Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 316 of 533

Congestion pricing in Manhattan is a predictable success

Ideology, “Neoliberalism,” and The Economist

  • Long subthread on labeling The Economist: classical liberal vs “neoliberal,” center‑right, not left.
  • Several point out that Pigovian taxes, congestion pricing, and carbon taxes are entirely consistent with market economics, not “anti‑market” intervention.
  • Others stress neoliberalism vs US “liberal” and “left” are muddled terms that many people use mainly as slurs.

Who Benefits, Who Loses, and Class Issues

  • Supporters argue: in Manhattan, regular car commuters are disproportionately affluent; the poorest rely on buses and subways, which benefit most from less congestion and new funding.
  • Critics call it classist: it prices out lower‑income drivers (including long‑time residents, small‑business workers, and people with car‑dependent jobs) while the rich simply pay and enjoy emptier roads.
  • Some cite low‑income credits and disability waivers; opponents dismiss these as bureaucratic fig leaves.

Observed Effects: Traffic, Buses, Air, Safety, Business

  • Multiple first‑hand accounts: traffic is clearly lighter, especially at traditional choke points; buses and deliveries are faster and more reliable.
  • Early data cited: fewer crashes and injuries in the zone; modest improvement in one particulate measure (too early to prove causation).
  • Some residents say the main quality‑of‑life gain is the disappearance of “show‑off” cars and street noise at night.
  • Others report no noticeable change or note that their own costs (taxis, tradespeople, deliveries) are going up.
  • Comparisons to London: congestion initially fell, but critics claim it crept back as charges were politically held below true congestion‑clearing levels.

Regressivity, Externalities, and Pass‑Through Costs

  • One camp: this is a regressive tax that will raise the price of “literally everything,” subsidize a wasteful MTA, and deliberately reserve driving for the rich.
  • The other: congestion and road space were already heavily subsidized; the charge simply makes private driving reflect its full social cost (space, pollution, delays), replacing “deadweight loss” with revenue for transit.
  • Ongoing dispute over evidence: will time savings for trucks and service vehicles outweigh the fee, or be passed on as higher prices?

MTA Governance and Use of Funds

  • Several posts highlight documented MTA waste, union‑driven overstaffing, and contractor capture; they fear new revenue will be squandered.
  • Others counter with references to legally earmarked capital plans: billions for new subway cars, buses, and modern signals, arguing congestion funds are among the few streams with clear safeguards.
  • Broader argument about US habit of outsourcing core public functions to consultants and contractors, and whether rebuilding in‑house expertise is underway.

Politics, Legitimacy, and Long‑Term Design

  • Discussion of federal attempts to block the program, state‑level delay until after an election, and the outsized role of city employees with free parking in opposing it.
  • Some see rural/suburban backlash as part of a broader anti‑city, anti‑transit culture war.
  • Concerns that if pricing isn’t dynamically adjusted, congestion may eventually return while the charge persists as a quasi‑permanent toll.

Meta announces Oakley smart glasses

Frame Material, Weight, and Comfort

  • Strong focus on how heavy current smart glasses feel vs. normal eyewear, especially acetate vs titanium.
  • Several argue titanium won’t solve comfort: frame weight quickly becomes dominated by batteries and electronics, not frame material.
  • Hollow / sheet-titanium constructions are debated, but posters conclude you can’t get anywhere near the feel of ultra-light 5–10 g titanium frames once you add electronics (Meta glasses are ~50 g).
  • Concern that glasses worn all day irritate nose/ears; many who can avoid glasses do so via contacts or LASIK.

Features, Use Cases, and Lack of AR Display

  • Many are surprised these have no HUD/visual AR; they’re essentially camera + mic + speakers + voice assistant.
  • Use cases praised: low-vision aid (reading labels, locating objects), hands-free photos/video, music, calls, quick voice queries.
  • Some think these (or successors) are on track to replace phones once usable in-glasses displays and better input arrive.
  • Others see them as a niche or phone accessory, not a replacement, due to poor input (voice, gestures), no screen, and limited functionality.
  • Comparisons made to other devices: Even Realities G1, Xreal, INMO, Ray-Ban Meta, upcoming Orion, open-source AugmentOS-based glasses.

Will Smart Glasses Replace Smartphones?

  • Optimists: XR/AR is seen as the next dominant platform, like smartphones vs laptops; glasses plus AI, eye tracking, and new UIs could eventually feel more natural than phones.
  • Skeptics: speech is a bad primary interface, glasses aren’t dramatically more portable than phones, and smartphones already cover almost all everyday needs.
  • Broad agreement that if they “replace” phones, it will be partial and slow, similar to how smartphones partially displaced PCs.

Privacy, Surveillance, and Social Norms

  • Strong pushback on always-on (or always-listening) cameras/mics from an ad-tech company; many say they’d never trust Meta with that feed.
  • Worries about workplace security (screens, secrets), legal issues in strict jurisdictions, and recording people without consent.
  • Some advocate socially ostracizing wearers in public or at least refusing to interact when a camera is pointed at them.
  • Others note that ubiquitous cameras (phones, doorbells, CCTV) are already the norm, though some argue that’s no reason to “make it worse.”

Platform Lock-In, SDK, and AI Choice

  • Frustration that there’s no public SDK: the glasses only do what Meta allows, limiting third-party experimentation.
  • Users want to route the wake-word and camera pipeline to alternative AIs (e.g., ChatGPT), not just Meta AI; current workarounds only treat them as generic Bluetooth headsets.
  • Battery non-replaceability is a deal-breaker for several; they don’t want another sealed, time-limited gadget.

Design, Branding, and Adoption

  • Mixed reaction to Oakley styling: some say these don’t look “Oakley” (too round / generic), others think they look dorky, especially on the CEO.
  • Discussion of Luxottica’s dominance, high margins, and whether style/fashion and youth trends will make or break adoption.
  • Concern that visible camera lenses and dark tints make eye contact harder and increase social friction.

Wayland is growing up. and now we don't have a choice

XLibre, politics, and HN moderation

  • XLibre (a fork of Xorg) is discussed as an attempted continuation of X11 development after the main Xorg maintainers largely moved on to Wayland.
  • Several comments describe the fork’s lead as controversial, with a history of problematic patches and inflammatory political messaging (e.g. slogans in the README), which many say is poisoning the project’s reception.
  • Others strongly dispute the “bad patches” narrative, framing the situation as corporate capture (Red Hat/IBM etc.), DEI politics, and deliberate attempts to kill X11 and smear the fork’s author.
  • HN users clarify that XLibre is not “banned” on the site; previous submissions were flagged by users for low substance and drama, not removed by moderators as policy.

Wayland vs X11: design, maturity, and missing pieces

  • Some see Wayland as “second-system effect”: simplistic core, many critical features (DMA/DRM integration, color management, scaling, screen capture, input quirks) added later as fragmented, often-staging extensions with uneven compositor support.
  • Others counter that X11’s networked, server-side drawing model is fundamentally mismatched to modern GPUs, and that “fixing X” would effectively mean designing a new protocol anyway.
  • There’s disagreement on whether Wayland meaningfully improves latency/tearing and whether compositors are sufficiently compatible and secure.

Nvidia and distros

  • Multiple users report Wayland + Nvidia failures (black screens, broken installs) on Debian; others say Wayland works fine with Nvidia on Fedora, Ubuntu, Arch, and Tumbleweed.
  • One theme: Debian’s older packages lag Wayland/Nvidia improvements, so judging current Wayland support from Debian stable is seen as misleading by some but “stability over novelty” by others.

