Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 287 of 532

Self-taught engineers often outperform (2024)

Passion and motivation vs. learning path

  • Many argue the real differentiator isn’t “self-taught vs degree” but passion, curiosity, and willingness to keep learning.
  • People who tinker on side projects or pursue hard topics on their own often retain concepts better and map theory to real problems.
  • Several note that both strong CS grads and strong self‑taught devs share this trait; weak performers exist in both groups.

Formal education: benefits and gaps

  • University is praised for: forcing students out of their comfort zone, exposing them to fundamentals (DSA, OS, networking, math), and giving shared vocabulary.
  • It can fill “boring detail” gaps that self-taught devs often miss initially (e.g., complexity, data structures, concurrency).
  • But many CS programs are criticized as theoretical, outdated, or shallow on real-world engineering (large systems, tooling, performance, debugging).

Self‑taught path: strengths, weaknesses, survivorship

  • Self-taught devs are seen as naturally filtered: only those who can actually deliver tend to break into the industry.
  • Strengths mentioned: persistence under uncertainty, comfort with learning new stacks, practical problem-solving, high output, and broad, idiosyncratic knowledge.
  • Weaknesses: missing fundamentals, uneven skill “spikes,” reinventing wheels, difficulty knowing what they don’t know, and stronger impostor syndrome.
  • Several note that after ~5–10 years of experience, differences in initial path often blur.

Hiring, credentials, and bias

  • Degrees are described as a blunt but convenient hiring filter and a proxy for baseline competence and socialization.
  • Some managers prefer experienced self-taught candidates over fresh grads, others the reverse; many emphasize a mix of backgrounds on teams.
  • Cost and access to university (especially in the US) are raised as major class filters, separate from ability.

Theory vs. practice and domain differences

  • Multiple comments stress you “need both”: theory to recognize and frame problems, practice to ship and maintain real systems.
  • Distinction drawn between software and licensed fields (civil, mechanical, etc.) where formal credentials and standards are non‑optional.

Critiques of the article and terminology

  • Several point out survivorship bias and lack of data; the headline is seen as over-claiming.
  • The examples (Linus Torvalds, Margaret Hamilton) are criticized as actually highly educated.
  • “Self-taught” is often reframed as “informally educated” rather than literally learning in a vacuum.

Hand: open-source Robot Hand

Naming, Form Factor, and Cost

  • Project is called “AmazingHand”; some note the generic “Hand” title hurts searchability.
  • Design is praised as approachable, printable, and “cartoon-style” (three fingers + thumb).
  • Uses off‑the‑shelf servos and 3D‑printed parts; ~$135 BOM is seen as impressively low.
  • Four fingers likely chosen because servo width would make a five‑finger hand uncomfortably wide.

Tendons, Servos, and Control Complexity

  • Question raised about tendon-driven hands to move actuator mass into the arm.
  • Replies highlight tendon elasticity causing calibration drift, friction changes, and breakage, requiring proprioceptive sensing and continual learning.
  • Some argue neural networks in the control loop are needed; others suggest faster, more specialized function approximators.
  • Suggestions include optical tracking of tendon motion, external vision-based finger tracking, and absolute encoders where space allows.
  • For grasping, several say force sensing is often more useful than precise joint sensing, but elasticity and gravity still matter for delicate objects.

Human-Like Hand vs Alternative Grippers

  • Debate on whether a human hand is actually “best” for robots.
  • Strong argument: the built environment and objects are designed for human hands, so human-like grippers maximize compatibility and are easier to teleoperate or pretrain with human motion.
  • For single, well-defined tasks, simpler dedicated grippers (parallel jaws, chucks, suction, magnets) are cheaper, stronger, and more reliable.
  • Some extend this to locomotion (feet vs wheels) and raise ethical questions about designing future environments for human vs machine capabilities.

Strength, Materials, and Manufacturing

  • People ask about payload, grip, and failure forces; hand strength ultimately depends on the attached arm.
  • PLA parts marked “needs to be strong” are seen as too weak for serious work; suggestions include polycarbonate, glass‑filled nylon, CNC‑machined aluminum, or stamped metal.
  • Discussion of potential injection molding or pressed parts notes that tooling and mold design remain a barrier for hobbyists, though small upgrade kits are conceivable.

Sensing and Capabilities

  • Several note that to rival human hands, widespread tactile sensing (at least pressure, ideally also temperature) is needed across the surface.
  • Adding skins like AnySkin could help but increases weight, cabling, and sensor fusion complexity, potentially limiting real‑world usefulness at this price point.

Use Cases, Safety, and Trajectory

  • Many see it as an educational/hobby platform or Halloween prop rather than an industrial tool.
  • Some imagine household helpers (wall- or rail-mounted arms for kitchens or laundry) but others worry about safety (e.g., “knife-flinging arms”).
  • One thread contrasts older industrial robots optimized for repeatable motions with an emerging vision of general-purpose robots where adaptability and error correction matter more than exact repeatability.
  • Overall sentiment is enthusiastic about open-source hardware done this way—fully documented CAD, commodity parts, and room for community-driven iteration—while acknowledging that serious applications would need stronger materials and richer sensing.

My bank keeps on undermining anti-phishing education

Liability, incentives, and “gross negligence”

  • Some argue banks sending phishing-like emails/SMS should be legally liable for gross negligence; others counter that it’s hard to assign liability when there’s no concrete, provable victim.
  • Multiple stories show banks refusing to reimburse scam losses (Zelle, card charges), explicitly saying “fraud protection doesn’t cover scams,” reinforcing the view that banks externalize most risk to customers.
  • Commenters doubt insurers or regulators meaningfully constrain banks; until incidents become expensive (fines, lawsuits, lost customers), there’s little incentive to change.

Marketing, outsourcing, and confusing domains

  • Many banks and governments outsource campaigns, KYC, and “secure email” to third parties on unrelated domains, often with tracking links and Let’s Encrypt certs — indistinguishable from phishing.
  • This is frequently driven by separate marketing IT, SaaS vendors, and slow core IT, rather than a coherent security/UX strategy (Conway’s Law).
  • Some see deliberate use of separate campaign domains to protect main-domain deliverability metrics, worsening user trust.

Terrible UX and “security theater”

  • Numerous examples of hostile banking UX: extremely short or numeric-only passwords, click-only virtual keypads, blocked password managers, SMS 2FA regressions, arbitrary app permissions, and client-side hashing.
  • Justifications like “keylogger defense” or old mainframe limits are viewed as partially or totally bogus, or at best outdated.
  • Voice biometrics and other “modern” methods are mocked as trivially replayable.

