech be more impactful for power walls / home storage than cars?
  • Replies say the charging tech itself isn’t revolutionary, but better energy density and cycle life would be very attractive for stationary storage.
  • Some mention that residential batteries in some regions already cost less than a high‑end smartphone, implying large future potential if energy density and cost improve further.

Why cars before phones?

  • One camp: EVs gain more value from higher energy density and fast charging than phones, so scarce early production goes to vehicles where consumers pay more for the benefit.
  • Counter‑argument: the same material could produce huge numbers of higher‑margin phone batteries; it’s unclear pure economics favor cars.
  • Additional points:
    • Phone batteries already use Li‑polymer “solid” formats and must handle highly bursty loads.
    • Scaling some solid‑state chemistries down to thin, safe, high‑C‑rate phone cells is technically harder and costlier.
    • Cars tolerate larger, heavier cells and have smoother discharge profiles.

Range needs, pack size, and external batteries

  • Many say 1000+ mile range is excessive; 250–400 miles plus very fast charging is the “sweet spot.”
  • Others note battery degradation near high state of charge; big packs used at 30–80% can improve longevity but add weight and cost.
  • Ideas like towable or trunk “range extender” battery packs are debated: conceptually attractive but challenged on weight, cost, aerodynamics, and rental economics.

Energy density and solid‑state confusion

  • Some had thought solid‑state meant lower density; others point out higher specific energy has always been a key motivation.
  • Clarifications: 400 Wh/kg is roughly double mainstream Li‑ion EV packs and particularly valuable for drones and other weight‑sensitive platforms.
  • Distinctions raised between solid, semi‑solid (e.g., silicon‑carbon), LFP, and Li‑polymer chemistries, with some confusion and correction.

Cold‑weather behavior and safety

  • Long sub‑zero climates (Montana, Canada, Nordic countries) generate heated debate.
  • Pro‑EV experiences: modern EVs work fine with ~20–30% winter range loss, pre‑conditioning, and block‑heater‑level power; cabins heat faster than ICE.
  • Skeptics emphasize severe cold (–30°C and below) where packs can’t deliver rated energy, risk of being stranded if you lack margin to warm the battery, and long rural distances with no backup.
  • Safety tradeoffs discussed: EVs avoid carbon‑monoxide deaths from blocked tailpipes but can still leave drivers short on range in extreme conditions.

US–China, tariffs, and industrial policy

  • Large subthread on whether cheap BYD‑type EVs should be allowed to “destroy” domestic auto makers versus the climate and consumer benefits of low‑cost Chinese EVs.
  • One side: blocking Chinese imports is protectionist, slows decarbonization, and leaves Americans paying more for worse cars; competition is necessary to force innovation.
  • Other side: allowing heavily subsidized Chinese EVs can wipe out US auto and adjacent manufacturing, increasing strategic dependence and hurting national security; some level of protection is seen as necessary.
  • Multiple comments argue both the US and China subsidize EVs; the debate is over scale, structure, and whether subsidies target production vs. consumption.

Charging infrastructure and real‑world usability

  • Some contend US charging access is already good enough for most households (single‑family homes, urban and suburban chargers), with public stations more than doubling since 2020.
  • Others highlight pain points: unreliable or crowded chargers, apartment dwellers without home charging, and much longer “refuel” times versus gasoline.
  • Long‑distance driving:
    • Pro‑EV drivers report cross‑country trips are practical, with 10–30 minute fast‑charge stops every few hours and overnight charging at hotels.
    • Critics emphasize 500–1000‑mile days with minimal stops, where EV charging time materially lengthens travel, especially for outlier use cases.

Climate, politics, and “resistance to electrification”

  • Several comments frame US skepticism toward EVs and Chinese greentech as a major self‑inflicted wound on both climate and industrial competitiveness.
  • Others say a significant share of Americans either don’t prioritize climate change or see EVs as culturally/politically hostile, complicating policy.
  • There’s concern that the US is falling structurally behind China in manufacturing capability (including batteries and high‑precision components), and that reversing this “brain/skill drain” will take generations.

Commercial and military applications

  • Beyond personal cars, commenters expect high‑density solid‑state packs to be especially important for:
    • Robo‑taxis, delivery fleets, buses, and trucks (lower downtime, fewer chargers).
    • Agricultural and construction machinery.
    • Medium‑size UAVs and drones, where going from ~255 Wh/kg to 400 Wh/kg is a step‑change in endurance and payload.

Skepticism and later correction

  • Some express outright doubt (“I’ll believe it when I see it”), given many prior “breakthrough” battery claims that didn’t scale.
  • A final note in the thread states that BYD later denied this specific news, casting uncertainty on the reported test results and timelines.

Harper – an open-source alternative to Grammarly

Architecture & Approach

  • Harper is a rule-based grammar checker written as a classic NLP system, not an LLM.
  • Uses a mix of hard-coded phrase corrections and more dynamic rules (e.g., your/you’re, Oxford comma, other syntactic checks).
  • Some see “decades of NLP research” in the marketing as overstated, given the current code looks like a relatively small, hand-built rule engine without obvious use of older statistical/NLP resources.

Performance, Integrations & UX

  • Key selling point: runs locally, in under ~10ms per document, and can be embedded into apps.
  • Ships with an LSP server; people like it for checking comments in code editors (Neovim, etc.), plus browser extensions including Firefox.
  • One report that the LSP consumed >1 GB RAM in Neovim.
  • Users request: keyboard shortcuts, delay while typing, rule import/export, iOS keyboard, Word and mobile Obsidian support, better Outlook web support, and a stable web demo.

Quality & Coverage

  • Mixed feedback: some find it a “good start” or “decent,” but many note missed basic errors (“Me and Jennifer went…”, “My name John…”, nonsense sentences) and occasional bad suggestions.
  • Several conclude it will need years of rule-writing to get close to Grammarly-level coverage.
  • English-only for now (US/UK/CA/AU variants); broader language support is “on the horizon.”