Accessibility concerns

  • The original article’s point is echoed: only GNOME has halfway-usable accessibility on Wayland today; other desktops lag badly.
  • Orca support on GNOME Wayland currently goes via a D-Bus protocol rather than a Wayland-native one, justified by GNOME devs as a sandboxing/security decision. Some see this as pragmatic; others think accessibility should be first-class in Wayland, not a side-band.
  • Disabled users describe facing ~100 hours of migration work (hotkeys, OCR workflows, gamma, magnification, Orca) and feeling treated as “edge cases” in a forced transition.

Xlib applications and XWayland

  • Developers relying on raw Xlib ask what happens under Wayland. Responses: standalone Xorg may fade, but XWayland will remain and can act as an X11 compatibility layer for some time.
  • There’s interest in leaner X servers or XWayland variants that modernize internals without full Wayland buy-in.

Remote desktop

  • A missing “grown-up” feature cited for Wayland: multi-user, fully in-memory accelerated remote desktop (Xrdp-style), not just screen sharing. Existing efforts (e.g., FreeRDP-based) are seen as immature.

Oklo, the Earth's Two-billion-year-old only Known Natural Nuclear Reactor (2018)

Information gaps and use of LLMs vs Wikipedia

  • Several commenters note the IAEA article is light on quantitative details (ore size, total energy, timing, observability).
  • Wikipedia is cited as a much better technical source (e.g., ~100 kW average thermal output over hundreds of thousands of years).
  • Some defend using tools like Claude/Perplexity with web search for structured explanations and better discovery, others say “just use a search engine” and warn against unverified LLM outputs.
  • One analogy: LLMs are like lossy compression of knowledge, so you shouldn’t expect precise, reference-grade answers.

Uranium enrichment, early Earth, and cosmic origin

  • Discussion of why natural reactors were possible 1.7–1.8 billion years ago: higher natural U‑235 fraction then, plus water moderation and special ore geometry.
  • People link the current 0.720% U‑235 ratio to nucleosynthesis in supernovae and radioactive decay timescales.
  • It’s noted that “fresh” supernova debris has more U‑235 than U‑238; over billions of years U‑235 decays faster, flipping that ratio.
  • Debate over whether all Uranium on Earth came from a single or many supernovae; consensus in-thread leans toward multiple events well-mixed in the proto-solar cloud.

Oklo and nuclear power advocacy/skepticism

  • Some see “100 kW for hundreds of thousands of years, naturally contained” as a powerful pro‑nuclear talking point.
  • Pro‑nuclear comments emphasize dense, stable, low day‑to‑day risk power, and argue that economic models undervalue very long-lived assets.
  • Skeptical comments stress high capital costs, increasing lifecycle costs (decommissioning, waste), and low-probability but extremely expensive accidents (e.g., Fukushima cleanup scale).

Waste burial and long‑term safety

  • Oklo is cited as evidence that fission products can remain underground for billions of years; skeptics counter that groundwater interactions occurred and “safe now” took 2 billion years.
  • Long exchange on deep geological repositories:
    • Pro side: burying waste ~0.5–1 km deep in stable bedrock with no aquifer makes leakage extremely implausible; some repositories (e.g., in Finland, US defense waste sites) already exist.
    • Skeptical side: real-world failures (flooded or unstable mines, mishandled barrels), transport risks, need for continuous safety culture, political/economic corner-cutting, and unknown long-term geology.
    • Also a distinction between “can be done safely” vs “will be done safely under real institutions.”

Discovery, measurements, and classification

  • The slight depletion (0.717% vs ~0.720%) mattered because arms-control accounting required precise U‑235 balance, prompting investigation.
  • Commenters are curious about the measurement uncertainty and enrichment impact of such a small delta.
  • Clarification that “natural nuclear reactor” here means fission on Earth’s crust, not stellar fusion.

Miscellaneous

  • Lighthearted speculation about ancient or time-traveling civilizations causing Oklo.
  • Reference to Oklo the startup as a cleverly named nuclear company that hasn’t yet operated a reactor.

New Linux udisks flaw lets attackers get root on major Linux distros

Scope and impact of the udisks flaw

  • Discussion centers on a local privilege escalation requiring:
    • A vulnerable udisks version.
    • A specific PAM configuration (not default everywhere).
  • Exploit was demonstrated on Ubuntu, Debian, Fedora, and openSUSE/SUSE; some distros (e.g., Debian, Gentoo with default config, rolling Arch) are already patched or less exposed.
  • Several comments note: this is typical of a mature ecosystem where attackers are pushed into narrower, more complex chains.

How serious is local privilege escalation?

  • One camp: local root on a single-user desktop doesn’t change much—once an attacker runs code as your user, they can already exfiltrate secrets and persist.
  • Counterpoints:
    • On systems with real isolation (Android, multi-user servers, shared environments, academic shell servers), LPE is a big deal.
    • LPEs “turn any basic access into root” and are valuable for chaining with remote bugs, lateral movement, and cloud takeovers.

Linux vs BSD/other OSes

  • Some argue Linux desktop feels like an “eternal experiment” in features and security; others say competing OSes are at least as experimental or worse.
  • BSDs and illumos are praised for:
    • Smaller, more coherent design (fewer competing subsystems).
    • Capability mechanisms (Capsicum), jails, zones.
  • Critics note they still lack user-visible, app-granted capability models like iOS/Android, and suffer from weak vendor/software support.

Secure desktops and hardened distros

  • Desire for a “GrapheneOS for desktop” leads to mentions of:
    • Qubes OS (strong isolation but heavy, UX and hardware-acceleration issues).
    • SecureBlue, Kicksecure (hardened Linux distros).
    • grsecurity (commercial, kernel-hardening; debated ethics and value vs “snake oil” accusations).
  • Debate over whether kernel hardening alone suffices vs needing userland/app isolation.

Setuid, udisks size, and alternatives

  • Recurrent theme: setuid binaries are a recurring LPE source; better to avoid or minimize SUID and reduce trusted code bases.
  • udisks is criticized for large LoC and complexity compared to simpler tools (e.g., pmount).
  • sudo’s size and CVE history are discussed; suggestions:
    • Use simpler doas / OpenDoas.
    • systemd’s run0 as a non-setuid alternative.
    • Rust rewrite of sudo (sudo-rs) to reduce memory-unsafe bugs, though concerns about rewrite regressions remain.

Containers, namespaces, and kernel CVEs

  • Strong disagreement over whether containers are valid security boundaries:
    • Skeptical view: shared kernel = assume escape; kernel CVE count is huge.
    • Pragmatic view: containers work “well enough” in practice; Android uses shared-kernel isolation heavily (plus SELinux).
  • Namespaces and user-namespaces have been major LPE sources; some distros now restrict unprivileged access, breaking tools.
  • Micro-VM approaches (e.g., kata-style) are mentioned as a stronger isolation layer but with performance and maturity caveats.
  • Caveat on CVE counts: Linux kernel intentionally over-assigns CVEs for anything possibly exploitable, so raw numbers overstate practical risk.

PAM, polkit, and configuration pitfalls

  • The exploit chain hinges on:
    • PAM’s pam_env / user_readenv behavior and distro-specific PAM configs.
    • polkit “allow_active” rules (privileges granted to the currently active logged-in user, e.g., for mounting devices).
  • Key lesson emphasized: obscure, custom auth/config mechanisms (rather than plain, inspectable config) can hide policy bugs for years.

System complexity and “creeping” infrastructure

  • Some lament the growth from simple 20-years-ago Unix desktops to today’s maze of daemons, buses, policy engines (systemd, PAM, polkit, udisks, etc.).
  • View that enterprise-driven components and tight coupling expand the attack surface and fragility, versus older, simpler setups.
  • Others counter that evolving requirements and software never being “done” make such growth inevitable.

I will do anything to end homelessness except build more homes (2018)

Reactions to the Satire

  • Some found the piece funny, incisive, and depressingly accurate about “I care, but not enough to change anything” attitudes and NIMBY obstruction of both housing and transit.
  • Others dismissed it as shallow, self‑righteous ranting that oversimplifies a complex problem and caricatures tech workers and homeowners.