Calls, texts, and broken authentication flows

  • Banks commonly call from unknown numbers, refuse to identify themselves before asking for personal data, or ask customers to read back 2FA codes — directly mirroring scam scripts.
  • Some better patterns exist (asking customers to call the number on the card or verify the call in-app), but are inconsistently implemented, even within a single institution.
  • Fragmented fraud systems and outsourced call centers lead to contradictory advice and even internal teams misidentifying each other as scammers.

Training vs behavior: mixed messages

  • Corporate “don’t click links in emails” training collides with real bank/HR/vendor emails that demand exactly that behavior, often via mangled tracking URLs.
  • Many commenters conclude that as long as normal workflows rely on unsolicited emails with links and credential entry, phishing education alone cannot succeed; the system design itself is flawed.

Retro gaming YouTuber Once Were Nerd sued and raided by the Italian government

Scope of the Case and Italian Enforcement

  • The raid stems from suspected violations of Italy’s Article 171-ter (commercial copyright offenses), with a maximum penalty of three years in prison but also a minimum as low as a small fine.
  • Several commenters note that maximum penalties are rarely applied; first-time offenders often get suspended sentences or fines.
  • Italians in the thread describe copyright enforcement as selective: everyday private piracy is broadly tolerated, but actions involving profit or soccer broadcasting are aggressively pursued.
  • Some see the use of the Guardia di Finanza for a YouTuber as disproportionate given that unit’s usual focus on serious economic crime.

Who Is Harmed? Victimless Crime vs Economic Impact

  • One side argues that promoting ROM-filled retro handhelds is essentially a victimless crime: many of these games and consoles are not commercially available, so there’s no lost sale.
  • Others counter that retro titles are still monetized (subscriptions, re-releases, mini-consoles), and unauthorized devices divert both money (to clone makers) and player attention from current products.
  • There is debate over whether courts should have to identify a concrete victim and quantifiable harm in such cases.

Retro Games, Preservation, and Copyright Terms

  • Many see this as a symptom of overlong and poorly designed copyright: decades-old works remain locked up, often not sold, yet still cannot be legally copied.
  • Ideas floated include: sharply shorter terms (7–20 years), “use it or lose it” rules (maintain availability or forfeit rights), or automatic freeing of works no longer sold by rights holders.
  • Others warn that conditioning copyright on active commercial exploitation would hurt small creators and conflict with the traditional notion of a time-limited monopoly.

Emulation, Commercial Handhelds, and Reviewer Liability

  • Commenters distinguish between personal ROM downloading and mass‑produced consoles preloaded with thousands of pirated games. The latter is widely seen as clear-cut infringement.
  • The contentious point is whether a reviewer who legally buys such a device and shows its capabilities is “promoting and organizing” illegal activity or simply doing journalism.
  • Some argue enforcement should target importers, platforms (e.g., large marketplaces), and manufacturers, not individual reviewers or customers.

Contrast with AI/LLMs and Corporate Power

  • Many highlight a perceived double standard: small actors risk raids and criminal records, while AI companies reportedly train on massive troves of copyrighted and even pirated material with little consequence.
  • Defenders of AI note that models generally don’t distribute verbatim copies and may fall under transformative use, unlike direct ROM copying, though training data acquisition itself may be unlawful.
  • Several participants conclude that copyright law, in practice, tracks power and money more than coherent principles, deepening skepticism toward both IP law and its enforcement priorities.

The AI bubble today is bigger than the IT bubble in the 1990s

Similarity to / Difference from the Dot‑Com Bubble

  • Many see strong echoes of 1999–2000: amazing underlying tech but widespread, unsustainable business models; lots of “AI as magic” justifying bad decisions and layoffs.
  • Others insist it feels very different: valuations more grounded than 90s P/E extremes, major players with tens of billions in real ARR and fat cash flows, not Pets.com‑style shells.
  • Several argue “bubble” is only knowable in hindsight; AI’s impact is uniquely hard to price because of multiple uncertain exponentials.

AI as Feature, Not Product

  • Common view: most current generative AI is just a feature, not a standalone product. Whole sectors are shipping near-identical, mediocre tools.
  • Mandates like “every feature must be AI-powered” are described as FOMO-driven, slowing delivery and producing worse solutions than simpler non‑AI approaches.
  • AI chatbots slightly improve on old bots, but mainly by more efficiently obstructing access to humans; user experience often worsens.

Layoffs, Overstaffing, and Twitter/X

  • Some claim CEOs cite AI as cover for layoffs when the real drivers are overstaffing, cheap‑money hangover, and cost pressures.
  • Twitter/X is debated: proof you can fire 80% and “not collapse,” vs. proof you can shrink the business, worsen UX, and still keep servers online.
  • Broad agreement that large firms could run with skeleton crews but at the cost of degraded quality, slow bug fixes, and weak innovation.

Real Utility vs Limits of LLMs

  • Many use LLMs daily: better than Google/StackOverflow for small, verifiable coding questions, summarization, and glue tasks like entity extraction.
  • Others report hard limits: nontrivial, niche, or complex tasks still fail repeatedly, even with careful prompting; you can’t fire your coders yet.
  • Concern that LLMs work best with a few dominant languages (Python/TS), which could further entrench them and chill language/tool diversity.

Economics, Hardware, and Sustainability

  • Skepticism that selling API inference is a long‑term moat: inference looks commoditizable; open models improve; usage appears heavily VC‑subsidized.
  • Hardware is widely viewed as the safest layer: Nvidia framed as the “shovel seller” of this gold rush, with little serious competition so far.
  • Some foresee many AI startups imploding “Pets.com‑style,” with a few giants emerging even stronger; others frame it as one frothy chapter in a broader “everything bubble.”

Voting age to be lowered to 16 by next general election

Electoral system vs. voting age

  • Several argue changing first-past-the-post (FPTP) to proportional or alternative systems would do more for democracy than tweaking the voting age.
  • Past reform attempts (e.g. the 2011 AV referendum) are cited as poorly designed and politically sabotaged, then used to claim “the public chose FPTP.”
  • Some note UK already uses multiple voting systems in devolved bodies, making the national insistence on FPTP look purely self‑serving.

Motives and partisan advantage

  • Many see lowering the age to 16 as a tactical move by Labour, assuming younger voters lean left. Others predict this could backfire if youth swing to right‑populist or “TikTok strongman” figures later.
  • A recurring view: parties only support reforms that increase their own power; functioning democracy is secondary.

Maturity, brain development, and consistency

  • One camp argues 16‑year‑olds lack judgment, are more emotional/peer‑driven, and are easier to manipulate, citing popular neuroscience claims about brain maturation to ~25 (which others challenge as oversimplified or misleading).
  • Counterarguments: many adults vote emotionally and are poorly informed; 16‑year‑olds may actually be more civics‑engaged via school; and they have a larger long‑term stake than older voters.
  • Inconsistencies are highlighted: at 16 you can work, pay tax, have children, join the army in training roles, but not drink, marry, or buy certain products. Some say the rights/duties package should be aligned; others reject tying all civil liberties to one age.

