Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 324 of 362

I should have loved biology too

Boredom vs. Wonder in Science Education

  • Many recall science classes (biology, CS, history, math) as rote memorization and “lifeless recitation of names,” with astonishing facts presented without any sense of awe.
  • Teachers are often constrained by state curricula, standards, and benchmarks, leaving little room to dwell on beauty, stories, or conceptual insight.
  • Some see great teaching as “performance art” whose goal is to hook curiosity, not just transmit facts; others note many teachers lack deep conceptual mastery themselves.

Role of History and Context

  • Disagreement on “history first”: some argue teaching history of a field before basic skills (e.g., computer history to 13‑year‑olds) is backwards.
  • Others say historical context makes material more memorable and meaningful (who proved what, why discoveries mattered), especially in subjects like law or advanced math.
  • A recurring theme: timing matters—history is far richer once students can already “read” the subject.

Curriculum Design and Systemic Constraints

  • Strong criticism of curricula built by committees optimizing for minimum common standards, seen as killing intrinsic motivation.
  • Proposed alternative: “passion‑first” or project‑based paths where knowledge is introduced as “power tools” to pursue existing interests (e.g., helping a game‑obsessed kid build games).
  • Skeptics ask how such individualized approaches scale to millions of students; defenders counter that current systems are already failing many.

Computer Science, Programming, and Education Paths

  • Several recount abandoning formal CS because classes were dry (e.g., long lectures on JVM internals, computer history, or pure C syntax) versus the joy of quickly building things.
  • Debate over whether CS is fundamentally about programming or about abstract computation and theory, with some insisting all of CS ultimately serves programming practice.
  • Many emphasize that practical programming can be self‑taught cheaply, while degrees are better for foundational thinking, research skills, and long‑term versatility.

Falling in Love with Biology Later

  • Numerous commenters describe hating school biology (especially memorization and Latin/Greek terminology) but later becoming captivated by molecular biology, neurophysiology, biochemistry, mycology, or paleobiology.
  • Pop‑science books, visualizations (e.g., “Machinery of Life,” immune‑system explainers), and experiences like scuba diving often served as the “switch‑flipping” moments.
  • Some pursued or contemplated second degrees or PhDs in biology or related fields, but rising tuition and opportunity costs are major barriers; others highlight funded PhD programs and free online courses as alternatives.

What Makes Biology Hard and Different

  • Biology is portrayed as vast, messy, probabilistic, and full of uncertainty, requiring comfort with ambiguity and huge descriptive vocabularies.
  • Several note a cultural divide: biologists historically focused on naming/classifying and qualitative description, while physicists/engineers favor quantitative, mechanistic models.
  • There’s recognition that modern biology increasingly demands “extra” skills: coding, image analysis, advanced microscopy, statistics, and modeling.

Tech Meets Biology: Promise and Skepticism

  • Enthusiasm for areas like bioinformatics, quantitative biology, computational epidemiology, and citizen‑science mycology, where CS skills clearly help.
  • At the same time, biologists express fatigue with “tech savior” narratives (e.g., protein folding, medical ML, promises of rapid “silver bullet” cures), arguing these tools are valuable but far from solving core biological and medical challenges.
  • A recurring caution: cross‑disciplinary work is powerful when tech people respect domain depth and focus on real bottlenecks (automation, tooling) rather than claiming to “cure cancer” with algorithms alone.

Language, Jargon, and Accessibility

  • Latinized terminology and dense jargon are seen as major barriers, especially when teaching non‑native speakers or high‑school students.
  • Some argue many processes could initially be taught visually and conceptually, with names and formal ontologies layered on later.
  • Others note that naming/classification is unavoidable for precise communication, but agree curricula rarely get redesigned when understanding advances—they only accrete more chapters.

ClickHouse gets lazier and faster: Introducing lazy materialization

Performance & Algorithms for Top‑K Queries

  • Many were struck by the demo: finding top‑3 from 150M values in ~70ms with ~3.6 MiB peak memory.
  • Discussion dug into why this is plausible:
    • Columnar layout only reads the single needed column.
    • Back‑of‑envelope bandwidth math (SSD, RAM, cache) shows 600MB can be scanned in far under 70ms with modern hardware.
  • Debate over how ClickHouse likely implements top‑k:
    • Several participants describe streaming top‑k in O(n) with O(k) memory (e.g., selection algorithms, Floyd–Rivest, heap‑based or buffered approaches).
    • A ClickHouse contributor confirms ClickHouse uses a selection algorithm (Floyd–Rivest) plus block‑wise processing (e.g., 64k blocks, “top of tops”).
    • Side discussion clarifies differences between:
      • Top‑k by value (max/min) vs. top‑k most frequent (which typically needs more space or approximate streaming algorithms).

Lazy / Late Materialization Behavior

  • Users note this is a known “late materialization” class of optimizations in column stores, but still non‑trivial to implement correctly and efficiently.
  • Confirmed via EXPLAIN that lazy materialization applies even with complex ORDER BY expressions (e.g., weighted random sampling), and shows ~5× speedups in some tests.
  • A setting limits the default to small LIMIT values (e.g., 10) to avoid excessive random I/O when many rows are requested; larger limits may hurt in more typical workloads.
  • It also works with LIMIT … OFFSET.

Use Cases, Comparisons & Ecosystem

  • Several teams report migrating analytics from Postgres to ClickHouse and seeing dramatic speedups with far less manual tuning.
  • Discussion contrasts:
    • Columnar OLAP systems like ClickHouse vs. row‑based OLTP systems; participants stress they target different workloads.
    • ClickHouse vs. DuckDB/Polars:
      • ClickHouse: network server, real‑time analytics, strong performance, more operational complexity.
      • DuckDB/Polars: embedded, convenient on desktops; DuckDB’s concurrency and on‑disk format have trade‑offs.
  • Some mention embedded ClickHouse (chdb) as a DuckDB‑like option, but note missing static builds and ergonomics in some languages.

Developer Experience, Deployment & Governance

  • ClickHouse is widely praised for speed, CLI, SQL‑ish familiarity, and documentation, but some see it as “heavy‑duty” and low‑level to operate.
  • Windows‑native support is seen as a barrier for desktop analytics users.
  • There is discussion about ClickHouse’s partially proprietary cloud features and whether that dilutes its open‑source story, alongside similar concerns about other vendors in the space.

Supabase raises $200M Series D at $2B valuation

Valuation, Funding, and Exit Strategy

  • Many see a $2B valuation on estimated ~$15–25M revenue as extremely rich (66–133x ARR), driven by hype, AI positioning, and product-led growth narratives.
  • Some think it’s still one of the more “reasonable” big valuations lately, given millions of databases and strong mindshare.
  • Most assume the realistic endgame is acquisition (by a hyperscaler or big AI/“vibe coding” tool) or, less likely, IPO; few believe current economics justify a standalone public company yet.
  • There is skepticism that such late-stage rounds improve the product; instead they raise expectations of a high‑value exit and more aggressive monetization.