Is “Not Enough Homes” the Main Cause?

  • One camp argues the evidence is clear: higher housing costs strongly correlate with higher homelessness; building more units at any price point reduces overall rents and homelessness.
  • Skeptics counter that many visible homeless people have severe mental illness or addiction and wouldn’t be “fixed” by more market housing; they emphasize welfare systems, treatment, and “21st‑century asylums.”
  • Several note homelessness is a gradient: car‑dwellers with jobs, couch‑surfers, shelter users, rough sleepers. Cheaper housing mainly prevents people on the edge from falling into chronic street homelessness.

Affordable vs “Luxury” Housing

  • Repeated complaints that new construction in US cities is overwhelmingly expensive apartments or “luxury” units, with little truly affordable stock.
  • YIMBY‑style replies: even high‑end units help by freeing up older, cheaper housing (“filtering”) and expanding supply; the real problem is that building any housing is heavily restricted.
  • Others respond that incentives under current finance, land prices, and building standards inherently push developers to the high end unless there are strong subsidies or public building.

Regulation, NIMBYism, and Politics

  • Broad agreement that local zoning, height limits, parking minimums, and permitting delays constrain supply, often weaponized by homeowners worried about property values, traffic, noise, or “neighborhood character.”
  • Debate over whether this is primarily a “blue state” problem (e.g., California) vs a rich‑area problem that transcends party; examples cited of both permissive (Texas, some Midwest cities) and reforming (Minnesota, Washington, Vienna) jurisdictions.
  • Some stress that deregulation alone can just produce more expensive units unless tied to public or nonprofit affordable housing and stronger social safety nets.

Mental Health, Addiction, and “Two Homeless Populations”

  • Common framing: a large “economic” homeless group (job loss, rent hikes, evictions) and a smaller but more visible group with severe psychiatric or substance‑use disorders.
  • Several argue housing first programs show that stable housing makes treatment, employment, and recovery far more feasible, and that homelessness itself worsens mental health and drug use.
  • Others insist a subset will still destroy housing or remain unsafe without supervised or institutional settings; they call for parallel investments in treatment facilities and supportive housing.

Investment, Empty Units, and Policy Levers

  • Concerns about housing as an investment vehicle: corporate buyers, vacation rentals, and empty “investment properties” reducing effective supply and pushing working‑class renters out.
  • Proposed remedies include progressive taxation on multiple property ownership, vacancy taxes, tighter rules on short‑term rentals, and large‑scale public or cooperative housing.
  • Counter‑argument: much “hoarding” only works because severe supply constraints make land appreciation a near‑sure bet; fix supply and the speculative premium shrinks.

Learn Makefiles

GNU Make usage and useful flags

  • Several lesser-known flags are highlighted: output synchronization (--output-sync), load-based parallelism (--load-average), randomizing target order for CI hardening (--shuffle), unconditional rebuilds (-B).
  • Some argue these flags are non‑portable and should be avoided in distributable projects; others respond that the tutorial is clearly about GNU Make and these options are fine for end users and in controlled environments.

Portability vs. GNU extensions

  • One camp stresses portability (POSIX make, portable constructs) as a way to enforce discipline, readability, and maintainability; warns against overusing GNU‑specific metaprogramming features (eval, complex macros).
  • Another camp calls portability overrated, advocating full use of GNU Make’s richer feature set, especially for in‑house or single‑platform projects; notes GNU Make itself is widely portable and commonly available.
  • Some prefer “portable make” (i.e., ship GNU Make everywhere) over writing “portable Makefiles.”

Parallel builds and resource issues

  • Debate over make -j: some consider unbounded -j a footgun causing OOM or I/O storms; others classify that as user error and argue you should always specify reasonable job or load limits.
  • There’s criticism that Make doesn’t provide a “sane” default parallel strategy, leading to unnecessary cognitive load for users.

Appropriate scope and complexity

  • Warnings against turning Make into a Turing‑complete metaprogramming system or reinventing autotools inside Make; implicit rules and default suffix rules are seen as both powerful and dangerous (many serious Makefiles disable them with .SUFFIXES:).
  • Make is praised as a good way to learn declarative thinking, but people caution against using it as a generic task runner for things like Terraform.

Alternatives and modern build tools

  • Many alternatives are mentioned for different niches: Meson, Ninja, CMake, Bazel, xmake, SCons, Task, just, various language‑specific “*-ake” tools, and workflow tools like Snakemake/Nextflow.
  • Some see just/Task as better “command runners” but note they don’t replace Make’s incremental rebuild logic.
  • Others argue modern systems (Bazel, CMake+Ninja, Meson) have largely superseded Make for large C/C++ projects.

C++20 modules and Make

  • C++20 modules are criticized as hard to reason about and implement in traditional build systems; they require dynamic dependency discovery and complicate incremental and parallel builds.
  • Discussion notes that CMake drops Makefile generation for modules in favor of Ninja, but this is attributed more to CMake’s design than an inherent Make limitation.

Tutorial and style feedback

  • Readers appreciate the tutorial as a friendlier on‑ramp than the official manual, but point out technical nitpicks: confusing dependency graphs (source vs binary targets), lack of .PHONY emphasis, recursive make being presented without warning, and some MAKEFLAGS handling being subtly wrong.
  • There’s general agreement that GNU Make’s official manual is high‑quality but dense, and that editor support makes tab‑sensitivity largely a non‑issue.

Break Up Big Tech: Civil Society Declaration

Scope and Feasibility of “Breaking Up” Big Tech

  • Many argue the EU has real leverage: it can fine, regulate, or bar market access until structural changes happen, pointing to the USB‑C mandate as precedent.
  • Skeptics counter that forcing an actual breakup (spinning off units that no longer benefit the parent) is qualitatively different from product rules and could push firms to leave the EU instead.
  • Others suggest more radical sovereignty moves: banning or excluding US platforms from government use, or China‑style bans to force local alternatives—though many see that as politically and technically risky.

Europe’s Tech Weakness: Culture, Capital, or Capture?

  • One camp blames “hostility to business/tech,” risk aversion, fragmented markets, and weaker capital markets for Europe’s lack of US‑scale giants.
  • Others reject cultural stereotypes, pointing to numerous European tech firms and arguing that:
    • US outcompetes mainly via capital markets and dollar hegemony.
    • European startups are systematically acquired by US giants, draining potential champions.
  • Some say Europe may not want its own Big Tech; the goal is fewer mega‑corporations globally, not “our monopoly vs yours.”

Monopoly Power, Network Effects, and Standards

  • Broad agreement that oligopolies, lock‑in, and network effects (social graphs, app stores, ad networks, cloud platforms) make entry difficult and entrench power.
  • Strong current of support for:
    • Open standards, data portability, and mandated interoperability (especially for messaging and social media).
    • Decentralized protocols (email, web, ActivityPub, Matrix) as structural checks on monopoly, though others argue even decentralized ecosystems trend toward de facto centralization.
  • Several participants note prior antitrust (e.g., against Microsoft) did have teeth and enabled interoperability; they call for earlier, more proactive intervention in emerging areas like AI chips.

User Choice vs Regulation

  • Some advocate personal boycotts, de‑Googling, FOSS and Linux; others argue individual action is nearly meaningless without regulation due to network effects and prisoner’s‑dilemma dynamics.
  • There is support for combining both: personal divestment from Big Tech plus robust regulation to “save capitalism” from winner‑take‑all dynamics.

Harms Attributed to Big Tech

  • Concerns cited include:
    • Democratic erosion via algorithmic feeds, recommender systems, targeted propaganda, and control over public discourse.
    • Dependence on closed ecosystems (Google for search/ads, Apple for mobile apps).
    • Structural damage to journalism via ad monopolies and “adtech tax.”
  • Some caution that breaking up firms alone won’t fix the “internet as propaganda machine” without addressing the advertising‑driven business model itself.