Stake, taxation, and who “deserves” a vote

  • Some propose limiting or weighting voting rights by tax contribution or “stake,” or via civics exams; opponents call this a classic disenfranchisement tactic vulnerable to abuse.
  • Selectorate theory is invoked to argue that simply enlarging the electorate (even if voters are “naive”) improves mass welfare by forcing broader competition for support.

Practical impact and manipulation

  • Several expect turnout among 16–17‑year‑olds to be modest, so aggregate impact limited.
  • Others worry new young voters are particularly vulnerable to social media propaganda, though some argue older cohorts are already worse affected.

Economists made a model of the U.S. economy. Our debt crashed the model

Reaction to the “Crashed” Debt Model

  • Many commenters see the non‑converging model as more an indictment of the model than of the US economy: if it can’t handle current debt levels, it may be poorly designed, numerically unstable, or based on unrealistic assumptions (e.g., automatic future “fixes”).
  • Others argue the failure is a useful signal: the model cannot find a consistent long‑run path under current debt trajectories, which at least highlights growing fiscal risk.
  • Several compare this to physics/engineering: when models “blow up,” it may mean buggy code, bad numerics, or an unphysical model—not necessarily imminent real‑world collapse.

Is Economics a Science?

  • A large subthread debates whether economics—especially macro—is “science” or closer to religion / apologetics for power.
  • Critics argue:
    • Models can’t be tested via controlled experiments on whole economies.
    • Explanations are often post‑hoc; causality is unclear; predictions frequently fail.
  • Defenders respond:
    • Many sciences (geology, evolutionary biology, climate science) also rely on observational data and natural experiments.
    • Economics makes falsifiable predictions (e.g., about QE, tax cuts, interest rates); some schools’ models perform better than others.
    • The real issue is political actors ignoring evidence, not a lack of scientific method.

Perception, Behavior, and Politics

  • Multiple commenters stress that perception often drives outcomes: central banks and policymakers use communication to shape expectations as much as to “predict” the future.
  • There is criticism of economists as a “state religion” serving elites, but others note that many empirically supported ideas (e.g., land value taxes, budget discipline) are politically unattractive and thus ignored.
  • One theme: people want policies that violate basic trade‑offs (“have their cake and eat it too”), then blame economics when told this is impossible.

Debt, Inflation, and Reserve Currency

  • Some predict the US will ultimately “inflate away” unpayable debt, hurting bondholders and fixed‑income retirees but sparing asset holders.
  • Discussion of metrics like interest payments as a share of federal revenue: this share has risen sharply recently but was also high in the 1980s, suggesting reversals are possible.
  • Several highlight the unique buffer of US reserve‑currency status, while warning that protectionism and geopolitical antagonism could erode this privilege and destabilize the current arrangement.

Treating beef like coal would make a big dent in greenhouse-gas emissions

Beef, carbon cycles, and methane

  • One camp argues cattle are “in the carbon cycle” and only dangerous when we add fossil carbon (oil-based feed, fuel, heating); in a purely solar/biological loop, their emissions would be self-limiting.
  • Others counter that this ignores herd expansion, fossil inputs, and land-use change; cattle methane is highly potent in the near term and drives tipping points even if short-lived.
  • Debate over importance of “inefficiency”: some say extra trophic steps (plants → cows → humans) are inherently wasteful; opponents say inefficiency only matters when system limits are breached.

Land use, feed, and water

  • Large shares of arable land and crops (corn, soy) go to feed livestock rather than humans, with big caloric and resource losses.
  • Discussion of imported soy to Europe: even cows on marginal pasture may rely on deforestation-linked soy from elsewhere.
  • Wetland drainage and rainforest conversion for pasture/feed are seen as major, often effectively permanent, GHG sources.
  • Water use is heavily criticized: beef’s water footprint is cited as an order of magnitude higher than soy per serving; aquifer depletion leads to ecological and even geotechnical damage.

Industrial vs grass-fed and other meats

  • Grass-fed, low-input ruminants can support biodiversity and soil in some ecosystems, but are a tiny fraction of total beef and don’t represent mainstream production.
  • CAFOs, corn-based feed, manure lagoons, antibiotics, and pollution dominate current beef systems and are heavily criticized.
  • Pork, poultry, and fish are noted as more efficient per unit protein; cheese from cow’s milk is flagged as surprisingly impactful.

Policy, pricing, and feasibility

  • Strong agreement that externalities (climate, pollution, pandemics, cruelty) are not priced into meat.
  • Proposed levers: ending grain and fossil-fuel subsidies, taxing CAFO meat and fossil extraction, making soy feed less competitive. Many see these as politically very hard.

Individual behavior and ethics

  • Suggested responses range from cutting back (“Meatless Monday”) to full vegetarianism, to treating meat as an occasional luxury.
  • Others stress nuance: type and source of meat matter; backyard or small-scale systems may differ.
  • Ethical debate over killing animals for taste versus anthropocentric views that prioritize human benefit.

Technology and broader systems

  • Novel protein like solar-powered microbial “solar foods” is discussed as potentially far more land- and resource-efficient than plants.
  • Some commenters widen the lens: civilization itself is framed as an inherently ecosystem-disrupting machine; others reject this as nihilistic and argue for genuinely sustainable, non-growing systems.

Java was not underhyped in 1997 (2021)

Context of the 1990s Java Hype

  • Many recall Java as wildly overhyped: “rewrite everything in Java” including office suites, browsers, and cross-platform desktops.
  • Others argue the hype was partly justified: Java promised VM-based portability, memory safety, and network-centric programming at a time of Microsoft dominance and fragmented OS platforms.
  • A useful framing: 1997 hype was selling the Java (and Internet) of ~2007; ideas were right, timing and maturity were wrong.

Technical Strengths and Weaknesses

  • Strengths highlighted:
    • Memory safety and GC vs C/C++, especially important for enterprise reliability.
    • Early support for distributed systems (RMI, JNDI, serialization) and a serious VM/JIT story.
    • JVM sandboxing and security model (later mostly abandoned as applets died).
  • Weaknesses and early pain:
    • Slow startup, heavy RAM use, frequent crashes in applets and Swing-era tools on 1990s hardware.
    • Immature libraries and clunky cross-platform GUIs (AWT/Swing vs native toolkits).
    • Core language limitations in early Java (no generics, awkward collections, boilerplate).

Industry, Enterprise, and Academia

  • Java became a default for backend and “enterprise” systems, displacing COBOL/Ada and much C++; still dominant in Fortune 100/500 backends and on mainframes/midrange.
  • Enterprise frameworks (EJB, then Spring) brought both power and excessive complexity; Spring is seen as simultaneously enabling and obscuring.
  • Sun’s deliberate push into universities seeded an entire generation of Java-trained developers.
  • Java lowered total cost of ownership for big organizations by enabling large, average-skill teams to build reliable systems.