Comparison to Grammarly, LLMs & Other Tools

  • Many praise the non-LLM design: deterministic, fast, private, and less “AI-bloated” than Grammarly, which multiple users say has become inconsistent, buggy, and overly verbose.
  • Others argue a hand-written rule system is fundamentally inadequate in the age of LLMs; they want an open-source, LLM-based Grammarly clone, especially for multilingual use.
  • LanguageTool and Vale are discussed as existing open-source alternatives; some note Harper’s site should acknowledge that LanguageTool can also run locally.
  • There’s debate about grammar tools in general: some rely on them heavily (dyslexia, non‑native speakers, professionals needing proofreading), while others question why OS/browsers don’t just build this in.

Philosophy & Ownership

  • Long subthread on rule-based vs probabilistic models, language evolution speed, slang, and whether a stable rule set is desirable versus tracking real-time linguistic change.
  • Some distrust Automattic’s long-term stewardship but are reassured by Harper being FOSS and thus forkable.

Python can run Mojo now

Openness, funding, and trust

  • Several commenters like Mojo’s technical direction but are wary of its heavy VC funding and closed-source compiler.
  • Standard library code is Apache 2.0, but the compiler remains proprietary; the company promises open-sourcing in 2026.
  • Some say that’s enough to rule it out for production until then; others note Java, .NET, Swift all started closed and still saw wide deployment.
  • There is concern that VC incentives could lead to lock‑in or pricing shifts once the ecosystem depends on it.

Relationship to Python and the “superset” claim

  • Early marketing framed Mojo as a “Python superset”; current messaging is “pythonic language” / “Python family”.
  • Many wanted to run arbitrary Python and selectively optimize with Mojo, using it as a smooth ramp away from performance bottlenecks.
  • Commenters now see semantics diverging: machine‑sized Int (not Python bigints), missing Python features, and a focus on new systems‑style constructs (ownership, comptime, MLIR).
  • Some employees say full Python compatibility is “deferred” rather than abandoned; others call the superset pitch largely a fundraising/marketing gimmick.

Python–Mojo interop and performance

  • The new feature is effectively: “Python can import Mojo as a C extension,” similar in architecture to Cython and many other tools.
  • Critics argue the headline “Python can run Mojo” is overstated; it’s still compiled code behind the Python C-API.
  • Supporters say the value is smoother tooling: Python‑like syntax, MLIR integration, GPU support, zero‑copy interop with arrays/tensors, and less build/config pain than C++.
  • Microbenchmarks (e.g., factorial) were questioned because CPython’s math functions are highly optimized C with lookup tables.

Mojo vs alternatives (Julia, CUDA Python, Cython, Rust, etc.)

  • Julia is repeatedly cited as already offering:
    • High‑level syntax, strong performance, multi‑vendor GPU backends, and vendor‑agnostic kernels.
  • Others compare Mojo’s role to Cython, Nim+nimpy, PyO3, Triton, Numba, and the growing set of NVIDIA Python DSLs.
  • Defenders argue Mojo’s differentiator is deep MLIR integration and a single language for high‑performance CPU+GPU+accelerator code, aimed especially at AI inference infra.

Target hardware and use cases

  • Mojo currently targets CPUs plus NVIDIA and AMD GPUs (especially datacenter parts), with work ongoing for broader consumer and accelerator coverage.
  • Focus today is inference and AI infrastructure, not general research/training or graphics/games, which disappoints some potential users.

Adoption barriers and community sentiment

  • Enthusiasm: possibility of a Cython replacement, easier GPU programming, non‑CUDA vendor support, and a Python‑like on‑ramp.
  • Skepticism: closed compiler, shifting messaging around Python compatibility, overlap with established ecosystems (Julia, CUDA Python), and reluctance to invest in a VC‑controlled language that might change direction or never fully open.

EU Eyes Ditching Microsoft Azure for France's OVHcloud

Digital sovereignty & US dependence

  • Many argue it’s irresponsible for the EU to rely on US hyperscalers for “sovereign‑critical” systems, especially given diverging views on privacy and data protection.
  • Concerns center on US extraterritorial laws (e.g., CLOUD Act) and the possibility of political interference or sudden shutdowns of EU services.
  • Several commenters see this as part of a broader loss of trust in the US, linking it to recent geopolitical tensions and behavior of the current US administration.
  • Others frame it as normal statecraft: the US wouldn’t host federal infrastructure on Alibaba; the EU seeking independence is similar.

Azure vs. OVHcloud: capabilities and risks

  • Some point out Azure’s EU regions and “EU Data Boundary,” but note key services (e.g., identity) remain globally shared and still under US jurisdiction.
  • OVHcloud is widely seen as cheaper but less mature than AWS/Azure/GCP in networking, managed services, and operational discipline.
  • The high‑profile OVH data‑center fire and perceived corner‑cutting on infrastructure are cited as red flags; others counter that US clouds have had serious outages too and that OVH has improved (multi‑AZ, better tooling).

Experiences with OVH and other European providers

  • Mixed reports: some describe years of excellent uptime, simple billing, and good value; others report frequent incidents, account verification hassles, and opaque support.
  • Fraud‑prevention limits (refusing large servers or GPU instances to new accounts) are common across providers and discussed as standard risk management.
  • Hetzner is frequently mentioned as an alternative EU provider, often preferred for reliability, though with a smaller product surface than OVH.

Cloud lock‑in, labor dynamics, and architecture

  • Several see cloud adoption as a way for management to reduce dependence on in‑house sysadmins by standardizing on widely known cloud skills.
  • Others argue cloud doesn’t remove the need for ops expertise; it just shifts it to “DevOps/SRE” roles.
  • Some advocate multi‑cloud or hybrid/on‑prem setups to avoid both US and single‑vendor dependence; “other people’s computers” are not true sovereignty.