Product Positioning & Target Users

  • Supabase is framed as “Firebase but Postgres”: managed Postgres + auth + storage + edge/serverless functions + real‑time + UI tooling.
  • Debate over whether it’s truly a Firebase alternative or just the backend half (no built‑in hosting; often paired with Vercel/Netlify).
  • It’s especially praised for: quick MVPs, side projects, non‑expert developers, and integration into AI-driven “vibe coding” tools.
  • Critics argue it’s essentially “expensive Postgres with wrapper APIs” and that serious teams eventually outgrow it or reimplement on plain Postgres/Django/Prisma/etc.

Developer Experience, Reliability, and Complexity

  • Many individual users are enthusiastic: “best new product,” easy auth, permissions, real‑time features, good UI, fast to ship prototypes.
  • Others report significant pain:
    • Underdocumented areas (auth/user table behavior, client SDKs like Swift, RLS, custom certs).
    • Difficult debugging/logging and awkward business logic in RLS/PL/pgSQL.
    • Complaints about downtime and lack of polish for complex production workloads.
  • Some found PostgREST/RLS model powerful but cognitively heavy and ill‑suited to more complex apps; others say it’s fine if treated as a CRUD accelerator and combined with a traditional backend.

Pricing, Self‑Hosting, and Lock‑In

  • Pricing is described as “death by a thousand cuts”: fine for hobby projects, but surprisingly high once usage and features (storage, realtime, etc.) scale.
  • Several users migrated off to cheaper managed Postgres plus a thin API layer; others happily pay for the time saved.
  • Open source is seen as a partial lock‑in hedge, but self‑hosting is widely described as painful: large stack, fragile Docker setup, poorly documented production configs.
  • Some believe free tier losses and heavy infra costs cast doubt on long‑term sustainability without tightening the model.

Vibe Coding and AI Debate

  • Supabase’s embrace of “vibe coders” polarizes discussion.
  • Supporters see LLM-assisted development plus Supabase as a huge enabler for non‑experts and for fast experimentation.
  • Critics worry about a flood of insecure, low‑quality apps, opaque AI‑generated code, and brittle DB‑centric backends that real engineers must later untangle.

I Tried to Buy an Actual Barrel of Crude Oil (2015)

Related Stories and Media

  • Commenters link a well‑known (likely embellished) “coal barge to Manhattan” story and other DailyWTF tales as tonal cousins to the article.
  • Several recommend Planet Money episodes where reporters actually buy oil and follow it from well to refinery, plus an “Onion King” episode about onion futures.
  • The article triggers nostalgia; some recall prior HN threads discussing the same piece.

How Futures and Delivery Actually Work

  • Many futures are physically settled at designated hubs (e.g., crude at Cushing, OK), not to arbitrary locations like an office.
  • Traders typically close or roll contracts before physical delivery; the hub location is a pricing reference, not where every end user wants oil.
  • NYMEX rulebooks precisely specify grade, delivery point, timing, and procedures, enabling high liquidity.

Negative Oil Prices, ETFs, and Options

  • 2020’s negative oil futures are discussed: holders were effectively paying others to take on delivery and storage obligations when capacity ran out.
  • This created issues for ETFs designed to track futures: they couldn’t go “negative NAV,” so operators bore unhedgeable downside or used contractual escape clauses (e.g., choosing not to track a given month).
  • Options models assuming log‑normal (non‑negative) prices broke down, forcing desks to exit or adjust models.

What Futures Are For: Debate

  • One camp argues futures “should” mean actual delivery and that financial settlement and speculation distort prices.
  • Others counter that:
    • Producers and consumers often hedge financially while transacting physical supply via separate spot contracts.
    • Futures function like “commodity loans” across time, smoothing inventory and price risk.
    • Speculators are necessary counterparties and liquidity providers; hedging alone can’t sustain the market.

Physical Oil, Barrels, and Logistics

  • “Barrel” is mostly a unit (42 US gallons), not a literal drum; crude typically moves via pipelines, tankers, and rail, not individual barrels.
  • Used drums have secondary markets (trash burning, BBQ smokers, reconditioned drums).
  • A trader describes buying ~200,000 barrels per day for refineries via pipelines and ships, emphasizing the astounding scale: ~104M barrels/day globally, traded in large batches (e.g., 10,000 m³, full tankers).

Packaging and Environmental Notes

  • Several note that for many products (including bottled water), container cost and carbon footprint can exceed the contents’.
  • There’s debate over whether heavier reusable glass could still reduce overall emissions compared with disposable plastics.

Should We Respect LLMs? A Study on Influence of Prompt Politeness on Performance

Effect of Politeness on LLM Performance

  • Several commenters highlight the paper’s core claim: prompt politeness measurably affects LLM performance, with impolite prompts often yielding worse answers, refusals, or more bias.
  • Extremely respectful language doesn’t always help; “moderate” politeness tends to work best, varying by language and model.
  • A common hypothesis: because models are trained on human text, polite prompts may steer them toward training examples where people gave more careful, higher‑quality answers.
  • Some suggest this could be automated: a system could rewrite user prompts into optimally polite form before sending them to the model.

Anthropomorphism vs. “Just a Tool”

  • One side strongly rejects anthropomorphizing LLMs: they are “word calculators,” not sentient beings, and don’t merit respect in a moral sense.
  • Others counter that anthropomorphism is unavoidable and partly the point: the entire interface is human language, and models actively present as human‑like.
  • There’s debate over whether treating LLMs like people is skeuomorphism or a useful UI choice.

User Psychology, Manners, and Habits

  • Many say they remain polite (“please,” “thank you”) not for the model’s sake but to maintain their own habits of courtesy.
  • Concern: getting used to barking orders at LLMs might bleed into how people treat baristas, colleagues, or smart speakers with human voices.
  • Others argue humans can context‑switch just fine (terminal vs. email vs. chat) and that rudeness toward a machine need not generalize.
  • Some frame politeness as self‑discipline or “practicing good manners in private to be well mannered in public.”

Ethics, Rights, and Social Risks

  • A minority worry that over‑politeness contributes to a cultural push to grant AI “human‑like” standing or rights, despite no evidence of consciousness.
  • Others note that if AI ever does become conscious, rights claims will be inevitable, just as views evolved about animals.
  • A few jokingly invoke “future AI judging us” or Roko’s basilisk–style scenarios, while others critique this as Pascal’s‑wager‑type thinking.

Prompt Style, Structure, and Tactics

  • Multiple commenters report that polite‑but‑firm, specific instructions often yield better, more focused code or text than either harsh abuse or vague brevity.
  • Some find explicit positive feedback (“this part is good, now tweak X”) prevents unnecessary rewrites.
  • Others say structure and role‑play (e.g., military hierarchy, emotional framing) matter more than raw politeness level for steering behavior.

In restaurants, We need a new way to signal that we're ready to pay

Is there really a problem to solve?

  • Many commenters say there’s no real issue: when you ask for the check, just pay immediately or flag the server when ready.
  • Several frame the article’s concern as social anxiety / aversion to talking to staff rather than a UX gap.
  • Some note they’ll simply leave cash on the table and walk out if it takes too long.