Comparisons and Legacy

  • Compared with Rust/“rewrite in Rust”: Java and Rust are both justified by safety, but operate in different niches; many doubt Rust will reshape general business software as Java did.
  • Other safe languages (VB, PowerBuilder, xBase, Perl, Python, PHP, JS) also eroded C/C++’s reach; Java is one of several, but had unique reach via the JVM and J2EE.
  • Modern debates focus on GC performance, lack of unsigned primitives, and the “Java-enterprise mindset,” but many tools (IDEs, DB clients, Android stack) and major clouds still rely heavily on Java.
  • Several comments connect Java’s 1990s hype cycle to today’s AI/LLM and crypto hype: some claims will prove prescient, others wildly overstated.

“Reading Rainbow” was created to combat summer reading slumps

LeVar Burton and the show’s appeal

  • Many recall Reading Rainbow as exceptionally well done: Burton’s calm, respectful, “Fred Rogers–like” way of speaking to children is praised as making learning feel safe, fun, and “cool.”
  • Several note his broader screen charisma (including Star Trek: TNG) and think that kind of warm, personal presence is missing from much modern kids’ media.
  • Others highlight the format: book read‑alouds plus real‑world field trips, like proto‑audiobooks with low-key visuals.

Divergent reactions to the show

  • Some avid childhood readers found the pacing slow, corny, or “propaganda‑ish,” feeling it targeted kids who didn’t already like reading.
  • A few say they always turned it off, enjoyed only the theme song, or preferred shows like Wishbone that adapted “bigger” stories.
  • Defenders respond that it was explicitly aimed at reluctant or struggling readers, not book‑obsessed kids.

PBS and 80s/90s educational TV ecosystem

  • Commenters reminisce about a broader golden age of PBS: Mister Rogers, Ghostwriter, Wishbone, Carmen Sandiego, Magic School Bus, etc.
  • There’s side debate over how intentionally these shows pushed geography, math, or social messages, and whether that’s “overt promotion” or just good curriculum design.

Reading incentives and gamified programs

  • Users recall Pizza Hut’s Book It!, Accelerated Reader, local library summer programs, and Norway’s Sommerles as powerful motivators.
  • Some see “read X, get pizza/toy” as manipulative and worry about tying food or trinkets to achievement; others say cheap prizes strongly motivate kids and can build lasting reading habits.
  • Several describe how these systems were gamed (choosing ultra‑short books, sharing quiz answers), but still credit them with more reading overall.

Libraries and access

  • A long subthread compares U.S. and Polish public library density, with many stressing that qualitative access (walkability, services, interlibrary loan, free space, internet) matters more than raw counts.
  • People share nostalgic stories of small-town libraries, surprise reads, and the role of libraries as rare free public spaces.

Broader issues: propaganda, schooling, funding

  • Some argue children’s shows (including Reading Rainbow and Mister Rogers) inevitably carry value judgments and can feel like “indoctrination”; others counter that they mainly ease anxiety and support diverse starting points.
  • There’s debate on whether summer vacation hurts literacy and should be redistributed through the year, versus its value for family time and non-school learning.
  • Later comments broaden into concern over cuts to PBS/CPB, attempts to weaken agencies like NOAA over climate reporting, and the long-term loss of publicly funded educational programs.

I was wrong about robots.txt

Role and Limits of robots.txt

  • Many argue robots.txt only affects “good” bots; abusive scrapers and many AI crawlers ignore it, so it doesn’t solve resource or abuse problems.
  • RFC 9309 and older docs are cited: robots.txt is advisory, not access control. It was created to reduce server load and avoid problematic areas (infinite trees, CGI with side effects), not as an authorization mechanism.
  • Using robots.txt as a security or privacy barrier is seen as a mistake; sensitive content should be behind authentication.

AI Crawlers, Bandwidth, and the Open Web

  • Several operators report bot traffic outnumbering humans 10:1, especially from LLM-related crawlers hitting deep archives and destroying cache hit rates.
  • Complaints that AI companies ignore existing dumps (e.g., Wikipedia) and instead hammer sites repeatedly.
  • Some see blocking AI bots as necessary self-defense; others fear it accelerates the “death of the open web,” where only large actors still get access.

Bot Blocking, Cloudflare, and Collateral Damage

  • Cloudflare and similar services use CAPTCHAs, browser fingerprinting, and behavioral checks; this often breaks RSS feeds, APIs, and even government open-data sites.
  • Privacy tools (VPNs, Brave, uBlock, cookie clearing) and non-mainstream user agents frequently trigger bot defenses, degrading UX for real users.

Honeypots, Tarpits, and Tools

  • A popular tactic: declare /honeypot disallowed in robots.txt, hide a link to it, and ban any IP that fetches it. Concerns raised about accidentally trapping assistive tech.
  • AI “tarpits” and tools like Anubis are mentioned: serve infinite or useless content to AI scrapers that ignore robots.txt, wasting their resources. Effectiveness may drop as bots adopt headless rendering and CSS awareness.

SEO, Indexing, and Previews

  • Blocking Google in robots.txt can lead to pages remaining in the index but with no snippet, then eventually disappearing; removing existing pages needs noindex, not just robots.txt.
  • Social link previews (LinkedIn, Facebook, etc.) rely on OG tags and their own crawlers; blocking them breaks previews and sharing. Some suggest allowing at least homepages or specific preview bots.

Identity vs Purpose-Based Control

  • Current control is user-agent based, which forces site owners to whitelist big platforms individually.
  • Several propose a standard to declare allowed purposes (“AI training”, “search indexing”, “OpenGraph previews”, “archival”) plus legal backing, so dual-use crawlers could be selectively blocked.

Trust, Norms, and Reception of the Article

  • Ongoing tension between “trust by default” vs “assume any unknown crawler is malicious,” given 1000s of marginal bots with little benefit to sites.
  • Some commenters find the author’s realization obvious; others value the concrete example of how overbroad blocking breaks legitimate integrations and triggers a deeper robots.txt rethink.

Gaslight-driven development

LLMs Shaping APIs and Developer Behavior

  • Several commenters note that LLMs “hallucinating” APIs is already nudging teams to rename or add endpoints (e.g., adding tx.create because models keep using it).
  • Some see this as positive: if many people and tools are confused, maybe the original naming was poor; aligning with common expectations reduces friction.
  • Others are strongly opposed: changing real systems because a stochastic model confidently invents wrong behavior is seen as “bonkers” and a line they refuse to cross.
  • There’s a middle view: if an LLM effectively acts as a “super‑popular advisor” to most customers, accommodating it might be pragmatic.