Industrial policy and long‑term strategy

  • Commenters link this move to broader EU efforts (e.g., GAIA‑X, processor initiatives) and argue that only real usage and investment will mature local players.
  • Skeptics predict that, despite current sovereignty rhetoric, workloads may drift back to AWS/Azure/Google over time due to features, stability, and ecosystem.

How malicious AI swarms can threaten democracy

State of democracy and responsibility

  • Several commenters argue democracy is already badly compromised (money in politics, Citizens United, oligarchy), so AI is an accelerant, not the root cause.
  • Others push back on fatalism, stressing citizen responsibility: democracy requires active maintenance, personal risk, and a culture of accountability.
  • Debate over apathy: some see compulsory voting as necessary; others note recent high turnout and argue money isn’t strictly determinative but shapes who can reach primaries.

What AI swarms change

  • Many see AI as mainly making existing tactics “cheaper/easier,” but some stress that this alone is transformative—like ubiquitous surveillance that became possible only when costs fell.
  • Commenters highlight multi-agent LLM swarms as qualitatively different from “megaphone” botnets: adaptive personas, persistence, infiltration, and apparent consensus at scale.
  • Skeptics argue similar influence operations have always existed and worry the “AI is super dangerous” narrative serves incumbent firms and regulators.

Disinformation, platforms, and social psychology

  • One view: disinformation has a demand/attention problem, not a content-supply problem—you mostly need a few large accounts, not huge botnets.
  • Others say AI already degrades discourse (e.g., Reddit/Twitter feeling more shallow and bot-saturated) and exploits humans’ tendency to follow perceived majority opinion.
  • There’s concern about “mental antivirus”: people must learn to treat all feeds as psyops; some hope deteriorating trust in online content will push people back toward face-to-face and vetted sources.

Power, inequality, and surveillance

  • Strong worry that AI structurally advantages those with capital: better models for those who pay, compounding informational and economic power.
  • Discussion of centralization: real AI expertise and compute are clustered in a few labs; startups and workers mostly operate at the edges.
  • Broader fear that AI plugs into existing surveillance (facial recognition, social graphs, transaction logs), making personalized monitoring, repression, and manipulation more feasible.

Regulation, governance, and historical analogies

  • Proposals range from transparency tools and observatories to strict limits on weaponization and environmental externalities.
  • Others argue effective regulation is nearly impossible across borders; expect only “regulation theater.”
  • Analogies invoked: printing press, nuclear power, mirrors, and nukes—debate centers on whether AI is just another tool or a scale-breaking technology that can erase shared reality.

How Cloudflare blocked a monumental 7.3 Tbps DDoS attack

Legacy protocols & QOTD angle

  • Several commenters learned about or reminisced over the QOTD (Quote of the Day) protocol; some run it privately for fun.
  • Others doubt there are many genuine QOTD servers left and suspect Cloudflare may just be classifying “UDP port 17” traffic as QOTD, possibly over-attributing.
  • QOTD-over-UDP is noted as an easy reflection vector; QOTD-over-TCP or other stateful protocols are less amenable to amplification.

Botnet scale, behavior & attack purpose

  • Commenters note 7.3 Tbps is “just” 7,000 nodes with 1 Gbps uplinks; modern home fiber plus cheap devices (IoT, routers, old PCs) makes that plausible.
  • Typical C2 patterns are discussed: compromised devices polling dummy domains, DNS fast flux, and “botnet-as-a-service” offerings.
  • A 45-second burst is seen as likely a test, “proof-of-capability” for a customer, a misfire, or a short “free sample” attack.

Cloudflare’s role: protection, centralization, and ethics

  • Many view the post as good technical marketing: informative and not oversold.
  • Others criticize Cloudflare for:
    • Shielding DDoS-for-hire sites and other shady services behind its network.
    • Contributing to centralization and making “just put it behind Cloudflare” the default instead of addressing root causes.
  • A few report Cloudflare underperforming on HTTP-level (L7) attacks, especially on free plans, requiring manual rules on their own infrastructure.

Mitigation strategies & where responsibility lies

  • Recurrent suggestions for ISPs:
    • Egress filtering / BCP 38 to prevent source spoofing.
    • Automated detection of abnormal flows (large UDP floods to one IP) and temporary throttling or disconnection.
    • Taking abuse reports seriously instead of ignoring them.
  • Others point out scaling, false positive, and economic issues: ISPs don’t want support load, metering/billing complexity, or to cut paying customers without regulation.
  • Debate over punishing infected-end users (e.g., long-term throttling) vs. holding device makers/retailers accountable; strong disagreement on fairness and practicality.
  • IoT insecurity is widely blamed as a long-term driver of botnets, with skepticism that consumers will ever manage security themselves.

Technical framing of DDoS

  • Distinction emphasized between volumetric L3/L4 attacks (Cloudflare is strong) and L7/app-layer attacks that can bypass or overload origins despite Cloudflare.
  • Some discuss BGP-based blackholing/flowspec as more scalable than “just buy a bigger pipe,” but requiring automation for short attacks.
  • One thread nitpicks the article’s “three decades” phrasing for DDoS history; others dismiss this as unhelpful pedantry.

Disclosure, IPs & “feeding the trolls”

  • Question whether publicizing record attacks gives botnet operators free advertising; others counter that exposing IPs (to networks, not publicly) weakens the botnet.
  • Releasing full IP lists publicly is seen as risky—effectively a target list for re-compromise—though sharing with AS operators or services like AbuseIPDB is noted as common.

US Army Appoints Palantir, Meta, OpenAI Execs as Lt. Colonels

Nature of the Appointments and Direct Commissions

  • Several comments note that direct commissions at field-grade rank are not new; they’re common for doctors, lawyers, clergy, band members, and certain cyber roles.
  • These execs are reportedly reserve O5s (Lt. Colonels), likely with modified or shortened “basic training,” more symbolic than rigorous.
  • Some see this as a pragmatic way to access scarce tech expertise from people who can’t afford the time for full OCS and standard requirements. Others see it as obvious dual-standard “rank-leapfrogging” over regular troops.