Existing low‑tech signals

  • Common practice: leave card/cash or the paper bill sticking out of the check wallet; in some countries the wallet open/closed already acts as a signal.
  • Gestures mentioned: raising a hand, scribbling-in-the-air motion, drawing a rectangle for the bill, or lightly pushing the plate away.
  • Table flags, call-buttons, or lights (like in churrascarias or some Japanese/Korean restaurants) are cited as effective, simple solutions.

Kiosks, QR codes, and phone-based systems

  • Some love paying and even ordering via phone/QR, especially for speed, splitting checks, and “Irish goodbye” exits.
  • Others strongly dislike it due to account creation, app installs, friction, or feeling forced to self‑service while still tipping.
  • Table kiosks and tablets are viewed by some as very convenient and by others as intrusive or screen-pollution.
  • Several point out that a simple QR to a web checkout (no app, no account) works well where implemented.

Cards, phones, and regional habits

  • Huge variance by country: in much of Europe and parts of Asia, tap-to-pay (often via phone/watch) and mobile POS at the table are routine.
  • Many US diners still pay mostly with physical cards or cash and rarely see phones used; others report the opposite.
  • Some are wary of phone payments or see them as unnecessary; others emphasize speed, security, and not handing cards out of sight.

Tipping and service models

  • Multiple comments argue the real “legacy problem” is US tipping culture, not signaling payment.
  • Some say they withhold tips when required to bus their own table or use QR ordering.
  • Fixed-salary, no-tip systems (Japan, parts of Europe/Asia) plus cashier-on-exit or prepay ticket machines are held up as cleaner models.

Whistleblower: DOGE Siphoned NLRB Case Data

Perceived Motives and Political Context

  • Many see DOGE’s actions as part of a broader project to weaken or capture democratic institutions for oligarchic benefit, tightly linked to anti‑union goals and Musk’s interests.
  • Several commenters explicitly connect this to Trump’s consolidation of power, rule‑of‑law erosion, and a wider authoritarian turn (e.g., use of pardons, disregard for court rulings, extra‑legal deportations and detentions).
  • Others frame this as a piece of a larger four‑front crisis: breakdown of political checks and balances, destruction of federal capacity via DOGE, politicized economic policy, and attacks on independent institutions (law, academia, bar associations, military).

Russian IP and Attribution Debate

  • The Russian login attempts with valid DOGE credentials are widely seen as alarming: credentials used within minutes of account creation, blocked only by geo‑restrictions.
  • Opinions split on attribution:
    • Some argue Russia or Russian actors are signaling power and indifference to consequences, consistent with past overt behavior.
    • Others suggest botnets, compromised DOGE devices, or “attribution engineering” to sow chaos or frame Russia.
    • A minority thinks the Russian IP detail may be over‑interpreted or used as political theater.

Containers, Logging, and Technical Concerns

  • The description of an “opaque container” reads as exaggerated to many technical readers, but others note that in a network where containers were never used, a new one with disabled logging is legitimately suspicious.
  • The deliberate disabling of logging is widely treated as the real “smoking gun”; several argue only attackers or criminals do this, especially when coupled with elevated privileges.
  • Some security professionals push back, noting: federal SOCs and MSSPs should already detect this; CISA’s SCuBA/BOD‑25‑01 policies might also explain some admin‑role removals independent of DOGE.

Rule of Law, Democracy, and Institutions

  • Strong debate over whether current outcomes reflect “the government people deserve” in a democracy, versus structural corruption (Citizens United, gerrymandering, captured media ecosystem).
  • Several argue the information environment on the right is a “captured market” of ideas, making accountability nearly impossible.
  • There is pessimism that Congress, the Pentagon, or courts will act meaningfully while top leadership is aligned with or dependent on DOGE and Trump.

Labor, Unions, and Authoritarian Drift

  • Many see the NLRB incident primarily as about obtaining sensitive union and labor‑dispute data to target organizers and weaken collective power, with Russia as a secondary or distracting angle.
  • Commenters connect DOGE’s exfiltration of NLRB data, Musk’s anti‑union history, and emerging practices like extra‑territorial detention, warning this could enable lists of “enemies” (e.g., union leaders, immigrants) for repression.

Skepticism and Alternative Explanations

  • A few argue for Hanlon’s razor: incompetence and “script‑kiddie” behavior, not grand treason, may explain misconfigurations and Russian IP usage.
  • Others reject continued “benefit of the doubt,” saying repeated scandals and patterns (secrecy, logging off, over‑privileged accounts) make malevolent intent more plausible.

Meta: Media and HN Coverage

  • Frustration that mainstream media and parts of the public seem numb to constant norm‑breaking; comparisons drawn to obsessive coverage of past email scandals.
  • Significant meta‑discussion on HN itself: accusations of down‑ranking politically sensitive DOGE/Trump stories, countered by moderators citing duplicate‑post policy and attempts to preserve “intellectual curiosity” while avoiding repetitive flamewars.

SerenityOS is a love letter to '90s user interfaces

Perceived “peak usability” and nostalgia

  • Several commenters see 90s/early‑2010s desktop UIs (Win7, Snow Leopard, early iOS, Windows Phone) as peak usability: dense, predictable, space‑efficient.
  • Modern Windows is criticized as visually directionless and cluttered with nonessential text and controls.
  • Others push back, arguing that modern interfaces are “simpler” for non‑technical users and that nostalgia/familiarity plays a big role.

Windows Phone as exemplar UX

  • Multiple people single out Windows Phone as the best mobile UX they’ve used:
    • Very snappy even on low‑end hardware.
    • Highly consistent UI; clear affordances for buttons and actions.
    • Live tiles on the home screen are still seen as superior to iOS widgets.
    • Integrated messaging (SMS + Facebook, etc.) and a great camera experience.
  • The platform’s downfall is attributed to lack of apps and a buggy, slower Windows 10 Mobile.

Simplicity, menus, and discoverability

  • Debate over whether old-style menus vs ribbons vs tablet UIs are “simpler”:
    • One side: ribbons and modern tabbed toolbars reduce hunting through deep menus.
    • Other side: ribbons add visual noise and hidden controls; simple, well‑structured menus often make features easier to find.
  • Mouse‑driven window menus are argued to scale better to complex functionality than touch‑only paradigms.
  • Double‑click vs single‑click is highlighted as a recurring discoverability problem.

Visual style: flat vs skeuomorphic, icons, fonts

  • Some praise clearly layered, beveled 3D controls for making states obvious (pressed, active, on top).
  • Others prefer modern flat/peripheral elements with only interactive controls emphasized.
  • Icon style is contentious: photorealistic icons are seen as more recognizable by some; others find them noisy.
  • Aliased 90s fonts are nostalgic to some but criticized as inaccessible; scaling and “large fonts” existed but depended on low‑res CRTs.

Consistency, customization, and toolkits

  • Many dislike today’s inconsistency: custom title bars, non‑native scrollbars, Electron/web apps, varying iconography.
  • There’s recognition this is hard to prevent unless OSes strictly lock down custom rendering, which would exclude some app types.
  • Historically, even 90s Windows had lots of custom UIs (media players, installers, AOL/CompuServe, Office toolbars), though some recall that era as more consistent than today.