Naming, Semantics, and HTTP Codes

  • Debate over correct semantics for “update vs create,” “put vs upsert,” and how APIs should express insert/update behavior.
  • Some argue PUT is inherently “upsert”; others say it implies overwriting and shouldn’t be equated with upsert.
  • Joking proposals to handle LLM‑invented endpoints via new HTTP status codes:
    • “513: Your Coding Assistant Is Wrong”
    • “407 Hallucination”
    • Calls to (mis)use 418 “I’m a teapot” spark a subthread about being precise with status codes versus having fun.

Autonomy vs Safety: Lane-Assist Analogy

  • Lane‑keeping assist is used as an analogy: some see it as a “misfeature” that punishes drivers and can be dangerous in edge cases (construction, emergencies).
  • Others counter that using turn signals avoids issues and that systemic safety and reduced collisions outweigh individual “freedoms.”
  • Broader worry: similar mechanisms plus LLMs could evolve into moral/legal enforcement systems that warn, block, or report users.

Critique of the Article’s Thesis

  • Some reject the premise that “we are serving the machines,” arguing all constraints (account creation, email confirmation) are human design choices.
  • Others riff philosophically: we may be serving not machines per se but the wider simulation/“spectacle” of bureaucratic and technical systems.

Site UX and Distraction

  • The animated “presence” bar showing live readers is widely criticized as unreadable, especially for people with ADHD; many close the page immediately or use reader mode.
  • Others share hacks/bookmarklets (kill sticky/fixed elements) or note browser features to remove distractions.
  • A minority find the feature amusing or interesting (e.g., seeing countries), but most consider it an aggressive UX misstep.

Perfume reviews

Online perfume resources and culture

  • Fragrantica is widely praised for design and note breakdowns, but some say popularity has led to brigaded ratings and “most popular” lists full of mediocre scents.
  • Alternative sites and communities are suggested: fragplace, Basenotes, clone-house discussions on Reddit/YouTube, and various boutique/indie houses (e.g., CB I Hate Perfume, Black Phoenix Alchemy Lab).
  • Several note the value of decants and sampler packs (LuckyScent, Surrender to Chance, Oriza Legrand samplers, eBay “sack of samples”) as a cheaper, more paced way to explore.
  • Offline: niche boutiques in LA/SF, a perfume street in Seoul, and the Aftel Archive in Berkeley are recommended as “kid in a candy store” experiences.

Perfume as art vs nuisance/health risk

  • Some argue perfumery is an underappreciated art form akin to music or painting, and mainstream US culture (Axe, mass-market designers) has cheapened it.
  • Others have severe reactions (allergies, asthma, migraines) even to faint traces and would like perfume banned or radically contained; they compare it to second-hand smoke or “chemical attacks.”
  • Suggestions range from consulting allergists (with mixed views on effectiveness) to seeking “natural” perfumes; skeptics note “natural” doesn’t guarantee safety and many naturals are irritants.
  • There’s pushback on extreme anti-perfume claims (e.g., equal to second-hand smoke) and on blanket chemical fears (phthalates, etc.), with references to IFRA safety positions.

Subjectivity, perception, and language

  • Debate over whether smell is “decomposable”: some emphasize hundreds of olfactory receptors; others compare this to color cones and sound frequencies and say practical decomposition is still hard.
  • Strong theme that smell is highly individual: everyone has a different receptor subset (“smellblindness”), different memories, and thus radically different reactions to the same perfume (e.g., Santal 33 as luxurious vs “pickle juice”).
  • Review language tends to be metaphorical and “purple” because odor vocabulary is limited; analogies to art and food criticism are made.
  • Nose-blindness and adaptation are discussed; coffee beans as a reset are called a myth. Many prefer low-projection scents that are “a reward for intimacy rather than a punishment for proximity.”

Market dynamics, clones, and impermanence

  • Complaints that mainstream men’s fragrances have become too sweet, weak, or derivative; niche brands are suggested but seen as expensive and harder to sample.
  • Clones are proposed as a way to avoid high prices; others insist clones can’t be exact matches due to complex natural materials and trade secrets.
  • Discontinuations and reformulations repeatedly “delete” people’s signature scents, causing frustration; constraints from IFRA, CITES, ingredient cost, and evolving health rules drive changes.

Recommendations and anecdotes

  • Specific perfumes and houses repeatedly praised: Terre d’Hermès, Dior Homme, various ouds (e.g., Oud for Greatness), Relique d’Amour, Tam Dao, Pineward, Montale, CB I Hate Perfume’s conceptual scents (“In the Library,” “At the Beach 1966,” etc.).
  • Users share stories of unexpected compliments, relationship milestones linked to scents, and the odd pleasure of avant-garde compositions that are admired but “too rude” to wear in public.

Babies made using three people's DNA are born free of mitochondrial disease

How the technique works and what’s “three-parent” here

  • Clarification that this is an in vitro procedure: donor and mother eggs are fertilized in the lab, and the parents’ pronuclei are moved into the donor egg cytoplasm with healthy mitochondria.
  • Some note that the donor contributes only mitochondrial DNA (~0.1% of total) but a large amount of cytoplasmic machinery, not just mitochondria.
  • There’s discussion of nuclear–mitochondrial co‑evolution and whether genetic distance between donor and parents could matter; long‑term effects are still unclear.

Medical promise and limitations

  • Strong enthusiasm from people familiar with mitochondrial disease; personal stories of devastating childhood illness and death frame this as an enormous win.
  • Others stress this is prevention, not a cure, and that broader therapies for existing mitochondrial disease remain lacking.
  • Speculation about future approaches (e.g., delivering healthy mitochondria into existing cells) is met with skepticism over technical and immune barriers.

Family structure and “three biological parents”

  • Debate over whether this meaningfully creates three biological parents; several argue the mitochondrial donor is akin to a tissue donor, not a social or legal parent.
  • Others see potential for intentional multiparent families to seek this purely for shared genetic lineage, but doubt healthcare systems would support non‑medical use.

Ethics, eugenics, and evolution

  • One line of argument calls this eugenics and a “loss for evolution,” claiming harmful mutations may persist because they confer population‑level advantages (e.g., sickle cell).
  • Many respondents counter that:
    • The historical evil of eugenics was coercion, racism, and killing/sterilizing people, not parents voluntarily avoiding severe disease.
    • By the same logic, much of medicine and all gene therapy would be “eugenics.”
    • Reducing intense suffering in children outweighs speculative population‑level benefits.
  • Some agree that unintended consequences and loss of genetic diversity are serious concerns, and call for large genomic datasets and caution before wide‑scale germline editing.

Designer babies and social inequality

  • Fears that medically driven techniques will slide toward cosmetic or enhancement editing (height, vision, “ethnic” traits), especially in profit‑driven systems, creating Gattaca‑style inequality.
  • Others respond that mate choice already functions as informal eugenics; using safe technology to avoid disease is seen as clearly beneficial, with enhancements being the real gray area.