Conflict of Interest and Legal/Ethical Concerns

  • A key worry is potential profiteering: holding decision-making roles in the same military structures that buy from their companies.
  • Commenters ask what legal waivers or guardrails exist and how conflicts of interest are kept away from contracting/acquisition decisions.
  • Others argue the DoD already has advisory boards (e.g., Defense Science Board), so giving corporations’ leaders rank may be unnecessary theater.

Source Reliability and Framing

  • The linked outlet is heavily criticized as unreliable and propagandistic; some advocate using paywalled mainstream or official Army sources instead.
  • Debate ensues over whether dismissing such outlets is legitimate source criticism or fallacious ad hominem.

Palantir, Surveillance, and Tech’s Role in Warfare

  • Disagreement over Palantir’s “market segment”: some frame it as surveillance/intelligence integration; others note it now participates in autonomous weapons C2.
  • Broader anxiety about surveillance capitalism: social media and AI firms already hold vast personal data, now more tightly linked to the military.
  • A few argue citizens effectively chose this path by embracing surveillance-heavy platforms; others counter that structural coercion and poverty constrain real choice.

Political and Ideological Fears

  • Several comments frame this as another step toward fascism, oligarchic capitalism, or “network state” governance where power flows through elite tech networks.
  • Long subthreads debate whether capitalism itself, rather than “fascism” per se, is the core problem, bringing in U.S. electoral dynamics as evidence.

Supportive Views and Strategic Justification

  • Some see this as a rational move to re-link the military and top-tier tech talent, akin to past war mobilizations, and necessary to stay competitive against rivals.
  • One veteran and civil servant strongly endorses the move, emphasizing the need for high-end cyber and AI expertise to secure critical infrastructure.

Tone and Miscellany

  • Thread mixes dark humor (e.g., “Lt. Code” jokes, basic-training quips) with genuine alarm about civil-military norms and democratic erosion.
  • Whether these roles will be used primarily for external defense or domestic capabilities is seen as crucial but remains unclear.

YouTube's new anti-adblock measures

Controls, history, and viewing modes

  • Several Premium users want a “read‑only” or “private listening” mode: watch without affecting history, recommendations, or losing Premium benefits.
  • YouTube’s incognito/history pause is seen as clunky: it forgets recent searches, sometimes disables Premium perks, and requires manual toggling or cleanup.
  • Some keep a history tab open to pause/resume quickly, or manually remove individual videos afterward; many find this too fiddly.
  • Parents want better tools to block channels, Shorts, and addictive recommendations for kids; YouTube Kids is viewed as over‑restrictive for educational content but permissive for low‑quality “toy shopping” videos.

New anti‑adblock tactics and the technical arms race

  • Users report “fake buffering” delays and popups blaming extensions; many consider this a dark pattern since the app is clearly functional under the hood.
  • The article’s described technique (locking global objects before extensions can hook them) works better on Chromium; Firefox’s APIs still allow powerful HTML/JS filtering.
  • Commenters expect gradual escalation toward server‑side ad insertion and pre‑muxed streams, referencing Twitch’s aggressive approach.
  • Others note that timestamp‑based tools (e.g. SponsorBlock) and on‑device AI could still identify and skip ads, leading to more product placement and native advertising.
  • Some see Chrome’s Manifest V3 and delayed extension initialization as part of the same anti‑adblock strategy, pushing power away from users and toward platforms.

Ad quality, intrusiveness, and safety

  • Many distinguish YouTube from other ad‑supported services: mid‑rolls every few minutes, very loud spots, and long unskippable or hour‑long “infomercial” ads are cited as uniquely disruptive.
  • Reports include scammy crypto/deepfake ads, dubious supplements, “freedom batteries,” gambling, NSFW dating games, and even illegal or deeply misleading content; this is a major motivation to block all ads for safety.
  • Others see mostly mainstream consumer ads and argue that hostility to ads is not new: people dislike interruption regardless of quality.
  • Several argue that users who block tracking end up in the “lowest‑tier” inventory, which is where the worst ads live; others reject this as victim‑blaming and insist platforms should vet out harmful ads.

Pay, block, or quit? Ethical and economic arguments

  • One side: you’re consuming a costly service; either watch ads, pay Premium, or don’t use it. Blocking is framed as “stealing” or free‑riding on infrastructure and creators.
  • Opposing view: ToS are notices, not binding contracts; the web is public, and users may configure their own agents (adblock, DNS, custom clients). Platforms can block, but not dictate client behavior.
  • Many explicitly frame the relationship as adversarial due to surveillance, monopoly behavior, and manipulative design; they feel no moral obligation toward Google.
  • Some argue ads themselves are harmful enough (psychological manipulation, scams, predatory targeting of vulnerable people) that blocking them is a safety measure or even a moral duty.
  • A large subthread debates whether viewing with an adblocker is morally different from not viewing at all; views remain sharply divided.

YouTube Premium: value, pricing, and distrust

  • Supporters call Premium (especially family plans) one of the best subscription values: ad‑free video + YouTube Music, offline/background play, and better payouts to creators.
  • Critics see it as expensive relative to Netflix‑style original content, resent forced bundling with Music, and dislike that creator‑inserted ads still remain.
  • Lite tiers are seen as confusing (“most videos ad‑free”), not widely available, and still allow some ads (music, Shorts, browsing).
  • A recurring fear: once enough users pay, Google may emulate cable/Prime—reintroducing ads even to paid tiers and charging extra to remove them. This prospect keeps some from subscribing at all.

Creators, sponsorships, and alternative monetization

  • YouTube’s 55/45 revenue split is frequently cited; some call it unusually generous, others argue it’s still captured by a monopolist and incentivizes sponsorship clutter.
  • Sponsor segments inserted by creators are widely disliked; many rely on SponsorBlock or manual skipping. Some want Premium to automatically skip declared sponsorship timestamps.
  • Others caution against deeper platform interference in video content; they prefer viewers “vote with their watch time” against over‑sponsored channels.
  • Many users support creators directly via Patreon, merch, or subscriptions on alternative platforms (e.g. Nebula, Floatplane) and see this as preferable to rewarding Google.