Animations, latency, and responsiveness

  • Slow, ubiquitous animations on phones and desktops are widely hated; people routinely disable or speed them up.
  • Others note animations can usefully:
    • Hide latency (“loading screens in disguise”) and make systems feel smoother.
    • Explain where windows go (e.g., minimize animations).
  • There’s frustration that some platforms, especially iOS and macOS spaces, don’t let users fully disable or speed up transitions.

Scrollbars, menubars, and mobile patterns

  • Hidden/ultra‑thin scrollbars cause anxiety and difficulty navigating long content; some apps only show them on hover, making discovery hard.
  • Menubars are defended as predictable, keyboard‑friendly, and a potential axis of cross‑app consistency.
  • Hamburger menus are criticized for deep, meandering navigation; defenders argue they fit horizontally constrained screens better.
  • GNOME’s move toward mobile‑style patterns (hamburgers, click‑to-open submenus) is seen by some as a regression in desktop usability.

SerenityOS, 90s clones, and alternatives

  • SerenityOS is described as relaxing, charming, and an impressive art/engineering project, strongly echoing Windows 95/98 and CDE.
  • Some feel a true “love letter” would modernize the ideas (vector scaling, contemporary UX improvements) rather than closely copy.
  • Others note it omits interesting 90s ideas from NeXT, BeOS, Mac window‑shading, etc.
  • Practical “daily driver” analogues suggested include Blue95, Chicago95 themes, B00merang Windows‑95 themes, MATE, Trinity, fvwm95, and various “Chicago/Redmond” window manager themes.
  • There’s some concern about how closely its icons track old Windows artwork; others argue they’re different enough.

Desire for modern, high‑density UI design

  • One strand of the discussion laments that current design splits between:
    • Ultra‑flat, low‑information “minimal” UIs, and
    • Nostalgic recreations of 90s environments.
  • Commenters wish for serious exploration of dense, highly functional interfaces that exploit today’s GPUs, high‑DPI displays, and large screens, rather than merely imitating the past or simplifying for phones.

The many ways tarrifs will hit electronics

Observed price changes & consumer behavior

  • Some commenters report big jumps in specific laptop models versus “best under $1000” reviews, but others using price trackers (camelcamelcamel, Keepa, PriceLasso) see only normal seasonal variation so far.
  • Explanation offered: retailers are still selling pre‑tariff inventory and/or are unsure tariffs will stick after the 90‑day reprieve, so they’re not repricing aggressively yet.
  • Others say they rushed to buy big‑ticket items (laptops, TVs, cars, tools) before tariffs, or are now postponing all major purchases (“wait Trump out”), which they expect to deepen any downturn.
  • Some expect more shopping tourism and smuggling if US prices diverge sharply from other regions; EU/Sweden users report stable or slightly lower prices so far.

De minimis removal, hobby electronics & small imports

  • Ending de minimis for China and adding high per‑package duties ($50–$200 minimum, depending on timing and rules) is seen as devastating for AliExpress/PCBWay‑style hobby purchases and cheap glasses, PCBs, used GPUs, drones, etc.
  • Others argue logistics will adapt: more line‑haul bulk imports and domestic redistribution, with tariffs baked into item prices rather than per‑parcel postal charges; hobby parts may become “less cheap” rather than impossible.
  • There is active confusion over how different shipping methods interact with the new rules, and how strictly they’ll be enforced; several call the legal framework “spaghetti” and unpredictable.

Economic impact, taxation, and regressivity

  • Many frame tariffs as a de‑facto national consumption tax, worse than a normal sales tax because they also hit inputs and unsold inventory.
  • Repeated point: tariffs are regressive; lower‑income households spend a higher share of income on consumption, while wealthy households can save, invest, or borrow against assets.
  • Some tie tariffs to floated ideas of eliminating income tax under ~$150k and funding government through tariffs and debt; this is widely criticized as numerically impossible and highly inflationary.

Manufacturing, reshoring & feasibility

  • Skepticism that 4‑year political windows are enough to justify moving complex supply chains back to the US, especially with ~4% headline unemployment and higher input costs.
  • Tension noted: if tariffs succeed in reshoring, tariff revenue evaporates; if they raise lots of revenue, reshoring must have failed.
  • Several predict deindustrializing effects: more expensive components, policy uncertainty, and loss of competitiveness.

Governance, politics & spillovers

  • Strong disagreement on motives: some see incoherent, personality‑driven policy and “bullying via tariffs”; others argue tariffs are common worldwide and can have benefits.
  • Concerns raised about executive overreach (using “emergency” powers), corruption via exemptions, and increased smuggling.
  • Climate angle: some hoped reduced consumption might cut emissions, but huge tariffs on solar panels and relaxed coal‑plant rules are cited as climate‑negative.

Attacking My Landlord's Boiler

RF hack and thermostat security

  • Many commenters enjoyed the RF reverse‑engineering and automation, calling it a fun, well‑executed hack and praising the write‑up.
  • Others note the protocol’s “encryption” is undermined by lack of replay protection; it’s effectively just obfuscation.
  • Concern is raised about unintentionally controlling neighbors’ boilers, but several people point out these systems typically use pairing/binding with unique IDs, so cross‑control is unlikely.

Alternative technical approaches

  • Several propose simpler attacks:
    • Put the thermostat in a controllable hot/cold box (Peltier element, ice packs, heating element) to spoof sensed temperature.
    • Replace or bypass the RF receiver with a relay (ESP32, Shelly, Sonoff) wired into the boiler’s call‑for‑heat contacts.
    • Swap the sensor (e.g., thermistor → digital potentiometer) rather than heat/cool the physical device.
  • Some argue these would be easier and safer than SDR work; others prefer the RF route to avoid visibly modifying landlord hardware.

Tenant, landlord, and legal issues

  • There’s extended debate over what tenants may modify: in some jurisdictions any hard‑wired change is forbidden; in others reversible changes are tolerated.
  • Risks mentioned: liability if the boiler fails, surprise inspections, and even no‑cause evictions in some places.
  • Some think this level of paranoia is excessive; others with landlord experience say visible “hacked” gear will absolutely trigger conflict.

Thermostat UX and “ideal” design

  • People criticize common programmable schedules (“wake/leave/return/sleep”) as mismatched to modern, irregular or WFH lifestyles.
  • Preferences split between:
    • “Dumb” dial‑style thermostats that just hold a setpoint.
    • Moderately smart devices (Nest, Ecobee, Tado) with presence detection and remote control—but often with “smart” features disabled.
  • Consensus: no one‑size‑fits‑all thermostat; simpler, predictable behavior is often valued over AI “learning.”

