Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 329 of 363

AGI Is Still 30 Years Away – Ege Erdil and Tamay Besiroglu

Current LLM Capabilities (o3, coding, scheduling)

  • Several commenters report o3/other frontier models “one‑shotting” nontrivial software: distributed schedulers, bespoke task runners, Rust features, research helpers.
  • Some claim it beat weeks of their own design work, even for systems they consider “solved problems” (schedulers, frameworks).
  • Others question these anecdotes (scale is modest, problem is well‑studied, story details seem shaky) and stress that off‑the‑shelf OSS might be stronger and more battle‑tested.

Usefulness vs Bugs, Skill Atrophy, and Copyright

  • Strong split: some see LLMs as a 10× productivity boost and “making coding fun again”; others say they waste time, hallucinate, and are only safe for boilerplate.
  • Concern that relying on LLMs will degrade human skills and deep understanding; counter‑argument is that they help people push through blocks and finish more ambitious projects.
  • Worries about AI‑generated code contaminating open source with un‑copyrightable or plagiarized “radioactive” snippets; others argue the main value is effectively “copyright‑laundered” code search.

“Talking Library” vs Real Reasoning

  • One camp: LLMs are glorified autocomplete / “talking libraries,” powered by statistics, not understanding; hallucinations, lack of goals, and shallow math ability cited.
  • Opposing camp: points to interpretability work suggesting internal heuristics and planning‑like behavior, and notes that human “understanding” is also inferred only from behavior.
  • Debate over whether current systems show any general reasoning (0 vs “0.0001”) and whether “understanding” is a spectrum.

What Counts as AGI? Benchmarks and Embodiment

  • Definitions vary widely: human‑level on all economically valuable tasks; beating average humans; doing Nobel‑level work; running whole organizations; or passing specific tests (e.g., ARC, “novel language spec → working compiler”).
  • Some argue true AGI must learn continually, set its own goals, generalize to new domains, and probably have a physical body interacting with the world.
  • Others say a cluster of domain AIs could effectively substitute for a single AGI, blurring the distinction.

Timelines, Hype, and “Forever Tech” Comparisons

  • Opinions span “never,” “centuries,” “30 years,” and “5–10 years,” with repeated comparisons to fusion, flying cars, quantum computing.
  • Many emphasize that no one really knows, likening confident long‑range forecasts to past failed tech predictions.
  • Some think LLM progress may plateau; others expect more discontinuous leaps rather than smooth 3%‑per‑year gains.

Do We Even Need AGI? Near‑Term Impact of Narrower AI

  • Several argue AGI is mostly a VC / branding target; current “assisted intelligence” is already transformative and far from fully exploited.
  • Anticipated disruptions: automation of large swaths of knowledge work, reorganization of internal business processes, cheaper content and code, spam and cheating at massive scale.
  • Concerns that economic gains will flow mostly to a tiny elite; others focus on productivity upside regardless of distribution.

Ethics, Alignment, and Personhood

  • Some treat AGI as potential sentient beings and worry alignment research equates to designing obedient slaves.
  • Others insist alignment is analogous to raising humans or managing employees, and that machine feelings are not required for utility.
  • Question raised whether AGI should ever have legal personhood, and whether humanity actually wants entities with their own goals.

Meta: Media, Discourse, and Podcast Culture

  • Mixed views on the podcast host: praised as unusually prepared and probing; criticized as scale‑obsessed and contributing to hype.
  • Broader frustration with AI discourse: moving goalposts for “AGI,” undefined terms, clickbait panels, and low signal‑to‑noise compared to earlier tech podcast eras.

Milwaukee M18 Battery Reverse Engineering

Battery electronics & reverse engineering

  • Commenters appreciate the detailed teardown, noting the use of a low‑power MCU plus an analog front-end (AFE) ASIC.
  • The AFE handles per‑cell voltage measurement, current sensing, fault protection (MOSFET cutoff), and cell balancing control, while the MCU manages higher‑level logic and communications with tools/chargers.
  • The MSP430’s deep sleep is highlighted as key to not draining packs in storage.

Charging, BMS, and cell balancing

  • Clarification that the Milwaukee pack circuitry is not the charger; the real charging regulation lives in the external charger.
  • In the pack: SOC indication, protection, current negotiation with tools, and (theoretically) balancing—though several note Milwaukee appears not to implement balancing in some lines.
  • M12 and certain DeWalt packs are reported to lack active balancing despite having sense pins, leading some users to manually balance via hobby chargers or external plugs. Experiences vary between “no problem in 10 years” and “all went out of balance in 2 years.”