Power, surveillance, and browser/platform lock‑in

  • Long arguments compare Google Analytics to “surveillance pens”: critics say GA exploits the browser’s weak security model to run non‑consensual tracking code; defenders say site owners choose GA just like any other tool.
  • Google is repeatedly called a monopolist using “free + ads” to distort markets, lobbying for favorable regulation, and trying to lock down the web via Chrome, Web Environment Integrity, and extension restrictions.
  • Some suggest YouTube‑scale video should be treated as public infrastructure or a utility; others see that as unrealistic or undesirable government scope.

User responses and changing habits

  • Many insist they’ll quit YouTube entirely if adblocking truly stops working; some already have and report not missing it, replacing it with reading, hobbies, or other services.
  • Others have moved to strategies like:
    • Network‑wide blocking (Pi‑hole, AdGuard)
    • NewPipe, SmartTube, or frontends like Invidious/Grayjay
    • Archiving favorite channels via yt‑dl/yt‑dlp to Plex/Jellyfin
    • Aggressively stripping UI clutter and recommendations with custom filters.
  • A nontrivial group pays for Premium yet still runs network‑level blockers and SponsorBlock to remove all ads and tracking, treating Google as useful but fundamentally untrustworthy.
  • Several note an emerging “enshittification” pattern: free, user‑friendly growth phase; then increasing ads, dark patterns, and upsell pressure once dominance is secure, with the expectation this will continue until users or regulators push back.

Show HN: Nxtscape – an open-source agentic browser

Concept and Scope of an “Agentic Browser”

  • “Agentic browser” is interpreted as a browser where AI agents can navigate, click, fill forms, group tabs, and perform multi-step tasks on the user’s behalf.
  • Some see this as the “missing piece” after tools like Dia and Claude Desktop: an assistant that acts directly in the pages you’re already using.
  • Others argue the right abstraction is an OS-level agent plus webviews, not a standalone browser.

Browser Fork vs Extension / CDP

  • Many question why this is a Chromium fork instead of a Chrome extension or an MCP tool using Chrome DevTools Protocol.
  • Supporters of the fork point to: using the accessibility tree, integrating a bundled LLM, building an “AI-friendly DOM”, and tighter control of UX.
  • Critics say almost all of this is achievable via extensions/CDP, and that forking Chromium brings a heavy ongoing security/maintenance burden.

Security, Privacy, and Local vs Cloud

  • Strong concerns about:
    • Agents acting on highly sensitive sites (banks, health portals).
    • Prompt injection leading to destructive actions.
    • Bypassing browser security (e.g., trusted events, full‑screen, form writes).
  • Suggestions include: per-site opt-in for read/write, human confirmation before irreversible actions, shadow profiles with limited sessions, rate limiting, and robust “undo/restore checkpoint”.
  • Some users will only trust an agent that runs entirely locally; Ollama integration is welcomed but there’s suspicion that cloud APIs are the primary intended path.

robots.txt, Scraping, and Website Interests

  • The project currently ignores robots.txt.
  • One camp: AI that follows multiple links and bulk-summarizes data is effectively a scraper and should respect robots.txt, especially to avoid overloading or bypassing monetization.
  • Opposing camp: this is a user agent, not a crawler; robots.txt is defined for recursive crawlers, not interactive tools acting on explicit user requests. Applying robots.txt to user agents risks allowlists and loss of browser freedom.
  • Some propose a new standard (e.g., “ai-browsers.txt”) for AI-assisted browsing.

UX, Chat Interface, and Reliability

  • Split views on chat as the primary interface:
    • Critics say no one wants to “chat” for productivity; agents should mostly act via learned “recipes” and structured actions, with chat as fallback.
    • Others report real productivity gains with chat-based tools (e.g., Dia, Cursor) and are happy to instruct an agent conversationally.
  • Early UX issues noted: mode confusion (bouncing between “agent” and “productivity” modes), lack of an ungroup-tabs API, need for a good undo/checkpoint model, and better handling of ambiguous tasks.

Productivity, Tab Management, and Use Cases

  • Some enthusiasm for:
    • Intelligent tab grouping and session management.
    • Automating repetitive web tasks (multi-site price comparison, CSV downloads, form-filling).
    • Acting as a personal “bodyguard” against user-hostile sites, clutter, and distraction.
  • Others dismiss the “10x productivity” framing and view this as “AI slop” or a solution in search of a problem, especially when supervision overhead cancels any gains.

Licensing, Business Model, and Competition

  • AGPL is polarizing:
    • Supporters like that it allows commercial use but prevents proprietary forks and “exploitative” models.
    • Detractors say it deters businesses from adopting or extending the code.
  • Proposed monetization: open-source core with an enterprise edition (parallels drawn to Island, Chrome Enterprise, Brave).
  • Multiple commenters doubt a small team can win against incumbents (Chrome with built-in LLM, other AI browsers, extension-based agents).

Branding, Naming, and Platform Support

  • Heavy criticism of the fox logo and Netscape-like name; some expect trademark trouble and find the branding misleading for a Chromium fork.
  • Many requests for Linux and Windows builds; some defend focusing on macOS first, others note an extension would reach far more users immediately.

Congestion pricing in Manhattan is a predictable success

Ideology, “Neoliberalism,” and The Economist

  • Long subthread on labeling The Economist: classical liberal vs “neoliberal,” center‑right, not left.
  • Several point out that Pigovian taxes, congestion pricing, and carbon taxes are entirely consistent with market economics, not “anti‑market” intervention.
  • Others stress neoliberalism vs US “liberal” and “left” are muddled terms that many people use mainly as slurs.