Law, religion, and personhood

  • Anticipation that jurisdictions where “life begins at conception” is a strong belief will resist or ban such procedures, especially variants that destroy one fertilized egg.
  • Some pro‑life commenters see a moral issue if an embryo is discarded; others distinguish between pre‑ and post‑zygote stages and are more comfortable when only one embryo is created.
  • Discussion touches on constitutional limits on restricting out‑of‑state medical travel and current bans (e.g., in the US) versus permissive regimes (e.g., UK, possibly Australia).

IVF vs adoption and who “deserves” children

  • A subset argues this is narcissistic compared with using donor eggs or adopting existing children, especially those in foster care.
  • Others reply that:
    • Adoptable infants are scarce in some countries; available children often have severe disabilities or complex foster arrangements.
    • Wanting genetically related children is deeply ingrained and not inherently selfish.
    • Parenting is framed by some as something children “deserve,” not something adults are automatically owed.

Language and framing

  • Several argue “three‑parent baby” is sensationalist and misleading; “organelle transplant” or “mitochondrial replacement” would better match the biology.
  • Others emphasize that mitochondrial DNA is inheritable and highly expressed, so dismissing the donor’s genetic role entirely is also inaccurate.

Tin Can – The landline, reinvented for kids

Emergency calling (911/E911)

  • Many argue 911 should be enabled on all devices/tiers by default, regardless of cost, especially for a kid-focused product that looks like a phone.
  • FCC/E911 obligations for “interconnected VoIP” are cited; some think Tin Can may not be strictly bound but still has a moral and liability risk if it looks like a normal phone and fails in an emergency.
  • Others note 911 access usually has per-line fees and infrastructure costs that don’t scale with actual call volume, making “just eat the cost” non-trivial, especially with a large free user base.
  • One concern: kids may assume 911 works and waste critical time when it doesn’t; counterpoint: if the child previously had no 911 access, they are not objectively “less safe.”
  • Misuse/false-call anecdotes surface, but many still think always-on 911 is the right default.

Business model, pricing, and “just VoIP?”

  • Core criticism: it’s “just a VoIP phone” with kid branding, priced at ~$75 plus $10/month when cheaper VoIP lines or ISP-provided VoIP exist.
  • Defenders say the value is in the parent-friendly app, whitelist-only calling, simple UX, and not having to self-host or support other families’ setups.
  • Some see the markup as “nostalgia as a service” and a classic millennial-parent subscription play; others find the price reasonable for a polished, low-friction solution.

DIY, alternatives, and technical depth

  • Multiple recipes offered: SIP server + ATA + analog phone; Asterisk/FreePBX or FreeSWITCH + low-cost trunks; Callcentric/Voip.ms/BulkVS/others; Google Voice workarounds; MagicJack; or just plain ISP VoIP.
  • Several note these lack easy inbound/outbound whitelisting and child-focused UX, which is seen as Tin Can’s main differentiator.
  • Debate arises between “this is easy if you’re technical” and “most parents have neither the skills nor time.”

Privacy and data collection

  • Privacy policy notes collection of children’s voice audio (for calls/voicemail), call logs, device identifiers, and use of parent-provided contacts.
  • Some worry this is broad and vaguely scoped, especially in two-party-consent jurisdictions; others speculate it may be limited to what’s technically needed but find the wording unclear.

Longevity, lock-in, and target users

  • Strong concern about e-waste and “lifetime calling” that depends on the company’s continued existence and closed backend; calls for open protocols, configurable VoIP servers, and right-to-repair.
  • Product is seen as appealing for young kids and possibly dementia patients who need whitelisted, scam-free calling.
  • Skeptics note that older kids already gravitate to chat apps and walkie-talkies, making landline-style calling feel like “putting the lid back on the can of worms.”

I want an iPhone Mini-sized Android phone (2022)

Desire for truly small phones (and what people still use)

  • Many participants want phones around original iPhone SE / 4 / 12–13 Mini size: one‑hand usable, pocketable, unobtrusive.
  • A lot are clinging to old devices (iPhone SE 1/2/3, 12/13 Mini, Pixel 4a/5, Galaxy S10e, Xperia Compacts, LG G2) despite battery aging, software bloat, and dropped app support.
  • Common complaint: modern phones are too wide and tall to reach the top corners without “finger gymnastics,” especially for smaller hands.

Existing “smallish” Android options and trade‑offs

  • Frequently mentioned: Asus Zenfone 9/10, Samsung S23/S25, Sony Xperia 5/10, Pixel 5/8, Unihertz Jelly series, Bluefox NX1, Rakuten Hand, Mudita Kompakt, Qin F21, Soyes, Blackview rugged minis.
  • Critiques:
    • Many “compact” phones are only a few mm smaller than standard flagships; volumes and weights are similar.
    • Niche brands often have poor cameras, weak radios or carrier support, no NFC/5G, thick bodies, and almost no OS/security updates.
    • Some rugged/mini devices are praised as “protest phones,” but seen as compromises rather than true daily‑driver flagships.

Battery life, swappability, and modularity

  • Some strongly want user‑swappable batteries (citing older Samsungs, LG V20, HTC, Japanese keitai, Samsung XCover) for resilience, blackouts, and intensive medical use (e.g., continuous glucose monitoring).
  • Others argue modern fast charging, external battery packs, and water resistance make swappable packs less compelling and harder to design safely.
  • Modular projects (Ara, Fairphone, Framework‑style ideas) are admired, but Fairphone is region‑limited and not very small; Unihertz/Fairphone‑style vendors rarely deliver long software support.

Why small flagships “don’t exist”: market vs manipulation

  • One camp: repeated attempts (Sony Compact line, Android minis, iPhone 12/13 Mini) sold poorly; battery physics and fixed‑size electronics make small phones inherently disadvantaged; panel makers don’t want tiny runs.
  • Opposing view: bigger phones boost ad real estate, engagement, streaming, and in‑app revenue; “digital addiction” plus “bigger number” marketing shape demand; small phones are often intentionally nerfed (battery, camera, “non‑Pro”) so their failure is self‑inflicted.
  • Several note stated vs revealed preference: many say they want small phones but at the store choose better camera, battery, or price instead.

Apple‑specific discussion

  • Strong nostalgia for iPhone 4/5/SE1 and 12/13 Mini as “peak iPhone” utility devices; many vow to keep Minis until they die, or consider buying used ones.
  • Suggested reasons Minis died: poor battery life (especially 12 Mini), cannibalization by cheaper SE, weak marketing, store staff steering buyers away, and no “Mini Pro” with top cameras.
  • Others say Apple’s data simply showed too few buyers; maintaining extra tooling and SKUs for a low‑single‑digit segment wasn’t worth it.