Heating efficiency, comfort, and control strategies

  • Long, technical back‑and‑forth on whether it’s better to:
    • Run heating nearly continuously at low flow temperatures with outdoor reset (good for condensing boilers/heat pumps, comfort, and efficiency in well‑insulated homes), or
    • Use deep setbacks and short, powerful heat bursts (often better in poorly insulated or radiator‑based systems).
  • Participants emphasize:
    • Heat loss scales with temperature difference; a warmer house loses more energy.
    • Condensing boilers and heat pumps are more efficient at lower water temperatures, complicating the simple “turn it off when away” advice.
    • Comfort depends heavily on surface and wall temperatures (ISO 7730, radiant effects), not just air temperature.

SDR, RF tools, and spectrum concerns

  • Discussion of HackRF’s “frequency smearing” and harmonics; some warn knockoff SDRs may pollute adjacent bands.
  • rpitx on a Raspberry Pi is mentioned as a minimal‑hardware transmitter using GPIO as an antenna, but multiple commenters call this extremely dirty and unsuitable outside a lab.
  • Flipper Zero is cited as a capable 433/868 MHz tool under custom firmware; others warn that even legal tools can draw unwanted law‑enforcement scrutiny depending on context and behavior.

DIY home automation experiences

  • Several describe rolling their own control with Home Assistant, Zigbee sensors, smart plugs/relays, and per‑room logic (e.g., combined underfloor+radiator strategies, radiator TRVs that can call the boiler).
  • Off‑the‑shelf “smart” systems (Honeywell, Tado, Siemens) are criticized as expensive, limited, or opaque compared to a custom HA setup—though some note these DIY systems can be a maintenance nightmare for future owners.

Regulation and Online Safety Act

  • Commenters highlight the blog’s removal of its comment section due to the UK’s Online Safety Act, framing it as a disproportionate compliance risk for small, self‑hosted sites and a chilling effect on hobbyist discussion.

101 BASIC Computer Games

Nostalgia and role of the book

  • Many commenters learned to program from 101 BASIC Computer Games or related Ahl books as kids, often by painstakingly typing listings from the library or second-hand copies.
  • The appeal was less the game quality and more the magic of making a computer respond interactively, often on early home machines (C64, CPC, Microbee, TRS-80, Apple II, etc.).
  • Type-in culture is remembered fondly as formative: debugging typos, adapting code to incompatible BASIC dialects, and learning the machine’s quirks.

BASIC dialects and modern environments

  • Strong interest in recreating the “BASIC feel” today:
    • Suggestions include QuickBasic 4.5 via DOSBox-X, GW-BASIC, FreeBASIC, QB64, BASICA/GW-BASIC reimplementations like pcbasic and lighter clones.
    • Some prefer interpreters because compilation changes the “flavor”.
  • Alternatives and descendants: VB.NET still has some BASIC-style dynamism; AmigaBASIC and Blitz/AmiBlitz are praised as high points of structured but still “pure” BASIC.

Game quality and content differences

  • Some games are still regarded as good or influential: Game of Life, Lunar Lander variants, Hammurabi, Golf.bas, and especially Super Star Trek (with C and Python ports).
  • Others note most games are simple and not that memorable; the educational aspect mattered more.
  • Confusion between 101 BASIC Computer Games (DEC dialects, earlier set) and BASIC Computer Games (later, Microsoft-like dialect, changed lineup) is highlighted.
  • Repeated questions about missing QBasic-era games (gorillas.bas, nibbles) are answered: this collection specifically mirrors the 1975 DEC printing, so later QBasic examples aren’t included.

Line numbers and language mechanics

  • Line numbers were required in early BASICs for control flow (GOTO/GOSUB), ordering, and editing; you edited or deleted lines by number.
  • Pain points: inserting code when numbers ran out, renumbering, and losing mental associations with specific line numbers.
  • Some dialects had RENUM; conventions like numbering by tens helped.
  • Broader dialect differences (Dartmouth, HP, MS/BASIC-PLUS families) and implementation styles (tokenized storage vs p-code compilation) are discussed with curiosity about their design history.

Modern successors and culture

  • Multiple links to ports of the games in modern languages, browser-playable collections, and related HN threads.
  • The 10LINEBASIC competition is repeatedly recommended as a contemporary way to experience dense, elegant BASIC games.
  • Several people contrast the utopian, end-user-programmer vision of the BASIC era with today’s app/AI-dominated, less user-programmable computing world.

Evertop: E-ink IBM XT clone with 100+ hours of battery life

Overall concept & target use cases

  • Many commenters love the idea of a self-contained, low-power, “forever” computer: writing, coding, retro gaming, exploration, and tinkering without worrying about outlets.
  • Strong appeal for off-grid / prepper scenarios: solar panel + massive runtime + huge library of DOS-era software as a self-sufficient computing environment when modern infrastructure fails.
  • Others see it as a distraction-free “digital typewriter,” terminal/SSH client, or field note-taking machine.

Battery life, power, and networking

  • Creator states 200+ hours of continuous use without power saving, 500–1000 hours with it; solar can recharge or directly power the device.
  • Discussion around WiFi power: staying associated and waking periodically is more efficient than reconnecting every 200 ms; IEEE 802.11 power-save features are linked.
  • Some wish for LoRa, LTE, or mesh-style radios for off-grid comms.

Display: e‑ink benefits, latency, and durability

  • Typing latency is ~0.3–0.4s per keypress; several people say that’s too slow for comfortable daily use, others accept it as the tradeoff for extreme battery life.
  • Creator notes ~350 ms refresh, partial updates, and multi-year light daily use without noticeable degradation.
  • Others cite vendor guidance and 1M-refresh specs, arguing heavy interactive use could shorten lifespan; some say e‑ink is fine for e-readers but dubious for intensive text editing.
  • Multiple suggestions to use transflective / RLCD / Sharp Memory LCD instead for higher refresh and comparable daylight readability.

Architecture, x86 rationale, and “XT clone” debate

  • Runs DOS on an 80186-class emulator atop an ESP32. Built to be compatible with XT software but with more RAM, VGA-class video, and sound.
  • Debate over the term “XT clone”: some say it’s accurate in the 1980s marketing sense (runs XT software, adds features); others think calling an ESP32 emulator a “clone” is misleading.
  • Some want 286/386/486-level devices to run heavier OSes (Windows 95, full Linux); others argue emulating a simple PC on ESP32 is exactly what maximizes battery life.

Desire for adjacent devices & alternatives

  • Lots of nostalgia and wishlists: HP 95/200LX, TRS‑80 Model 100, Tandy 102, PowerBook 100, Palm, netbooks, Alphasmart, Freewrite, “writer-decks.”
  • People point to existing or related products: Pocket386, DevTerm, ZeroWriter, PineNote, various e‑ink Android tablets (Daylight, MobiScribe Wave), Kindle hacks, Raspberry Pi + e‑ink builds.
  • Broader lament that mainstream laptops optimized for power and thinness, not 50‑hour runtimes and ultra-simple computing.

The Future of Compute: Nvidia's Crown Is Slipping

Nvidia’s Ecosystem and Services Strategy

  • Several comments argue Nvidia’s long‑term moat is shifting from pure hardware to a full-stack platform: CUDA, Infiniband, NVLink, NGC, AI Foundry, Omniverse, robotics (Isaac), automotive (Drive), etc.
  • Nvidia is seen moving into services, custom-chip consulting, and white‑label cluster management to monetize know‑how during slower capex cycles.
  • Supporters claim Nvidia is already an “AI software company” with deep library and tooling investments that lock in customers across many industries.