Who Benefits, Who Loses, and Class Issues

  • Supporters argue: in Manhattan, regular car commuters are disproportionately affluent; the poorest rely on buses and subways, which benefit most from less congestion and new funding.
  • Critics call it classist: it prices out lower‑income drivers (including long‑time residents, small‑business workers, and people with car‑dependent jobs) while the rich simply pay and enjoy emptier roads.
  • Some cite low‑income credits and disability waivers; opponents dismiss these as bureaucratic fig leaves.

Observed Effects: Traffic, Buses, Air, Safety, Business

  • Multiple first‑hand accounts: traffic is clearly lighter, especially at traditional choke points; buses and deliveries are faster and more reliable.
  • Early data cited: fewer crashes and injuries in the zone; modest improvement in one particulate measure (too early to prove causation).
  • Some residents say the main quality‑of‑life gain is the disappearance of “show‑off” cars and street noise at night.
  • Others report no noticeable change or note that their own costs (taxis, tradespeople, deliveries) are going up.
  • Comparisons to London: congestion initially fell, but critics claim it crept back as charges were politically held below true congestion‑clearing levels.

Regressivity, Externalities, and Pass‑Through Costs

  • One camp: this is a regressive tax that will raise the price of “literally everything,” subsidize a wasteful MTA, and deliberately reserve driving for the rich.
  • The other: congestion and road space were already heavily subsidized; the charge simply makes private driving reflect its full social cost (space, pollution, delays), replacing “deadweight loss” with revenue for transit.
  • Ongoing dispute over evidence: will time savings for trucks and service vehicles outweigh the fee, or be passed on as higher prices?

MTA Governance and Use of Funds

  • Several posts highlight documented MTA waste, union‑driven overstaffing, and contractor capture; they fear new revenue will be squandered.
  • Others counter with references to legally earmarked capital plans: billions for new subway cars, buses, and modern signals, arguing congestion funds are among the few streams with clear safeguards.
  • Broader argument about US habit of outsourcing core public functions to consultants and contractors, and whether rebuilding in‑house expertise is underway.

Politics, Legitimacy, and Long‑Term Design

  • Discussion of federal attempts to block the program, state‑level delay until after an election, and the outsized role of city employees with free parking in opposing it.
  • Some see rural/suburban backlash as part of a broader anti‑city, anti‑transit culture war.
  • Concerns that if pricing isn’t dynamically adjusted, congestion may eventually return while the charge persists as a quasi‑permanent toll.

Meta announces Oakley smart glasses

Frame Material, Weight, and Comfort

  • Strong focus on how heavy current smart glasses feel vs. normal eyewear, especially acetate vs titanium.
  • Several argue titanium won’t solve comfort: frame weight quickly becomes dominated by batteries and electronics, not frame material.
  • Hollow / sheet-titanium constructions are debated, but posters conclude you can’t get anywhere near the feel of ultra-light 5–10 g titanium frames once you add electronics (Meta glasses are ~50 g).
  • Concern that glasses worn all day irritate nose/ears; many who can avoid glasses do so via contacts or LASIK.

Features, Use Cases, and Lack of AR Display

  • Many are surprised these have no HUD/visual AR; they’re essentially camera + mic + speakers + voice assistant.
  • Use cases praised: low-vision aid (reading labels, locating objects), hands-free photos/video, music, calls, quick voice queries.
  • Some think these (or successors) are on track to replace phones once usable in-glasses displays and better input arrive.
  • Others see them as a niche or phone accessory, not a replacement, due to poor input (voice, gestures), no screen, and limited functionality.
  • Comparisons made to other devices: Even Realities G1, Xreal, INMO, Ray-Ban Meta, upcoming Orion, open-source AugmentOS-based glasses.

Will Smart Glasses Replace Smartphones?

  • Optimists: XR/AR is seen as the next dominant platform, like smartphones vs laptops; glasses plus AI, eye tracking, and new UIs could eventually feel more natural than phones.
  • Skeptics: speech is a bad primary interface, glasses aren’t dramatically more portable than phones, and smartphones already cover almost all everyday needs.
  • Broad agreement that if they “replace” phones, it will be partial and slow, similar to how smartphones partially displaced PCs.

Privacy, Surveillance, and Social Norms

  • Strong pushback on always-on (or always-listening) cameras/mics from an ad-tech company; many say they’d never trust Meta with that feed.
  • Worries about workplace security (screens, secrets), legal issues in strict jurisdictions, and recording people without consent.
  • Some advocate socially ostracizing wearers in public or at least refusing to interact when a camera is pointed at them.
  • Others note that ubiquitous cameras (phones, doorbells, CCTV) are already the norm, though some argue that’s no reason to “make it worse.”

Platform Lock-In, SDK, and AI Choice

  • Frustration that there’s no public SDK: the glasses only do what Meta allows, limiting third-party experimentation.
  • Users want to route the wake-word and camera pipeline to alternative AIs (e.g., ChatGPT), not just Meta AI; current workarounds only treat them as generic Bluetooth headsets.
  • Battery non-replaceability is a deal-breaker for several; they don’t want another sealed, time-limited gadget.

Design, Branding, and Adoption

  • Mixed reaction to Oakley styling: some say these don’t look “Oakley” (too round / generic), others think they look dorky, especially on the CEO.
  • Discussion of Luxottica’s dominance, high margins, and whether style/fashion and youth trends will make or break adoption.
  • Concern that visible camera lenses and dark tints make eye contact harder and increase social friction.

Wayland is growing up. and now we don't have a choice

XLibre, politics, and HN moderation

  • XLibre (a fork of Xorg) is discussed as an attempted continuation of X11 development after the main Xorg maintainers largely moved on to Wayland.
  • Several comments describe the fork’s lead as controversial, with a history of problematic patches and inflammatory political messaging (e.g. slogans in the README), which many say is poisoning the project’s reception.
  • Others strongly dispute the “bad patches” narrative, framing the situation as corporate capture (Red Hat/IBM etc.), DEI politics, and deliberate attempts to kill X11 and smear the fork’s author.
  • HN users clarify that XLibre is not “banned” on the site; previous submissions were flagged by users for low substance and drama, not removed by moderators as policy.