JavaScript broke the web (and called it progress)

Blame: JavaScript vs People and Culture

  • Many argue JavaScript itself didn’t “break” the web; poor training, weak engineering practices, and marketing pressures did.
  • Others counter that giving client code power over navigation, rendering, and UX inevitably enabled breakage, so the platform design shares blame.
  • Browsers’ tolerance for broken code is seen as removing accountability: bad sites “sort of work” instead of failing loudly.

Frameworks, SPAs, and Self‑Inflicted Complexity

  • Strong criticism of SPA frameworks and “JS for everything” for blogs and simple sites: reinvented routing, navigation, templating, and caching poorly.
  • Some note that SPAs make things like history, links, and buttons 4× harder to get right, driving regressions in basic browser behaviors.
  • Others respond that popular frameworks (React, Vue, Svelte, etc.) handle history and links correctly if used properly; most problems are developer errors.

Performance, Bandwidth, and UX

  • Complaints about megabytes of JS, slow loads on low-end phones and weak mobile networks, and JS build pipelines rivaling C++ complexity.
  • Defenders say many modern web apps (Gmail, Fastmail, YouTube, etc.) clearly outperform old native/desktop clients for many users.
  • Some argue latency-sensitive users benefit from well-designed SPAs that keep interactions local and sync in the background.

Accessibility and Semantics

  • Long list of failures (broken back buttons, uncopyable content, keyboard traps, shifting layouts) is widely agreed to be real.
  • Disagreement on cause: one side blames SPA patterns and “anything can be a button/link” culture; the other says the same damage was done with server-rendered HTML and is purely about discipline and semantics.

Ecosystem, APIs, and Platform Design

  • Critics highlight JS’s historic lack of a standard library and awkward early DOM/XHR APIs as drivers of huge frameworks.
  • Others emphasize that the deeper problem is the ad‑hoc, inconsistent web API stack (graphics, audio, clipboard, fullscreen, filesystem, etc.), not JS the language.
  • There’s nostalgia for simpler document-centric web design and interest in “HTML-first with JS sprinkles” approaches (progressive enhancement, htmx, islands frameworks).

Industry Incentives and Churn

  • Many recount periods of extreme framework churn and resume‑driven/leadership‑driven rewrites, especially in 2015–2020.
  • Some say the ecosystem has since stabilized and that JS the language is relatively stable; unnecessary rewrites are more organizational than technical.

Monetization, SEO, and Meta‑Discussion

  • Several argue ads, tracking, and SEO are the real culprits behind bloated, hostile experiences, with JS as the vehicle.
  • The article is criticized as clickbait, possibly AI- or SEO-influenced; others defend its core critique while rejecting the nostalgia or hyperbole.

Hurl: Run and test HTTP requests with plain text

Snapshot testing and desired features

  • Several commenters want built-in snapshot testing similar to insta: auto-generating expected outputs, reviewing diffs, and accepting/rejecting changes instead of hand-writing assertions.
  • Snapshot masking of non-deterministic fields (timestamps, IDs) is seen as a big benefit.
  • Hurl currently doesn’t have snapshot support; other tools (e.g., Kreya) are adding it.

Positioning vs other HTTP tools

  • Many see Hurl more as a Postman/Runscope replacement than a curl replacement: persistent, shareable test suites in plain text, under version control.
  • Compared against IDE HTTP clients (VS Code REST Client, IntelliJ, Neovim plugins, httpYac, Bruno). Hurl’s advantages: editor-independent, CLI-first, text files committed directly, no GUI export/import.
  • Some users still prefer .http-file ecosystems due to existing IDE integration.

Workflow, syntax, and capabilities

  • Users like the ability to:
    • Capture values from responses ([Captures]) and reuse them in later requests.
    • Reference external files as bodies and as expected outputs.
    • Use environment files and template variables for profiles.
    • Assert on status, body, headers; use it in CI and as API documentation.
  • Status-code assertions living next to the request (HTTP 200) rather than in [Asserts] confuse some, but maintainers say HTTP also serves as response-section marker.
  • Hurl is HTTP-only: no JS engine, no browser interactions; it simulates only the underlying HTTP traffic.

Integrations, packaging, and roadmap

  • Maintainer mentions goals: better IDE integration, gRPC and WebSocket support, and official distro packages (Debian/Fedora).
  • There is already .netrc support; a dedicated config/rc file is planned.
  • Rust users highlight reusing .hurl files via a Rust library and cargo test, and wrapping libhurl for things like Lambda-based monitors.

Critiques, limitations, and open questions

  • Missing features or pain points: snapshot testing, includes/fixtures reuse, SSE/stream testing, regex backreferences, richer client state management, rc file.
  • Some find the DSL non-intuitive compared to a general-purpose language or framework (e.g., Django tests, Karate), and question why not “just use a scripting language.”
  • Others argue language-agnostic, black-box API tests are a feature: better contract testing, easier migrations, and clearer separation between implementation and interface.

Standardization and interoperability

  • Multiple tools (.http formats, capture syntaxes) are incompatible; a few wish for a shared standard.
  • Hurl offers hurlfmt → JSON export as a partial mitigation for migrating between tools.

Mbake – A Makefile formatter and linter, that only took 50 years

Tool reception & integration

  • Many welcome a Makefile formatter/linter and intend to try it; some note similar tools have existed (makel, unmake, checkmake, make-audit, editor linters), so “50 years” is seen as exaggeration.
  • Suggestions to:
    • Package it as a pre-commit hook.
    • Use the existing VS Code extension; some missed this in the README on mobile.
    • Provide inline “ignore” syntax for individual rules as an escape hatch.
  • An AUR package is already available.
  • One commenter asks how it differs from earlier Makefile linters/formatters; this remains unclear.

Formatting philosophy & .PHONY handling

  • Consolidating .PHONY targets into a single line is controversial:
    • Critics say .PHONY should sit next to each rule, both for readability and to avoid desynchronization (e.g., listing a phony target that doesn’t exist).
    • Others point out this grouping is configurable and like the reduced clutter.
  • Concern that some Makefiles use indentation/variable placement as semantic cues. Mechanical rewriting risks losing this “human context.”
  • Counterpoint: this tension exists for any language formatter; many still prefer automatic formatting with some configurability.

Make as tool: love, hate, and alternatives

  • Strong defenses of make:
    • Ubiquitous (POSIX, common on minimal systems), language/tooling agnostic “enough,” declarative, good for reproducible “make run / make test” workflows and CI.
    • Lets you define a DAG of tasks with dependencies and incremental rebuilding.
  • Criticisms:
    • Environment-variable–centric configuration is seen as bad DX and a source of subtle bugs (“spooky action at a distance,” sudo/containers quirks).
    • Make is “make file”: originally about file timestamps, now widely (mis)used as a general task runner.
  • Alternatives mentioned:
    • Tup as a more rigorous build system with better incremental performance, but with less mindshare and more constraints.
    • Rake/other task runners or plain shell/CI scripts for task orchestration.

Language choice (Python) and distribution

  • Some debate around Python:
    • Acknowledged: tricky installs, dependency mess, poor performance, hard packaging vs compiled languages.
    • But its ecosystems and user base dwarf most “better” languages; newcomers adopt it easily; many tools will continue to be written in it.
  • Pushback that pip install … as primary install path excludes many users; binary or OS-package distribution is preferred.
  • Several participants describe moving away from Python for tools (except stdlib-only scripts) due to dependency and multi-interpreter pain.

Open source can't coordinate?