Software, UX, and ecosystem constraints

  • Modern apps and websites are often uncomfortable on small screens: huge padding, banners, upsells, popups, and ad blocks crowd out content, especially in banking and news.
  • Some basic needs (banking, 2FA, government, parking, restaurants) force current Android/iOS versions and Play Integrity/attestation, limiting Linux phones, e‑ink phones, and VoIP‑only solutions.
  • Foldables split opinion: some see Flip/Razr as the only way to get a small pocket footprint; others find them still ergonomically large when open, fragile, and creased.

Niche alternatives and speculative ideas

  • Mentions of Japanese flip/keitai phones, QWERTY devices, e‑ink phones, and a “ThinkPad of phones” with repairable parts.
  • Concepts like a thick “brick” computer plus tiny local terminals, or an e‑ink outer display + OLED inner foldable, are floated but recognized as unlikely to be mass‑market soon.

Young graduates are facing an employment crisis

Causes of the “crisis” for young grads

  • Several see a structural mismatch: many degrees in “fluff” or narrow majors (e.g. “health communications”) vs demand in areas like nursing, elementary ed, trades, and some STEM.
  • Others argue the economy itself is fine but entry‑level white‑collar roles have been hollowed out (similar to 2008 and dot‑com), with juniors squeezed between AI hype, offshoring, and a glut of laid‑off mid‑career workers.
  • Debate over AI’s real impact: some say management has over‑bought the “10x engineer with AI tools” narrative, suppressing hiring; others stress tax/R&D changes and cost‑cutting as bigger drivers.

Data, unemployment, and underemployment

  • Article’s headline “crisis” is challenged: new‑grad unemployment ~6–7%, highest since ~2014 excluding Covid, but not obviously catastrophic vs past recessions.
  • What is unusual: recent data show young college grads now have higher unemployment than the overall population—historically the reverse.
  • Multiple commenters emphasize underemployment (retail/restaurant work with degrees) as the hidden story; official stats don’t capture this well.

H1B, offshoring, and discrimination debates

  • Some hiring managers report being told to hire “H1B only” or only in India/overseas; others say large firms do the opposite (citizens only except in special cases).
  • Sharp disagreement on whether this is “treasonous,” merely illegal fraud, or just rational use of the “free market.”
  • Counter‑view: favoring Americans for jobs can itself be discriminatory; another segment insists offshoring/H1B is the primary reason juniors can’t get hired.

Education quality, AI, and skills

  • Professors and interviewers report alarming numbers of students and new grads unable to write FizzBuzz or basic loops without ChatGPT; heavy concern about cheating and “AI‑dependent” learning.
  • Some educators respond with in‑class, no‑device exams; others argue this is testing the wrong thing and that education should pivot to “programming with AI” and deeper understanding.
  • Post‑Covid cohorts are suspected by some of having weaker foundational skills, though others call this overblown.

Broken recruiting and ATS/LLM arms race

  • Many describe hiring as a low‑trust “numbers game”: thousands of applications, ATS filters, ghosting, fake resumes and even fake interviews.
  • LLM‑written resumes and employer LLM filters create an “AI vs AI” arms race; some claim using an LLM to generate the right buzzword‑heavy summary noticeably increases interview rates.
  • Result: good candidates get filtered out; hiring managers complain about interview quality despite a large supply of unemployed grads.

Generational conflict, housing, and politics

  • Strong resentment about older homeowners benefiting from cheap past housing and current asset inflation, while younger cohorts face high rents, low security, and student debt.
  • Canadian and US commenters link youth unemployment to housing unaffordability and rising intergenerational transfers (pensions, social security).
  • This feeds broader pessimism: talk of “serfs,” crumbling democracy, and the appeal of populist politics from both left and right.

Role of older workers and Social Security

  • Some originally blamed delayed retirements; others clarify that working past retirement age doesn’t reduce Social Security and may even strengthen the system via continued payroll taxes.
  • One view: government policies that “deflate the retirement rate” crowd out youth; another: the job pie isn’t fixed, more people working usually expands total employment.

Value of college and degrees

  • Disagreement over whether mass higher education still pays: some cite wage data showing degree holders still earn more; others argue college is over‑prescribed and often doesn’t increase real societal usefulness.
  • Non‑vocational degrees are criticized as a societal misallocation; defenders stress networking, maturity, and broad intellectual development.
  • Several note that degrees once served as a rough IQ/ability filter, but credential inflation and weaker cohorts have eroded that signal.

Historical parallels and coping strategies

  • Many mid‑career commenters recall graduating into recessions (early 90s, 2001, 2008) and say cycles of “graduate crises” are normal, but concede this one feels harsher for CS/SWE.
  • Advice themes:
    • Keep costs low, take some job (even outside your field) while you search.
    • Build real projects, contribute to open source, and network aggressively to bypass ATS.
    • Consider trades, nursing, or entrepreneurship; a few encourage creating your own job rather than waiting for corporate rescue.
  • Others warn against “false optimism”: improving efficiency (offshoring + AI) may permanently reduce demand for junior white‑collar workers, and relying on a new boom to fix it is a gamble.

Intel's retreat is unlike anything it's done before in Oregon

Employment practices, layoffs, and “corporate commitment”

  • Commenters debate whether hiring should be a long‑term commitment vs. a purely transactional exchange.
  • Some argue frequent over‑hiring and mass layoffs are irresponsible and socially damaging; others say labor mobility and “creative destruction” are necessary if paired with a strong safety net.
  • There’s disagreement over how traumatic firing is compared to divorce, but broad consensus that US job loss is overly destabilizing because benefits (healthcare, retirement, PTO) are tied to employers.
  • Several people advocate generous severance and transparent course‑corrections over keeping people in meaningless roles.

Intel culture, hiring, and bloat

  • Multiple anecdotes describe Intel as overstaffed, process‑heavy, and insular, with low ownership and weak alignment between skills and roles (e.g., PhDs from unrelated fields, “futurists,” anthropologists).
  • A recurring theme is that Intel’s internal culture didn’t reward urgency or innovation; people describe “fat” years of easy work, weak performance pressure, and misaligned R&D.
  • Some see the layoffs as an overdue correction to years of bloat; others say the real problem is mismanagement and the board, not rank‑and‑file engineers.

Capital allocation: buybacks vs. investment

  • A large subthread argues over stock buybacks vs. dividends vs. reinvestment.
  • One side: excess cash should go back to shareholders (especially via tax‑efficient buybacks) unless there are clearly high‑ROI projects; otherwise executives burn money on vanity projects.
  • The other side: buybacks create perverse incentives, enable financial engineering, and in Intel’s case likely worsened its competitive decline versus TSMC/AMD by starving fabs and R&D.
  • Some frame buybacks as borderline fraud; others counter they’re transparent, voluntary transactions and the real issue is bonus design, not buybacks per se.