Hyperscalers and Custom Silicon Threat

  • A major thread focuses on hyperscalers (Google, AWS, Microsoft, Meta) building their own accelerators (TPUs, Trainium, Maia, in‑house AI chips).
  • One side: even if these chips are worse than Nvidia’s, they can still erode Nvidia’s datacenter dominance and margins by capturing internal workloads.
  • Counterpoint: only a subset of these efforts are seen as technically or organizationally capable; many may be killed in future strategy shifts. Historically, such in‑house chips have supplemented, not replaced, Nvidia.
  • Disagreement over how fast and how completely hyperscalers will “cut out” Nvidia, and whether enterprise workloads will also consolidate onto cloud‑native stacks.

Datacenter vs Gaming and Consumer

  • Broad consensus that gaming now contributes a small minority of Nvidia revenue; datacenters dominate.
  • Some argue gaming is a “side business” and can’t save Nvidia if AI demand collapses; others note consumer GPUs historically seeded innovation that made the AI boom possible.
  • Concern from gamers that datacenter focus degrades gaming GPU value (high prices, issues with the 5000 series).

Market Cyclicality, Bubble Risk, and Stock Debate

  • Bulls emphasize insatiable long‑term compute demand, sell‑outs of H100/B200, and view “doom” narratives as a contrarian buy signal.
  • Bears stress semiconductors’ cyclicality, inevitable margin compression, and that current expectations may already be fully priced.
  • Some distinguish between Nvidia staying a great company vs remaining worth its current valuation.

Verticals, B2B Focus, and Avoiding Consumer Products

  • Multiple comments argue Nvidia will avoid low‑margin B2C plays (phones, cars) and instead be the technology partner behind others’ products.
  • Example vision: a single Nvidia stack powering car compute, factory robots, simulations, and internal LLMs for a given enterprise, with tight integration across tools.

Visiting Us

Technology stack & MUMPS

  • Epic still relies heavily on MUMPS for its core database and backend, with higher-level dialects and frameworks transpiled down to it.
  • Frontends and newer components are largely C#/.NET, TypeScript/React, mobile platforms, plus Python/SQL for analytics.
  • Some commenters who dug into the transpiled MUMPS say modern usage is far removed from the horror stories in older articles, though the language’s skills are still seen as non-transferable outside health IT.

No-acquisition philosophy & company structure

  • A recent podcast episode reignited interest in Epic’s unusual structure: privately held, no IPO, no M&A, and a legal structure designed to prevent sale or reverse takeovers.
  • Supporters argue this enables long-term product focus, avoids integration patchworks like some competitors, and reassures customers they won’t be bounced between owners or squeezed by Wall Street.
  • Critics note this also entrenches a single leader’s power and reduces external accountability.

Product experience & industry role

  • Patients are generally enthusiastic about MyChart, calling it the best portal they’ve used.
  • Many clinicians and nurses in the thread dislike Epic, describing heavy data entry, convoluted UIs, and poor fit for non‑US health systems; Norway and Finland rollouts are cited as scandals.
  • Despite criticism, several say Epic is still better than rival EHRs, and that integration, regulation, and certification requirements make disruption extremely hard.

Work culture, hiring, and training

  • Strong split opinions: some portray Epic as exploitative with long hours (especially in Technical/Implementation Services), aggressive non-competes, anti-remote stance, and burnout; others report 40-hour weeks, solid pay for Madison, and valuable early-career training.
  • Epic is known for hiring many fresh grads from Midwest schools into non-SWE technical roles and investing months in structured training. Many see it as an “early-career transit hub.”

Code quality & internal practices

  • Former devs describe MUMPS codebases with weak ownership, huge complex functions, and defensive accretion of branches.
  • Others praise strong testing, design-doc culture, internal tools (custom code review, PM, time logging on their own DB), and a strong sense of quality and accountability.

Campus, location, and branding

  • The Verona campus is widely described as spectacular, whimsical, and “Disneyland-like,” with cow-themed transport and even live cows.
  • Some love the environment; others find it artificial and note that a nice place to visit doesn’t guarantee a good place to spend years.

Thieves took their iPhones. Apple won't give their digital lives back

Account Takeovers via Stolen iPhones

  • Several comments describe a common pattern: thieves shoulder‑surf the device passcode, steal the phone, then use that passcode on a “trusted” device to reset the Apple ID/iCloud password and associated email with no extra factor.
  • Apple’s “Stolen Device Protection” is seen as a partial fix but not enabled by default and still imperfect.
  • Advanced Data Protection (ADP) is noted as making accounts truly unrecoverable if the recovery key is lost, which is viewed by some as an overcorrection.

Security Model, Usability, and User Education

  • Some blame users for losing passwords/recovery codes; others argue a security model that’s easy to misunderstand and full of traps is itself flawed.
  • There’s criticism that security options are too “convenient” and not properly explained; suggestions include mandatory education (videos + quizzes) before enabling high‑risk settings.

Identity Verification and Account Recovery

  • Debate over why banks can remotely re‑verify identity in minutes (ID photo + video) but Apple claims they can’t.
  • Counterpoints: banks accept quantifiable fraud risk, have better KYC data, can cap transaction sizes, and charge for this risk; Apple operates globally and would face unbounded, hard‑to‑insure liability (e.g., “lost career” value).
  • Some propose in‑store ID checks and court‑order requirements; others note dangers of giving support staff powerful account‑transfer tools (SIM‑jacking analogy) and of abusive partners weaponizing recovery processes.
  • It’s noted Apple has a recovery flow, but generally will not take an account away from whoever is currently logged in.

Privacy, Governments, and Apple’s Motives

  • One camp: Apple avoids manual recovery to preserve a “we can’t help, even for governments” posture and avoid backdoor pressure.
  • Another: in these cases data isn’t E2E encrypted (ADP is off), Apple clearly can decrypt and is simply choosing not to provide basic customer service.
  • Broader skepticism: any technical ability to recover implies governments can compel its use (NSLs, subpoenas), so true safety comes only from not giving data to third parties.

Backups, iCloud, and Practical Advice

  • Strong consensus that relying solely on iCloud is risky; 3‑2‑1 backup rule is recommended, with at least one copy not tied to the Apple ID.
  • Multiple reports that full iCloud export (Photos, Drive, app data) is cumbersome and fragile. Workarounds:
    • Mac (or Mac mini) signed into iCloud, set to keep full‑res photos and all files locally, then back that machine up (Time Machine, NAS, Backblaze, external drive, rclone, third‑party downloaders).
  • Some argue: if losing one online account destroys your business, your risk management already failed.

Is 1 Prime, and Does It Matter?