Wayland vs X11: design, maturity, and missing pieces

  • Some see Wayland as “second-system effect”: simplistic core, many critical features (DMA/DRM integration, color management, scaling, screen capture, input quirks) added later as fragmented, often-staging extensions with uneven compositor support.
  • Others counter that X11’s networked, server-side drawing model is fundamentally mismatched to modern GPUs, and that “fixing X” would effectively mean designing a new protocol anyway.
  • There’s disagreement on whether Wayland meaningfully improves latency/tearing and whether compositors are sufficiently compatible and secure.

Nvidia and distros

  • Multiple users report Wayland + Nvidia failures (black screens, broken installs) on Debian; others say Wayland works fine with Nvidia on Fedora, Ubuntu, Arch, and Tumbleweed.
  • One theme: Debian’s older packages lag Wayland/Nvidia improvements, so judging current Wayland support from Debian stable is seen as misleading by some but “stability over novelty” by others.

Accessibility concerns

  • The original article’s point is echoed: only GNOME has halfway-usable accessibility on Wayland today; other desktops lag badly.
  • Orca support on GNOME Wayland currently goes via a D-Bus protocol rather than a Wayland-native one, justified by GNOME devs as a sandboxing/security decision. Some see this as pragmatic; others think accessibility should be first-class in Wayland, not a side-band.
  • Disabled users describe facing ~100 hours of migration work (hotkeys, OCR workflows, gamma, magnification, Orca) and feeling treated as “edge cases” in a forced transition.

Xlib applications and XWayland

  • Developers relying on raw Xlib ask what happens under Wayland. Responses: standalone Xorg may fade, but XWayland will remain and can act as an X11 compatibility layer for some time.
  • There’s interest in leaner X servers or XWayland variants that modernize internals without full Wayland buy-in.

Remote desktop

  • A missing “grown-up” feature cited for Wayland: multi-user, fully in-memory accelerated remote desktop (Xrdp-style), not just screen sharing. Existing efforts (e.g., FreeRDP-based) are seen as immature.

Oklo, the Earth's Two-billion-year-old only Known Natural Nuclear Reactor (2018)

Information gaps and use of LLMs vs Wikipedia

  • Several commenters note the IAEA article is light on quantitative details (ore size, total energy, timing, observability).
  • Wikipedia is cited as a much better technical source (e.g., ~100 kW average thermal output over hundreds of thousands of years).
  • Some defend using tools like Claude/Perplexity with web search for structured explanations and better discovery, others say “just use a search engine” and warn against unverified LLM outputs.
  • One analogy: LLMs are like lossy compression of knowledge, so you shouldn’t expect precise, reference-grade answers.

Uranium enrichment, early Earth, and cosmic origin

  • Discussion of why natural reactors were possible 1.7–1.8 billion years ago: higher natural U‑235 fraction then, plus water moderation and special ore geometry.
  • People link the current 0.720% U‑235 ratio to nucleosynthesis in supernovae and radioactive decay timescales.
  • It’s noted that “fresh” supernova debris has more U‑235 than U‑238; over billions of years U‑235 decays faster, flipping that ratio.
  • Debate over whether all Uranium on Earth came from a single or many supernovae; consensus in-thread leans toward multiple events well-mixed in the proto-solar cloud.

Oklo and nuclear power advocacy/skepticism

  • Some see “100 kW for hundreds of thousands of years, naturally contained” as a powerful pro‑nuclear talking point.
  • Pro‑nuclear comments emphasize dense, stable, low day‑to‑day risk power, and argue that economic models undervalue very long-lived assets.
  • Skeptical comments stress high capital costs, increasing lifecycle costs (decommissioning, waste), and low-probability but extremely expensive accidents (e.g., Fukushima cleanup scale).

Waste burial and long‑term safety

  • Oklo is cited as evidence that fission products can remain underground for billions of years; skeptics counter that groundwater interactions occurred and “safe now” took 2 billion years.
  • Long exchange on deep geological repositories:
    • Pro side: burying waste ~0.5–1 km deep in stable bedrock with no aquifer makes leakage extremely implausible; some repositories (e.g., in Finland, US defense waste sites) already exist.
    • Skeptical side: real-world failures (flooded or unstable mines, mishandled barrels), transport risks, need for continuous safety culture, political/economic corner-cutting, and unknown long-term geology.
    • Also a distinction between “can be done safely” vs “will be done safely under real institutions.”

Discovery, measurements, and classification

  • The slight depletion (0.717% vs ~0.720%) mattered because arms-control accounting required precise U‑235 balance, prompting investigation.
  • Commenters are curious about the measurement uncertainty and enrichment impact of such a small delta.
  • Clarification that “natural nuclear reactor” here means fission on Earth’s crust, not stellar fusion.

Miscellaneous

  • Lighthearted speculation about ancient or time-traveling civilizations causing Oklo.
  • Reference to Oklo the startup as a cleverly named nuclear company that hasn’t yet operated a reactor.

New Linux udisks flaw lets attackers get root on major Linux distros

Scope and impact of the udisks flaw

  • Discussion centers on a local privilege escalation requiring:
    • A vulnerable udisks version.
    • A specific PAM configuration (not default everywhere).
  • Exploit was demonstrated on Ubuntu, Debian, Fedora, and openSUSE/SUSE; some distros (e.g., Debian, Gentoo with default config, rolling Arch) are already patched or less exposed.
  • Several comments note: this is typical of a mature ecosystem where attackers are pushed into narrower, more complex chains.

How serious is local privilege escalation?

  • One camp: local root on a single-user desktop doesn’t change much—once an attacker runs code as your user, they can already exfiltrate secrets and persist.
  • Counterpoints:
    • On systems with real isolation (Android, multi-user servers, shared environments, academic shell servers), LPE is a big deal.
    • LPEs “turn any basic access into root” and are valuable for chaining with remote bugs, lateral movement, and cloud takeovers.