Linux Desktop Fragmentation & Coordination

  • Many argue Linux as a consumer OS lacks a coordinating “reference platform” like Windows/macOS. Vendors (distros, DEs, toolkits, packagers) share power but no one optimizes end‑to‑end user experience.
  • Attempts at coordination (freedesktop.org, Wayland, LSB) helped for DEs and graphics, but application portability and packaging remain messy.
  • Some think this is not uniquely an OSS problem: proprietary ecosystems also fragment (multiple Windows GUI stacks, WinUI vs UWP vs Win32, Electron, etc.).

Choice vs Cohesion (systemd, drivers, desktops)

  • systemd is a central example: supporters say it filled a crucial gap and enabled a more coherent platform; critics say it killed alternatives and reduced choice.
  • Underlying tension: “many options” vs “one robust, standard way.” Some argue too much choice hurts users (audio stacks, multiple DEs, init systems).
  • Hardware and driver issues are framed as a clash between FOSS ideals and proprietary blobs; this harms desktop adoption, especially on laptops.

Android, ChromeOS, and Alternative Baselines

  • Some propose that distros should have rallied around Android/AOSP as a common app platform, reusing Google’s investment and ecosystem.
  • Others respond that Android is technically and philosophically ill‑suited for desktops (sandboxing model, restricted userland, UI assumptions, dependence on Google, OEM bloat/spying).

Packaging, Compatibility & App Distribution

  • Binary compatibility across distros is considered painful (DEB vs RPM vs others).
  • Flatpak/Snap/AppImage are seen as partial solutions: they improve “compile once, run anywhere” but introduce tradeoffs in storage, RAM, and complexity; layering/dedup can mitigate some bloat.

Standards & Protocols: LSP, POSIX, XDG

  • Some agree with the article that OSS “missed” a chance to create an IDE protocol before LSP; others say the ecosystem and tooling (e.g. GitHub, language maturity) weren’t ready.
  • LSP gets mixed reviews: praised for enabling IDE‑like features in editors (vim/emacs), but criticized as underspecified, buggy across servers, and de‑facto biased toward VS Code.
  • POSIX is cited as “coordination after the fact”: it standardizes common denominators once multiple implementations already exist, often with long delays (e.g., strlcpy/strlcat).
  • Slow adoption of obvious improvements like XDG base dirs is another example of coordination friction.

Governance, Incentives & “Jerk” Maintainers

  • Several comments argue the core issue is incentives: corporations pay people to coordinate; FOSS relies on volunteers whose priority is their own project, not global coherence.
  • Strong maintainers (sometimes abrasive) can both protect quality and block useful changes for years; forking is the ultimate escape hatch but costly for most users.
  • Others see the lack of a single authority as a feature: open source optimizes for freedom and experimentation rather than a uniform, polished cathedral.

Infinite Mac OS X

What Infinite Mac Is (and Communication Gaps)

  • Several readers found the blog post unclear about what Infinite Mac actually is.
  • Others clarified: it’s a website that compiles existing open‑source emulators (for classic Mac OS and NeXTSTEP) to WebAssembly, pairs them with preconfigured disk images, and runs them directly in the browser—no local install needed.
  • Some felt the post should have contained a one‑line “tl;dr” definition up front.

Aqua, Platinum, and macOS UI Design Trends

  • Strong nostalgia for Aqua and pre‑OS X Platinum: described as clear, learnable, consistent, and work‑oriented.
  • Several contrast Aqua’s “lickable” but highly usable design with today’s flatter, lower‑contrast macOS look, which some see as sterile or even regressive in usability.
  • Others argue macOS is “self‑evidently” more usable now given its broader adoption, a point that is pushed back on as conflating install base with UX quality.
  • There’s affection for specific eras: Panther/Tiger (Aqua + brushed metal) are often cited as peak; later gradients and today’s minimalism are seen as less attractive.

Usability, Performance, and Reliability

  • Aqua’s visual richness is remembered as having a real performance cost compared with earlier System 7/Platinum builds.
  • Multiple comments recall classic Mac OS (pre‑Unix) as visually charming but notoriously unreliable compared with Windows 95/98 and later NT‑based Windows.
  • Some praise old UIs (System 7, Win95) for feeling like “tools”; others note specific productivity niceties like the old green “zoom” button behavior and features like drawers.

Mac vs Linux/Windows and the Role of the OS

  • OS X is framed as the Unix desktop that Linux never quite delivered: mainstream, Unix underpinnings, grandma‑usable, with strong third‑party app support.
  • One quote claiming operating systems are “a con” is used to highlight the value of a uniform UI; others rebut by emphasizing kernels, process isolation, and shared drivers as essential.

Emulation Tech, PearPC, and Performance

  • Discussion of PearPC’s history: once popular PowerPC emulator whose momentum faded after the maintainer’s early death and the Apple/Intel transition.
  • Notes that Infinite Mac’s OS X emulation is sluggish in the browser, but that this mirrors real‑hardware performance of the time, adding to the authenticity.
  • Interest in the TinyPPC ~700‑line PowerPC emulator; commenters link its compactness to RISC design, while noting Power/PowerPC’s instruction growth and RISC–CISC blurring.

Continuity, Theming, and Nostalgia

  • Some argue Tiger and modern macOS are behaviorally similar enough that users could move between them easily, despite visual differences.
  • Others lament incremental usability losses (hidden scrollbars, inconsistent multi‑select, more steps for simple actions).
  • Repeated wishes for Apple to offer legacy themes (Platinum, Aqua, brushed metal) on modern macOS.
  • Broader retro‑computing nostalgia surfaces: praise for classic UIs across Mac, NeXT, Sun, SGI, and anecdotes like finally playing Dark Castle via Infinite Mac after decades.

Estrogen: A Trip Report

Nature of gender dysphoria and effects of HRT

  • Multiple trans commenters describe dysphoria as a mismatch between inner gender identity and body/social perception, not simply a hormone “craving” or fashion preference.
  • Analogies include phantom limbs, waking in the “wrong” sexed body, or body horror at puberty changes.
  • Coping hinges on both body change (HRT, sometimes surgery) and mind/social context: being seen and interacted with as one’s gender is repeatedly described as strongly relieving.
  • Some stress that interests (e.g., programming, games) are largely independent of gender; others note that “male‑coded” hobbies often persist due to childhood socialization rather than identity.

Subjective experience of estrogen and testosterone

  • Several describe clear perceptual and emotional shifts on estrogen: improved smell and taste, reduced inner “buzzing,” greater serenity, more emotional depth or empathy; some report losing interest in psychedelics or sugary foods.
  • Others on long‑term HRT say their experience is more modest—better baseline happiness, but no dramatic “extra colors” or mystical effects, and caution against over‑interpreting placebo‑like phenomena.
  • Some who have experienced high testosterone plus higher estrogen (e.g., bodybuilding) report feeling unusually connected, loving, and emotionally rich; crashed estrogen feels terrible.
  • One theme: experiencing life on both major sex hormones is seen as giving unique perspective on selfhood and embodiment.

Science, evidence, and youth treatment debates

  • Pro‑treatment commenters cite studies suggesting puberty blockers reduce lifelong suicidal ideation and that early gender‑affirming care improves youth mental health.
  • Critics argue the evidence base is weak, highlight the Cass review and two randomized trials that allegedly show no benefit over controls, and note several European countries restricting blockers for minors.
  • Cass and related work are in turn described by others as methodologically flawed and selectively embraced; claims of “isolated demand for rigor” around trans care are raised.
  • There is an extended dispute over desistance rates: some studies are cited showing 70–90% of untreated dysphoric children later identifying as cis; others question these cohorts (old data, conversion‑style practices, diagnostic issues).
  • Risks and ethics of blockers are contested: one side emphasizes mostly reversible effects and analogy to other pediatric interventions; the other stresses infertility, sexual function, and the possibility of locking in a trans path for youths who might have desisted.