Why 1 Is Excluded from Primes

  • Main practical reason: including 1 would clutter almost every theorem with “prime greater than 1” and “excluding the trivial factor 1,” making exposition worse with little gain.
  • The Fundamental Theorem of Arithmetic is cleaner: “every integer > 1 has a unique factorization into primes” vs needing to say “primes > 1” or allow infinitely many 1s in factorizations.
  • Related: viewing 1 as the empty product of primes makes it naturally special and non‑prime.
  • Several results (Euclid’s lemma, Euler product for the zeta function, sieve of Eratosthenes) behave nicely only if 1 is not prime; treating 1 as prime breaks or trivializes them.

Foundational and Logical Considerations

  • Long subthread on how precisely one can “define the natural numbers”:
    • First‑order Peano arithmetic admits non‑standard models (elements behaving like “infinite integers”).
    • Second‑order Peano arithmetic is categorical in full semantics, but then interpretation depends on a richer meta‑theory, leading to regress.
  • These issues are used to illustrate that even seemingly simple objects (like ℕ) are subtle to pin down formally, so debates about “is 1 prime” are partly about what framework you adopt.

Empty Set, Zero, and Other Conventions

  • Analogy: we could have lived in a mathematical culture that declared the empty set “not a set” to avoid endless “nonempty” qualifiers, but that would complicate other areas (set theory, topology).
  • Discussion on whether 0 is a natural number, and parallel notational compromises (ℕ₀ vs ℕ₁, ℤ≥0 vs ℤ>0).
  • Some note that including the empty set and 0 usually simplifies algebraic structures (monoids, topologies), though it introduces a few edge cases elsewhere.

Definitions of “Prime” and Generalizations

  • Common modern definition cited: a natural number with exactly two (positive) divisors; this neatly excludes 1 and negatives.
  • Others point out in algebraic contexts:
    • Distinction between units (invertible elements like ±1) and irreducibles.
    • In other rings (e.g., Gaussian integers), usual primes like 2 may factor further.
  • Several commenters stress that prime definitions that exclude 1 are the ones that made unique factorization and algebraic number theory work smoothly.

Programming and Practical Analogies

  • Comparison to 0‑based vs 1‑based array indexing: both are conventions, but 0‑based tends to simplify many formulas, just as “1 is not prime” simplifies number theory.
  • Example code: defining a product function that returns 1 on an empty list mirrors the empty product convention.
  • Some use 0 or −1 as sentinel indices, analogous to how 1 is treated as a “special” but not prime element.

Meta: Axioms, Usefulness, and Philosophy

  • Several comments emphasize: axioms and definitions are not “true” or “false,” only more or less useful.
  • From this standpoint, the question isn’t “is 1 really prime?” but “does calling 1 prime help?”—consensus in the thread is that it overwhelmingly does not.
  • There’s broader reflection on how many philosophical debates (including about infinity, excluded middle, etc.) are ultimately fights over which definitions are most productive.

Astronomers confirm the existence of a lone black hole

Emotional and Existential Reactions

  • Several commenters find the idea of a massive, invisible object drifting through space “creepy” or unsettling.
  • Others argue it’s no scarier than space in general: we already live in a hostile, mostly empty environment where many low‑probability cosmic threats exist.
  • Some say they’d rather be oblivious if a fatal encounter were inevitable, to avoid societal panic and prolonged dread.

Threats to Earth and the Solar System

  • A lone stellar‑mass black hole is not a vacuum cleaner; outside its event horizon its gravity behaves like any other object of the same mass.
  • Direct “gobbling” of Earth is considered much less likely than:
    • Distorted orbits, ejection from the Sun’s orbit, or severe orbital chaos.
    • Tidal destruction of planets or moons, or increased asteroid bombardment.
  • A pass even at several AU with ~6–7 solar masses (as in the paper) would strongly perturb planetary orbits and could be catastrophic over years to millennia.
  • Some discussion explores what happens if a small, fast black hole passes through a planet: accretion heating could in principle exceed the planet’s binding energy and blow it apart, though details are hand‑wavy.

Detection, Frequency, and Risk

  • The object was detected via microlensing; commenters stress such detections require rare alignments, so many similar black holes could be invisible to us.
  • Still, space is described as “really, really big”: even with millions of such objects, direct encounters with our system are viewed as extraordinarily unlikely.
  • People ask how close and massive a black hole could be before routine surveys or orbital deviations would reveal it; upcoming missions like the Roman Space Telescope are mentioned as particularly promising.

Dark Matter and Primordial Black Holes

  • Some speculate whether numerous lone black holes could explain dark matter.
  • Others note constraints:
    • Too many stellar‑mass black holes would overproduce gravitational lensing.
    • Big Bang nucleosynthesis limits how much “ordinary” (baryonic) dark matter is allowed.
  • Primordial black holes of sub‑stellar mass are raised as one possible (but non‑mainstream) dark‑matter candidate; size ranges from “moon‑mass to planet‑mass” are discussed as less constrained.

Early Universe and “Why Not a Giant Black Hole?”

  • A lay explanation that uniform density cancels gravity is challenged; GR predicts even a uniform matter distribution tends to contract.
  • A more careful explanation: in the early universe, spacetime was already expanding rapidly; high density slowed that expansion but didn’t reverse it into a single black hole.
  • This leads into brief discussion of inflation and how current cosmology already relies on speculative physics, making intuitive reasoning about the Big Bang tricky.

Hawking Radiation and Tiny Black Holes

  • Commenters discuss evaporation of very small black holes, noting:
    • Black holes below a certain mass would have fully evaporated by now; estimates place that around 10¹² kg.
    • Hawking radiation hasn’t been directly observed; it’s a strong theoretical prediction from quantum field theory in curved spacetime.
  • There is back‑and‑forth on how Hawking radiation is generated (virtual particle pairs near the horizon) and clarification that nothing literally escapes from inside the event horizon.
  • Some speculate in principle about manufacturing micro black holes with extreme technology, but emphasize this is far beyond current capabilities.

Blog hosted on a Nintendo Wii

Performance and hosting details

  • Commenters note intermittent slowness and “HN hug” effects, but overall performance is considered surprisingly good for Wii hardware.
  • A plaintext status page updated via cron every 15 minutes shows low load averages (~0.06), 88 MB total RAM, and reveals that ntpd takes a notable share of memory.
  • Some argue the site isn’t “fully” Wii-hosted because TLS termination runs on Caddy elsewhere; others suggest dropping TLS or moving Caddy to the Wii for purity.

Wii hardware, NetBSD, and Starlet

  • Discussion confirms NetBSD can access Wii USB 2.0, making SD reliability less critical since a USB thumb drive can be used.
  • Deep dive into the Starlet co-processor and IOS: normally it owns I/O (networking, storage, Bluetooth), but with AHBPROT disabled / MINI-style setups, the main CPU can directly hit the hardware, bypassing Nintendo’s stack.
  • Users contrast this with Nintendo’s original networking design, where limited RAM and a weak TCP stack severely constrained throughput.

Nintendo networking quality and exploits

  • Multiple comments recall Nintendo’s historically poor networking: tiny TCP windows, slow system updates, and bad web services.
  • A detailed anecdote describes how WFC games like Mario Kart Wii can be redirected to community servers via DNS, exploiting a certificate validation bug plus an RCE in the networking library, then patching games in memory.
  • People note Nintendo’s official advice for Switch port-forwarding (opening huge UDP ranges) as emblematic of this attitude.