Oregon vs Bay Area, and local economic impact

  • Intel’s Oregon footprint is portrayed as unusually large and now sharply downsized: reported Oregon cuts far exceeded prior local estimates and were a multiple of Arizona’s.
  • Hillsboro/Washington County are described as heavily Intel‑dependent; people worry about housing overbuild, falling prices, and a “company town”–style de‑industrialization.
  • Portland’s broader struggles (downtown hollowing out post‑COVID, riots, homelessness, weak startup scene) amplify fears that displaced workers won’t find comparable local jobs.

Startups, fabs, and where talent goes

  • Some hope a concentration of laid‑off semiconductor talent could spark startups, but many caution that fabs are too capital‑intensive; most realistic spinoffs will be fabless or entirely non‑tech (breweries, machine shops).
  • Portland is depicted as lifestyle‑oriented with relatively weak founder and VC ecosystems, so ambitious people often leave for the Bay Area or elsewhere.
  • Non‑competes and H1B status are briefly discussed; California’s legal environment is seen as friendlier for mobility.

Strategy, policy, and Intel’s trajectory

  • Commenters cite long‑running process missteps, botched product strategy (Itanium, mobile, AI, GPUs), and leadership failures since Andy Grove as root causes.
  • There’s debate over how much US policy (CHIPS Act design, export controls on China, geopolitical bets on TSMC Arizona) constrained Intel vs. simply exposing its weaknesses.
  • Some see current “shrink to survive” moves as necessary spring cleaning; others fear it’s the prelude to selling off or spinning out the foundry and ending Intel as a fully integrated giant.

Signs of autism could be encoded in the way you walk

Personal experiences with gait and autism

  • Many commenters self-report “odd gaits”: toe‑walking, flat-footed/shallow stepping, very fast walking, very quiet “stealth” walking, in‑toeing/out‑toeing, minimal or asymmetric arm swing (“T‑rex arm”).
  • Several recall teachers or adults flagging toe‑walking or asymmetric crawling decades ago; some link it to later autism diagnoses, others to tendon issues or surgery.
  • Some describe learning to consciously “correct” their gait after ridicule or military training, but defaulting back when not paying attention.
  • A few tie gait differences to sensory issues (dislike of noise from footsteps, hyper-awareness of surroundings) or hypermobility/Ehlers–Danlos.

Biomechanics, footwear, and culture

  • Long subthread distinguishing:
    • Toe‑walking (heel never contacts ground) vs.
    • Forefoot/midfoot striking (landing on ball/flat foot when running).
  • Debate over whether forefoot striking is “natural” in barefoot cultures; others warn of injury on hard, modern surfaces and emphasize cushioned or well-fitted shoes.
  • Some note sports training (soccer, tennis, sprinting, dance) encourages weight on the balls of the feet and might alter everyday gait.
  • Others point out longstanding cultural/racial stereotypes around gait (e.g., Native Americans, regional mannerisms) and caution against reviving this under a medical label.

Diagnostic value, over/under-diagnosis, and labels

  • Several stress that gait is already in the DSM only as a supporting feature, not a standalone diagnostic tool; at best it’s a hint or research clue.
  • Big disagreement over whether autism/ADHD are under‑diagnosed (especially in women and adults) or over‑diagnosed (especially in the US, with quick consults and medication).
  • Some say diagnosis is life‑changing and reduces lifelong confusion and self‑blame; others fear pathologizing mild differences, label‑seeking, and “cool” social‑media autism.
  • Commenters note autism’s umbrella nature and heterogeneity; any gait‑based generalization will miss large groups.

Stigma, surveillance, and “normality”

  • Multiple reports of bullying or disgust toward “funny walks”; some argue humans are wired to dislike deviation but can learn tolerance.
  • Worries about gait analysis being folded into AI surveillance or autism registries, and historical echoes of phrenology and eugenics.
  • Several argue that much suffering comes from rigid social expectations (“thrives in American high school”) rather than from gait or autism per se; others counter that high‑support‑needs autistic people struggle regardless of societal tolerance.

PyPI Prohibits inbox.ru email domain registrations

Domain ban rationale and scope

  • Commenters note inbox.ru is a major Russian free email provider, so some legitimate users may be affected.
  • Confusion over why only inbox.ru is banned when mail.ru and related domains have identical signup flows.
  • Others reference earlier bans (e.g., Outlook / MSN) as part of a broader policy against providers heavily used for mass malicious signups.
  • Some say providers also get banned when they mishandle or block verification emails, creating support burden.

Effectiveness and limits of email-domain bans

  • Several argue banning a single popular domain only stops the lowest-effort attackers; cheap accounts for major providers are widely available.
  • View that banning domains is still a reasonable “low-hanging fruit” control: you incrementally raise attacker costs, even if they can adapt.
  • Analogy drawn with blocking abusive IP ranges: ultimately you pressure the provider to deal with its bad actors.

Is the package index model broken?

  • Critics claim the “anyone can publish, one-command install” model (PyPI, npm, VS Code extensions, etc.) is structurally insecure, leading to typosquatting/slopsquatting and whack-a-mole responses.
  • Some argue for distro-style curation: community validation first, then packaging by trusted maintainers, possibly plus sandboxing.
  • Others counter that fully vetted indices would need dozens of full-time reviewers and are economically infeasible under current funding models.
  • Rebuttal: the model has always implicitly assumed users vet dependencies themselves, but this is unrealistic when projects pull thousands of packages.

Linux distributions vs PyPI

  • One camp: distros are more trustworthy because new maintainers are mentored, use signed keys, and packages are reviewed before inclusion.
  • Another camp (including distro contributors): actual malware/code review is minimal; most effort checks packaging, not deep security. Large dependency trees often get rolled in without intense scrutiny.
  • xz backdoor and long-lived vulnerabilities are cited as evidence that even distros don’t provide strong security guarantees.

Manual review and alternative mitigations

  • Suggestions: manual review of first uploads for new accounts; requiring reviewers to vet random packages; domain-ownership checks like Maven Central.
  • Pushback: PyPI is understaffed; manual queues are easy to DoS; domain validation proves identity, not integrity.
  • Some propose more automated analysis: pagerank-style dependency metrics, security analytics platforms, and “firewall” CLIs that block known-malicious/typo/slopsquat packages.

Side thread: PHP app install patterns and security

  • A promoted open-source security analytics tool using traditional PHP-style web installer receives criticism: web-accessible installer, manual deletion of install scripts, writable code directories.
  • Others note this is still common in PHP apps (WordPress, Matomo, etc.), but also a major reason for PHP’s poor security reputation.
  • Discussion branches into how quickly new hosts are probed (e.g., via certificate transparency logs) and the need to secure services within seconds of exposure.