Law, politics, and access

  • One camp notes that current U.S. bans formally target minors and frame this as age/“medical purpose” regulation rather than sex discrimination; they argue adult care remains largely legal and see room to depolarize.
  • Others counter with concrete examples (Florida in‑person rules, Missouri and federal Medicaid exclusions, Nebraska age‑19 limit) and argue that “protect the children” is a starting point toward broader rollbacks.
  • There is disagreement over whether more radical rhetoric (“dead son vs living daughter”, calling restrictions “murder”) helped or hurt; some think reframing and moderating advocacy is essential, others see a need to resist an authoritarian trajectory that will otherwise keep expanding.
  • A side debate explores whether courts should be involved in detailed medical questions at all, versus deferring to doctors and parents.

Gender roles, social constructs, and identity models

  • Several participants distinguish sexed body, gender identity, gender expression, and gender roles as partially independent axes.
  • Some nonbinary and trans posters emphasize that gender norms are heavily cultural, but say loosening roles alone would not have addressed their physical dysphoria.
  • Others suggest a strategy shift: instead of metaphors like “woman in a man’s body,” foregrounding “people shouldn’t be forced into rigid masculinity/femininity” might be more persuasive in conservative contexts; trans respondents reply that this is solving a different (though related) problem and cannot replace access to medical transition.
  • There is recurring frustration that trans people are simultaneously criticized for conforming too much to gender roles and for not conforming enough (retaining “male‑coded” interests).

Hormones, autism, and drug policy

  • A speculative link is raised between prenatal testosterone, autism, and being trans; replies say many trans women have low testosterone before HRT and suggest reporting bias and underdiagnosed autism in cis women as simpler explanations.
  • Access mechanics are clarified: you cannot simply “buy estrogen at Walgreens”; prescriptions, labs, and “bureaucratic hoops” are standard, though some note testosterone/TRT and black‑market steroids are easy to obtain.
  • One strong pro‑liberalization voice argues for broad OTC access to medications (including anti‑androgens), contrasting this with the lethality of common OTC drugs like acetaminophen.
  • Several trans posters stress “nothing about us without us”: given disproportionate discrimination and political targeting, trans people should be central in decisions about their care.

Juneteenth in Photos

What Juneteenth Commemorates

  • Multiple commenters clarify that:
    • The Emancipation Proclamation (1863) did not end all slavery; it exempted Union slave states and Confederate areas already under Union control.
    • Juneteenth (June 19, 1865) marks General Order No. 3 and enforcement of emancipation in Texas, not the literal last enslaved people in the U.S.
    • Legal abolition nationwide came with ratification of the 13th Amendment in December 1865; some note Delaware and other Union states still had slavery until then.
  • Several point out the 13th Amendment’s “punishment for crime” clause and argue that prison labor is effectively a continuation of slavery; others dispute that as an overreach, saying criminal punishment differs fundamentally from chattel slavery, leading to a long subthread on convict leasing, Black Codes, and definitions of “slave.”

Debate Over the Name: “Juneteenth” vs. “Emancipation Day”

  • One major thread argues “Emancipation Day” is clearer for people unfamiliar with the history; “Juneteenth” is seen by some as opaque and “not a real word.”
  • Others reply:
    • Juneteenth is a long-standing, community-originated name (a June + -teenth portmanteau), now in dictionaries and law; renaming it would be erasure.
    • Many holidays have opaque names (Christmas, Easter, Mardi Gras, Cinco de Mayo, Whit Monday, D-Day, Fourth of July); lack of understanding is an education issue, not a naming failure.
    • Objections to “Juneteenth” are viewed by some as coded discomfort with a term rooted in Black culture/AAVE; defenders explicitly value that it “sounds Black” and centers Black American experience rather than white “emancipators.”
    • Others find explicitly tying the holiday to AAVE or “centering Blackness” off-putting or “unprofessional,” prompting pushback that U.S. life is already white-centered.

Who Celebrates and How Widely It’s Known

  • Commenters note uneven awareness:
    • In Texas and some Southern communities, Juneteenth/Emancipation observances are longstanding.
    • Anecdotes from California suggest many Black residents treat it as “just a day,” while others celebrate visibly; there’s disagreement over how representative these anecdotes are.
  • Several remark that many Americans only learned about Juneteenth recently; some non-Americans say they’d never heard of it and question why they should know U.S. holiday names.

Broader Reflections and Meta-Discussion

  • Some emphasize Juneteenth as evidence the U.S. can change and “beat slavery,” while others stress that slavery persisted in new forms (especially via the criminal legal system).
  • A side discussion emerges about HN moderation, dog whistles, and tone: users argue over how to respond to perceived racist or revisionist comments, and whether focusing on civility over content enables harmful speech.
  • A few voices urge focusing on the photos, stories, and the gravity of emancipation rather than getting stuck on naming minutiae.

In praise of “normal” engineers

Value of “normal” engineers and mature systems

  • Many agree that sustainable products and “mature” services are best served by reliable, “normal” engineers working in well-designed systems.
  • The best orgs are framed as those where average developers can consistently do good work, not places dependent on a few “rockstars.”
  • Great engineers often start as good ones; healthy orgs nurture this progression and allow people to cycle between “great” and “good” as they learn new domains.

What is productivity? Business impact vs long-term risk

  • A major disagreement centers on “the only meaningful measure is impact on the business.”
  • Critics argue this drives short-termism, since avoiding disasters and long-tail risks is hard to quantify; they give examples where deferred fixes looked “high impact” until a public failure flipped the score.
  • Some propose a more “holistic accounting” of effectiveness, recognizing invisible wins and human judgment instead of purely legible metrics.
  • Others insist that avoiding landmines is itself major business impact, but note that leadership must already think this way for it to be rewarded.

Team composition, “10x” engineers, and hierarchy

  • Multiple comments stress that orgs need a mix of people: specialists, strong generalists, and solid executors; too many “tigers” (brilliant but intense) or too many “penguins” (needing support) both fail.
  • There’s broad skepticism of the “10x engineer” buzzword, but general agreement that some people are much more valuable, especially in leadership, systems design, or invention roles.
  • Others counter that all engineers are “normal” and that fetishizing outliers distorts hiring and culture.

Management, culture, and ownership

  • Strong emphasis on management quality: technically competent, trusted managers can recognize long-term value and shield teams from bad incentives.
  • Some argue engineering managers/VPs/CTOs must be or have been real engineers; others note that taste and judgment matter more than simply having coded.
  • Debate over whether the “smallest unit of ownership” should be the team or an individual:
    • Pro-team: resilience to attrition, illness, vacations, and fewer single points of failure.
    • Pro-individual: real ownership and agency often boost productivity and quality; team-only framing can reduce engineers to interchangeable resources.
  • Several note that many engineers don’t actually want deep ownership; they see it as extra stress without equity-level upside.

Code quality, rewrites, and “art vs shipping”

  • One axis of conflict: “software as art/design discipline” vs “software as just business output.”
  • Some argue that high-quality code and thoughtful design dramatically reduce long-term costs and headcount needs, citing lean, high-performing firms with very small teams.
  • Others respond that most businesses operate under hard constraints: limited budgets, uncertain futures, need to ship fast. From that vantage, “artistic” engineering is a luxury, especially in early-stage or low-margin contexts.
  • There’s support for rewrite-heavy, prototype-first workflows (sloppy first draft → better second draft) as genuinely more effective, but many say management rarely allows the second draft once something “works.”

Diversity, resilience, and sociotechnical systems

  • Several connect the article’s “build systems for normal people” to platform work and golden-path approaches: make the right way the easiest way so average engineers can ship reliable systems.
  • Some push back on the claim that demographic diversity alone yields resilience; they argue real resilience comes from mature processes, role clarity, and adaptability—though mixed backgrounds can help teams handle life events and turnover.