Could older consoles host websites?

  • Thread branches into whether NES/SNES/5th-gen consoles could host simple HTTP/CGI:
    • One side: RAM and CPU constraints make it extremely hard without heavy cartridge add-ons or “cheating” network chips (with built‑in TCP/IP).
    • Others cite examples (C64 web servers, DS Linux, NES running C64 OS variants, SNES via USB/FXPAK, Game Boy/GBA projects) to argue it’s theoretically feasible with enough external hardware and cleverness.
  • This leads to a philosophical line‑drawing debate: at what point do add-ons mean it’s no longer “really” the console hosting?

Tools, memes, and related projects

  • Several suggest using OBS or QuickTime instead of Photo Booth to avoid flipped video.
  • Priiloader is mentioned as a way to reboot straight into NetBSD after kernel changes.
  • The “SSL Added and removed here!” diagram sparks discussion of NSA leaks and surveillance; mostly as cultural/meme context for the blog’s image.
  • People share similar “silly host” stories, like blogs on robot vacuums or early GBA web servers, and offer Wii colocation for fun.

FTC takes action against Uber for deceptive billing and cancellation practices

Subscription & Cancellation Dark Patterns

  • Many report being tricked into Uber One during checkout (e.g., a trial screen visually identical to the “place order” screen, inserted mid-flow).
  • Cancellation is often described as convoluted: multiple screens, hidden options, and sometimes being blocked within 24–48 hours of renewal.
  • Some users say their own cancellation was “only” ~9–10 screens and not as bad as the FTC’s “23 screens,” suggesting variation by A/B test, location, or time.
  • Comparisons are made to other industries (gyms, Equifax, OnStar, newspapers) that force phone calls or in‑person visits to cancel, reinforcing a general pattern of hostile design.
  • Several propose a rule: cancelling must be at least as easy and via the same channel as signing up.

Pricing, Fees & Dynamic Behavior

  • Users report:
    • Business profiles and Uber Cash/gift cards often yielding higher quoted fares than personal profiles or no credit balance.
    • Food delivery markups of 20–100% over restaurant prices plus multiple “service” fees.
    • Teaser ride/delivery ETAs and times that jump significantly after payment, viewed as intentional underestimation.
    • “Priority” fees to get a driver or delivery sooner, with skepticism that it truly improves timing when many people pay it.

Refunds, Credits & Support Mazes

  • Common pattern: when Uber fails to deliver (wrong order, missing items, delays), refunds default to in‑app credits, not the original payment method.
  • Some regions report easy, automated refunds; others describe chatbot loops, inability to reach a human, or only partial credits.
  • Chargebacks often succeed but can lead to effective account lockout or “ransom” balances.

Food Delivery Economics & Ethics

  • Many see delivery apps as “markup on markup,” yet some urban users find the time savings worth a small premium.
  • Disabled and car‑less users describe feeling trapped: they depend on these services yet are repeatedly hit by deceptive pricing and opaque “minimums.”
  • Skepticism that the underlying unit economics work even with aggressive dark patterns; Uber is seen as barely profitable despite scale.

Impact on Drivers & Taxis

  • Drivers report:
    • Highly opaque compensation; some claim to receive only ~25–30% of the fare while riders believe the opposite split.
    • Suspicion that drivers who accept low offers are targeted with worse pay.
    • GPS routing that lengthens trips, increasing time and costs.
  • Users lament the destruction or weakening of traditional taxi systems, while noting taxis had their own problems (poor service, rent‑seeking medallion systems, scams in some cities).

Regulation, Enforcement & Broader Concerns

  • Many welcome the FTC action and cite similar state laws (e.g., “if you can sign up online, you must be able to cancel online”).
  • Others are cynical, viewing enforcement as sporadic or politically influenced.
  • Dynamic pricing and personalization are broadly criticized as enabling price discrimination with no clear consumer upside.
  • Several argue that real solutions require stronger consumer protection, antitrust enforcement, or treating ride-hailing more like a regulated utility.

Show HN: Dia, an open-weights TTS model for generating realistic dialogue

Audio Quality and Expressiveness

  • Many listeners find the demos shockingly good, on par with or better than popular closed models and clearly ahead of “robotic” TTS they’re used to.
  • Standout traits: natural dialogue flow, overlapping-style conversation, emotional range (laughs, coughs, yelling), and convincing “podcast/NPR”‑like delivery.
  • Critiques: sample voices are often too energetic/“ad-like” and lack calm, neutral conversation. Some hear speech that’s noticeably too fast and accelerates over time; one commenter links this to known CFG-induced speed drift from the Parakeet architecture.
  • Users also report artifacts: initial hissing, occasional background “music,” incomplete use of the text prompt, and sometimes cutting off the end of the script. A few prompts (especially with custom non-verbal tags) produce bizarre or profane outputs.

Use Cases and Desired Features

  • Strong interest in multi-voice audiobooks: consistent character voices, LLM-driven casting, and expressive narration. Some see this as approaching or eventually rivaling human narrators; others insist humans still add unique value.
  • Other proposed uses: VR games, dialogue-heavy apps, language practice, medical transcription/education, and AI podcast-like experiences.
  • Frequent requests:
    • More languages (Chinese, Finnish, etc.; currently English-only).
    • More than two speakers per scene.
    • Streaming/low-latency output and real-time use.
    • Word-level timing maps and better control of speaker selection.
    • More reliable voice cloning and possibly fine-tuning, beyond zero-shot prompts.

Model Architecture, Performance, and Tooling

  • Dia generates an entire conversation in a single pass instead of per-turn stitching, which users see as a conceptual advantage.
  • The model is ~1.6B parameters, open-weights, and currently needs ~10GB VRAM, though quantization and optimizations are planned. Community reports it running (slowly) on Apple Silicon and via Hugging Face Spaces (including ZeroGPU).
  • Architecture is acknowledged as closely inspired by Parakeet and SoundStorm, using Descript’s DAC codec and Whisper-D–style tags. Future iterations are planned with MoE and sliding-window attention.
  • Community members are already wrapping it in servers, Docker images, and Unity/VR integrations.

Training Data, Licensing, and Ethics

  • Several commenters press for clarity on training data origin, suspecting heavy use of podcast-style material. This triggers a broader debate about fair use, consent, and the double standard between enforcing FOSS licenses vs. tolerating opaque AI datasets.
  • License is Apache 2.0; additional text about “intended for research and educational use” and forbidden misuse is clarified as guidance, not legally binding extra restrictions.
  • Some raise concerns about voice-cloning misuse and ask whether complementary detection tools will be developed.

Naming, UX, and Ecosystem Context

  • The name “Dia” collides with well-known existing projects, prompting criticism that AI projects often reuse established OSS names without due diligence.
  • Users note rough edges in the Notion-based demo page and intermittent Hugging Face issues.
  • Several see Dia as evidence that small teams can now rival large labs in TTS, and call for an open “Stable Diffusion moment” in speech to challenge expensive proprietary services.