Linux vs BSD/other OSes

  • Some argue Linux desktop feels like an “eternal experiment” in features and security; others say competing OSes are at least as experimental or worse.
  • BSDs and illumos are praised for:
    • Smaller, more coherent design (fewer competing subsystems).
    • Capability mechanisms (Capsicum), jails, zones.
  • Critics note they still lack user-visible, app-granted capability models like iOS/Android, and suffer from weak vendor/software support.

Secure desktops and hardened distros

  • Desire for a “GrapheneOS for desktop” leads to mentions of:
    • Qubes OS (strong isolation but heavy, UX and hardware-acceleration issues).
    • SecureBlue, Kicksecure (hardened Linux distros).
    • grsecurity (commercial, kernel-hardening; debated ethics and value vs “snake oil” accusations).
  • Debate over whether kernel hardening alone suffices vs needing userland/app isolation.

Setuid, udisks size, and alternatives

  • Recurrent theme: setuid binaries are a recurring LPE source; better to avoid or minimize SUID and reduce trusted code bases.
  • udisks is criticized for large LoC and complexity compared to simpler tools (e.g., pmount).
  • sudo’s size and CVE history are discussed; suggestions:
    • Use simpler doas / OpenDoas.
    • systemd’s run0 as a non-setuid alternative.
    • Rust rewrite of sudo (sudo-rs) to reduce memory-unsafe bugs, though concerns about rewrite regressions remain.

Containers, namespaces, and kernel CVEs

  • Strong disagreement over whether containers are valid security boundaries:
    • Skeptical view: shared kernel = assume escape; kernel CVE count is huge.
    • Pragmatic view: containers work “well enough” in practice; Android uses shared-kernel isolation heavily (plus SELinux).
  • Namespaces and user-namespaces have been major LPE sources; some distros now restrict unprivileged access, breaking tools.
  • Micro-VM approaches (e.g., kata-style) are mentioned as a stronger isolation layer but with performance and maturity caveats.
  • Caveat on CVE counts: Linux kernel intentionally over-assigns CVEs for anything possibly exploitable, so raw numbers overstate practical risk.

PAM, polkit, and configuration pitfalls

  • The exploit chain hinges on:
    • PAM’s pam_env / user_readenv behavior and distro-specific PAM configs.
    • polkit “allow_active” rules (privileges granted to the currently active logged-in user, e.g., for mounting devices).
  • Key lesson emphasized: obscure, custom auth/config mechanisms (rather than plain, inspectable config) can hide policy bugs for years.

System complexity and “creeping” infrastructure

  • Some lament the growth from simple 20-years-ago Unix desktops to today’s maze of daemons, buses, policy engines (systemd, PAM, polkit, udisks, etc.).
  • View that enterprise-driven components and tight coupling expand the attack surface and fragility, versus older, simpler setups.
  • Others counter that evolving requirements and software never being “done” make such growth inevitable.

I will do anything to end homelessness except build more homes (2018)

Reactions to the Satire

  • Some found the piece funny, incisive, and depressingly accurate about “I care, but not enough to change anything” attitudes and NIMBY obstruction of both housing and transit.
  • Others dismissed it as shallow, self‑righteous ranting that oversimplifies a complex problem and caricatures tech workers and homeowners.

Is “Not Enough Homes” the Main Cause?

  • One camp argues the evidence is clear: higher housing costs strongly correlate with higher homelessness; building more units at any price point reduces overall rents and homelessness.
  • Skeptics counter that many visible homeless people have severe mental illness or addiction and wouldn’t be “fixed” by more market housing; they emphasize welfare systems, treatment, and “21st‑century asylums.”
  • Several note homelessness is a gradient: car‑dwellers with jobs, couch‑surfers, shelter users, rough sleepers. Cheaper housing mainly prevents people on the edge from falling into chronic street homelessness.

Affordable vs “Luxury” Housing

  • Repeated complaints that new construction in US cities is overwhelmingly expensive apartments or “luxury” units, with little truly affordable stock.
  • YIMBY‑style replies: even high‑end units help by freeing up older, cheaper housing (“filtering”) and expanding supply; the real problem is that building any housing is heavily restricted.
  • Others respond that incentives under current finance, land prices, and building standards inherently push developers to the high end unless there are strong subsidies or public building.

Regulation, NIMBYism, and Politics

  • Broad agreement that local zoning, height limits, parking minimums, and permitting delays constrain supply, often weaponized by homeowners worried about property values, traffic, noise, or “neighborhood character.”
  • Debate over whether this is primarily a “blue state” problem (e.g., California) vs a rich‑area problem that transcends party; examples cited of both permissive (Texas, some Midwest cities) and reforming (Minnesota, Washington, Vienna) jurisdictions.
  • Some stress that deregulation alone can just produce more expensive units unless tied to public or nonprofit affordable housing and stronger social safety nets.

Mental Health, Addiction, and “Two Homeless Populations”

  • Common framing: a large “economic” homeless group (job loss, rent hikes, evictions) and a smaller but more visible group with severe psychiatric or substance‑use disorders.
  • Several argue housing first programs show that stable housing makes treatment, employment, and recovery far more feasible, and that homelessness itself worsens mental health and drug use.
  • Others insist a subset will still destroy housing or remain unsafe without supervised or institutional settings; they call for parallel investments in treatment facilities and supportive housing.

Investment, Empty Units, and Policy Levers

  • Concerns about housing as an investment vehicle: corporate buyers, vacation rentals, and empty “investment properties” reducing effective supply and pushing working‑class renters out.
  • Proposed remedies include progressive taxation on multiple property ownership, vacancy taxes, tighter rules on short‑term rentals, and large‑scale public or cooperative housing.
  • Counter‑argument: much “hoarding” only works because severe supply constraints make land appreciation a near‑sure bet; fix supply and the speculative premium shrinks.