Critiques of framing and incentives

  • The term “normal engineer” is criticized as clumsy and potentially stigmatizing; “average” or “mid-curve” might fit better.
  • A few see the piece’s de-emphasis on individual merit and outliers as aligning conveniently with AI/“anyone can be trained” narratives.
  • Others highlight that poor internal documentation and knowledge sharing often prevent “normal” engineers from being effective, regardless of theory.

Why do we need DNSSEC?

Perceived need for DNSSEC

  • One side argues “if we truly needed it, it would be widely deployed after 25+ years”; current near-zero adoption in major orgs is seen as evidence it’s low-value or misdesigned.
  • Others say this is just a reflection of poor cybersecurity priorities; DNS hijacks and BGP-based attacks are real, and dismissing DNSSEC downplays genuine risks.

Threat models and real-world attacks

  • Pro-DNSSEC comments focus on:
    • On‑path attacks (ISP, Wi‑Fi, BGP hijacks) that can spoof DNS and obtain rogue TLS certs.
    • Documented BGP hijacks of DNS providers used to steal cryptocurrency or inject malicious JS.
    • DNS-based ACME/CAA flows where unsigned DNS lets attackers get certificates.
  • Skeptics respond that in practice most compromises are via registrar or DNS-provider account takeover (ATO), which DNSSEC doesn’t mitigate; BGP/DNS spoofing is treated as a rare, “fine‑tuned” threat.

Alternatives and “better fixes”

  • Suggested alternatives:
    • Secure CA↔registrar channels (RDAP/DoH) for validation, bypassing end‑user DNS entirely.
    • Multi‑perspective validation by CAs, RPKI + ASPA for routing security.
    • Stronger auth (U2F/passkeys) at DNS providers to stop ATO.
    • Transport security for DNS (DoH/DoT/DNSCrypt, encrypted zone transfers) instead of data signing.
  • Some argue “secure DNS” is needed, but DNSSEC is a poor mechanism compared with easier‑to‑deploy encrypted DNS.

Operational complexity and economics

  • DNSSEC is described as brittle, outage‑prone, and tooling‑poor: key mixups, chain issues, TTL/caching pitfalls, and spectacular outages at TLD/major sites.
  • Critics frame security as an economic problem: DNSSEC raises defender cost massively while barely increasing attacker cost for common attacks.
  • Supporters counter that cost is modest on modern platforms (e.g., Route53, Unbound, pi‑hole) and worth it for organizations with higher risk.

Trust, governance, and PKI concerns

  • DNSSEC is criticized as “another PKI” with roots controlled by governments and large operators, with no CT‑style transparency or realistic way to distrust misbehaving TLDs.
  • Some see it as effectively a key‑escrow system for states, offering “zero protection” against them.
  • WebPKI + Certificate Transparency is presented as strictly better in governance and revocation.

Client-side validation and UX

  • Core architectural complaint: DNSSEC validation usually happens in recursive resolvers, not clients; browsers trust a single “AD” bit.
  • Some want validation pushed to clients/OS APIs with better UX, but note that would be yet another massive migration.

Adoption, IPv6 comparison, and future

  • IPv6 is used as a contrast: slow start but now large share of traffic; DNSSEC has stagnated at very low deployment, even regressing in some regions.
  • Multiple commenters suggest “back to the drawing board”: keep the problem (DNS integrity) but design a new, simpler, incrementally deployable protocol rather than try to force DNSSEC to 40%+ deployment.

End of 10: Upgrade your old Windows 10 computer to Linux

Hardware reuse, pricing, and alternatives

  • Some report rising prices for used PCs and Windows‑10‑only machines going to scrap instead of being resold, possibly due to rising demand for compute (especially GPUs) and people holding on to older hardware.
  • Others suggest many non‑technical users have largely moved to phones/tablets, keeping old laptops “just in case” rather than selling them.
  • ChromeOS Flex is mentioned as an easy repurposing option, but hardware support can be spotty even on “supported” models.

Linux desktop: enthusiasm vs frustration

  • Many long‑time users praise Linux as fast, bloat‑free, and less intrusive than modern Windows, especially for development and general desktop use.
  • Critics describe repeated failed migrations: driver issues (Nvidia, sleep/brightness, sound/Bluetooth/Wi‑Fi regressions), poor Office document compatibility, and video playback glitches.
  • Some are happy with “Linux for servers, Windows for gaming, macOS for work,” seeing little incentive to fight desktop rough edges.

Installation, migration, and usability hurdles

  • The site is praised as clear marketing, but several note major blockers for “normies”:
    • Creating bootable USBs with third‑party tools, navigating BIOS/UEFI, and scary GRUB menus.
    • Confusing distro choice and conflicting advice (“try another distro”) when something breaks.
    • Data migration: copying browser profiles and cloud sync is easy, but reliably auto‑preserving a Windows Documents folder without external backup is seen as unsafe/complex.
  • Suggested fixes: a Windows installer app that handles ISO download, USB creation, dual‑boot, and data import; or Wubi‑style in‑place installation. Fedora’s Media Writer is cited as a partial model.

Gaming, anti‑cheat, and security debates

  • One camp says gaming on Linux is “pretty great now” via Steam/Proton, with only a minority of kernel‑anticheat titles (League, some shooters, Roblox) blocked.
  • Another notes that for players focused on competitive online games, those blocked titles are often the only games that matter.
  • Long subthread debates:
    • Whether Linux’s package‑manager culture is inherently safer than Windows’ “download random .exe” norm.
    • Whether kernel‑mode anti‑cheat is effectively a rootkit and anti‑user, versus a legitimate tool that consenting players value to reduce cheating.
    • Hardware attestation and secure boot: some argue such mechanisms conflict with user freedom and hackability; others say they can coexist with user choice and are already present in kernels and hardware.

Windows 10 EOL, extended support, and hardware lockout

  • Researchers and labs with many Windows 10 workstations that can’t officially run 11 worry about cost, downtime, and e‑waste.
  • Options discussed: Extended Security Updates (ESU), LTSC/IoT editions (support into the 2030s), or simply leaving critical machines un‑upgraded but heavily firewalled.
  • Several criticize Microsoft for:
    • Marketing Windows 10 as effectively “the last Windows,” then tightening Windows 11 hardware requirements (TPM, CPU lists) and stranding capable machines.
    • Bricking product lines mid‑lifecycle (e.g., Windows Mixed Reality), increasing e‑waste while promoting sustainability messaging.
  • Others counter that dropping old CPUs/instruction sets has precedent (XP→Vista, 486 support, etc.) and that security features like VBS justify the cutoffs.

Distributions, fragmentation, and aesthetics

  • Newcomers are often confused by the need to pick a “distro” and desktop environment; configuration differences (KDE vs GNOME, flatpak vs deb vs snap, Wayland vs X11) complicate web search and support.
  • Some argue there should be an “official Linux OS” for desktops; others say that would be culturally impossible and contrary to the ecosystem’s diversity.
  • Opinions differ on visuals: some find Linux “ugly” and poorly designed compared to macOS/Windows; others point to KDE/GNOME themes, “unixporn,” and note that Windows itself is a patchwork of old and new UIs.

Overall sentiment

  • Many see Linux as a strong, even superior, option for development, general computing, and non‑competitive gaming—especially on aging Windows 10 hardware.
  • But commenters broadly agree that for mainstream users, obstacles remain: installer UX, driver quirks, gaming anti‑cheat, distro fragmentation, and fear of data loss.

What would a Kubernetes 2.0 look like

Role and Complexity of Kubernetes Today

  • Many see Kubernetes as powerful but over-complex for most users: “common tongue” of infra with a combinatorial explosion of plugins, operators and CRDs.
  • Others argue it’s already much simpler than the Puppet/Terraform/script piles it replaced and is “low maintenance” when managed (EKS/AKS/GKE, k3s, Talos).
  • Several comments stress that the underlying problem—large distributed systems—is inherently complex; k8s just makes that complexity explicit.
  • A recurring complaint: it’s misapplied to small/simple workloads where a VM, Docker Compose, or a lightweight PaaS would suffice.

What People Want from a “Kubernetes 2.0”

  • Dramatically simpler core:
    • “Boring pod scheduler” + RBAC; push service discovery, storage, mesh, etc. to separate layers.
    • Fewer knobs, less chance to “foot-gun” yourself; more opinionated and less pluggable by default.
  • Batteries included:
    • Sane, blessed defaults for networking, load balancing, storage, metrics, logging, UI, and auth instead of assembling CNCF Lego.
    • Immutable OS-style distribution with auto-updates and built-in monitoring/logging, user management, and rootless/less-privileged operation.
  • Better UX:
    • Higher-level workflows for “deploy an app, expose it, scale it,” Heroku-like flows, or Docker-Compose-level simplicity.
    • Clearer, more stable APIs and slower-breaking changes; people are tired of constant version churn.

Configuration: YAML, HCL, and Alternatives

  • Strong dislike of Helm’s text templating and YAML’s footguns; long manifests are hard to maintain.
  • Disagreement on HCL:
    • Pro: typed, schema’d, good editor support, already works well via Terraform.
    • Con: confusing DSL, awkward loops/conditionals, module pain; many would rather use CUE, Dhall, Jsonnet, Starlark, or just generate JSON/YAML from a real language.
  • Several note k8s already exposes OpenAPI schemas and protobufs; config could remain data (JSON/YAML/whatever) with richer generators on top.

State, Storage, etcd, and Networking

  • Persistent storage called out as a major weak spot: CSI + cloud volumes behave inconsistently; on-prem Ceph/Longhorn/others are hard to run “production-grade.”
  • et cetera:
    • Some want etcd swap-out (Postgres, pluggable backends); others defend etcd’s design and safety.
    • Large-cluster etcd scaling issues and fsync costs discussed in detail; some vendors already run non-etcd backends.
  • Networking:
    • Desire for native IPv6-first, simpler CNIs, and multi-NIC/multi-network friendliness.
    • Frustration that cluster setup starts with “many options” instead of one good default stack.

Security, Multi‑Tenancy, and Service Mesh

  • Calls for first-class, identity-based, L7-aware policies and better, built-in pod mTLS to make meshes optional.
  • Some argue k8s is “deeply not multi-tenant” in practice; others say current RBAC/NetworkPolicies + CNIs (e.g., Cilium) are already close.

Higher-Level Abstractions and AI

  • Long history of k8s abstractions/DSLs (internal platforms, Heroku-likes); most either only fit narrow cases or grow to k8s-level complexity.
  • New idea: keep k8s as-is but put an AI layer in front to author & manage manifests, turning config debates into implementation details.
  • Counterpoint: even with AI, you still want a concise, strict, canonical underlying format.

Alternatives and Experiments

  • Mentions of k3s, OpenShift, Nomad, wasm runtimes, globally distributed or GPU-focused schedulers, and custom “Kubernetes 2.0”-style platforms (e.g., simpler PaaS, serverless/actors, ML-focused orchestrators).
  • Meta-view: any new system will likely repeat the cycle—start simple, gain features, become complex, and prompt calls for “X 2.0” again.

Guess I'm a rationalist now

What “rationalist” means in this thread

  • Distinct from historical philosophical rationalism: here it means the LessWrong / Yudkowsky project of “rationality” – teaching people to reason better, more empirically and probabilistically.
  • Emphasis on Bayesian reasoning, calibration, explicit probabilities, “epistemic status” labels, and trying to be “less wrong” rather than certainly right.
  • Critics say Bayesian talk (“priors”, “updating”) often becomes mystified jargon or a veneer over ordinary guesses, and that many adherents don’t grasp statistics as well as they think.

Elitism, labels, and cult/religion comparisons

  • Many comments see strong Randian / objectivist vibes: belief in “the right minds” solving everything, hero worship, groupthink, self-congratulation about being unusually correct.
  • The label “rationalist” is attacked as implying others are irrational; some argue even “rationality” as a movement name overclaims.
  • Multiple posters describe the scene as proto‑religion or outright cult‑like: charismatic leaders, apocalyptic AI focus, insider jargon, communal houses, “we are the chosen who see clearly” dynamics, sexual misconduct allegations, and at least one genuine spin‑off cult (Zizians).
  • Defenders say the community is unusually explicit about uncertainty, keeps “things I was wrong about” lists, and that critics are ignoring this or reading it as mere pose.

IQ, race, and scientific standards

  • A long subthread argues that many rationalists and adjacent blogs (e.g. ACX) are too friendly to “human biodiversity” / race‑IQ claims and flawed work like Lynn’s global IQ data.
  • Critics say this reveals motivated reasoning, poor statistical literacy, and willingness to dignify racist pseudoscience as “still debated”.
  • Others counter that genetic group differences are real in many traits, that it’s dogmatic to rule out any group IQ differences a priori, and that being disturbed by an idea isn’t a refutation.
  • There is meta‑critique that rationalists often cherry‑pick papers and can be impressed by anything with numbers, even when whole fields (psychometrics, some social science) are methodologically shaky.

AI risk, doomerism, and priorities

  • One major axis: are rationalists right to prioritize existential AI risk?
    • Skeptics: focus on superintelligent doom is overconfident, distracts from mundane but real harms (bias, surveillance, wealth concentration), and dovetails with corporate marketing and power‑grab narratives.
    • Supporters: if there is even single‑digit probability of extinction‑level AI failure, precautionary principles and expected‑value arguments justify extreme concern; they liken this to nuclear risk or climate.
  • Some accuse rationalists/EA of “longtermism” that morally privileges hypothetical vast future populations over present suffering, enabling ends‑justify‑means thinking (e.g. SBF narratives, “win now so future trillions are saved”).

First principles, reductionism, and wisdom

  • Many commenters say the movement is too in love with reasoning from first principles and underestimates evolved complexity of biology, society, and culture.
  • Reductionism is defended as practically fruitful in many sciences, but critics stress emergent phenomena, irreducible complexity, and the danger of ignoring history and on‑the‑ground knowledge (“touch grass”).
  • Several contrast “rationality” with older notions of “wisdom”, arguing that clever argument chains can justify antisocial or inhuman conclusions if not tempered by context and moral intuition.

EA, politics, and real-world impact

  • Effective Altruism, tightly intertwined with rationalism, is heavily debated.
    • Critics: EA and rationalism channel elite energy into technocratic, depoliticized fixes (nets, shrimp welfare, AI safety) while ignoring structural issues, labor, and capitalism; “earning to give” rationalizes working in harmful industries.
    • Defenders: EA has directed large sums to global health (malaria, vitamin A, vaccines), is not monolithic, and impact assessment is a real upgrade over feel‑good charity.
  • Some note that rationalists present themselves as above politics yet often converge on center‑liberal or techno‑libertarian views, with worrying overlaps to neoreaction and billionaire agendas in some cases.

Community dynamics and reception

  • Several ex‑insiders describe early attraction (blog quality, intellectual excitement) followed by disillusionment with groupthink, contrarianism for its own sake, and harsh treatment of external criticism.
  • Others report positive experiences at events (Lightcone/Lighthaven, Manifest) but also moments of off‑putting arrogance (“we’re more right than these other attendees”).
  • There is meta‑reflection that HN’s hostility to rationalists mirrors outgroup dynamics: rationalists are close enough to the HN demographic that their overconfidence and self‑branding trigger especially strong annoyance.