Compatibility, standards, and adapters

  • Debate about (rumored) EU moves toward standardized tool batteries; some link to actual EU battery regulation but it’s unclear whether it mandates interchangeable power‑tool packs.
  • Some see standardization as environmentally and economically beneficial; others call it unnecessary regulation since cross‑brand adapters and third‑party packs already exist.
  • Adapters are common but can bypass low‑voltage cutoff depending on where protection is implemented (tool vs battery), risking over‑discharge.

Cost, ecosystems, and sales tactics

  • Many note tool batteries are disproportionately expensive compared to raw cell prices, likening them to ink cartridges.
  • Strategy: buy tools bundled with batteries (often on sale) rather than standalone packs; Home Depot “hackable” promos and deal‑watching communities are frequently cited.
  • Tool platforms intentionally lock users into ecosystems; some expect only regulation would produce true cross‑brand compatibility.

User experiences & performance

  • Milwaukee M18/M12 systems receive strong praise for durability, pack longevity, charger behavior (round‑robin, safe standby), and breadth of tools.
  • Some prefer DeWalt for woodworking and Milwaukee for high‑torque and automotive work; Makita and Ryobi are seen as good value, especially for DIY use.
  • New “tabless” and high‑capacity cells are reported to significantly improve power delivery.

Safety, failures, DIY and knockoffs

  • Stories cover NiCd pack disappointment vs long‑lived modern Li‑ion, DIY pack rebuilds with added BMS, and one office fire from drone battery charging.
  • Opinions differ on knockoff batteries: experiences range from fine and higher‑capacity to poor cold‑weather performance and under‑spec cells; fakes of OEM packs are also reported.
  • Some run tools from bench power supplies via gutted battery shells; others explore but question USB‑C, noting the very high power levels these tools can draw.

Google is illegally monopolizing online advertising tech, judge rules

How Google’s Ad-Tech Monopoly Worked (per thread)

  • Several comments summarize the ruling as targeting two specific markets: publisher ad servers (e.g. DoubleClick for Publishers / Google Ad Manager) and ad exchanges (AdX).
  • Google allegedly tied its ad server and exchange so publishers couldn’t use rivals on equal terms: non-Google exchanges got less info about impressions, Google bids could win even against higher third‑party bids, and publishers were barred from setting higher price floors for AdX than for others.
  • When publishers adopted “header bidding” to route demand to multiple exchanges, Google’s buy-side tool (DV360) was modified to strategically underbid on third‑party exchanges, then outbid them on AdX with the advertiser’s full budget, effectively siphoning winning bids back to Google.
  • Commenters stress that ad networks like AdSense were not the defined monopoly market; the focus is on the combined publisher‑ad‑server + exchange stack.

Is Google a Monopoly or Just Successful?

  • One side argues Google faces ample competition (other ad networks, alternative mail/search/cloud providers) and offers easy exit, unlike Microsoft’s historic OS lock‑in. They see the ruling as word‑games around “monopoly” and possibly political.
  • Others reply that three separate antitrust losses, under both parties and multiple judges, show a pattern of unlawful monopolization. They point out the legal concept is “monopoly power” in a defined market, not 100% share.
  • There’s debate over the “consumer welfare” standard vs broader competition goals; some say focusing only on prices to end‑users misses harms to publishers and advertisers.

Experiences of Dependence and Power Imbalance

  • Multiple publishers and app developers describe account bans, sudden revenue collapses, and opaque policy enforcement with essentially no human support.
  • Critics say this shows how a dominant platform can “ruin your business” without recourse; defenders counter that relying on a single free vendor is a business risk, not a rights violation, and that many alternative ad channels exist (social, TV, print, other networks).
  • Others respond that in practice there is no true “drop‑in” Adsense/AdMob replacement for small and medium online properties, especially on short notice.

Ad-Tech Industry Critique Beyond Google

  • Many comments portray programmatic advertising as systematically extractive: a large share of every ad dollar goes to intermediaries, with extensive fraud, opaque auctions, and questionable targeting value.
  • Some ad-tech insiders argue the middle layers add real efficiency (better matching, higher conversion), while critics cite studies claiming behavioral targeting often underperforms simple untargeted or contextual ads once costs are included.
  • Privacy and tracking are major flashpoints: one camp sees granular targeting as necessary for viable ad-funded media; the other sees it as inherently abusive and calls for bans or strict limits, even if that shrinks ad-supported content.

Breakup, Remedies, and Comparisons

  • There’s disagreement on whether Google should be structurally split (separating ads from products like search, Chrome, Android, YouTube) or merely constrained (e.g., audited exchanges, behavioral remedies).
  • Some argue vertical integration lets Google dump subsidized products and distort adjacent markets; others note many of those “subsidized” products counter other monopolies (e.g., Android vs iOS, Chrome vs legacy IE) and fear breakups could strengthen different giants.
  • Historical analogies to AT&T and Microsoft split opinions: some credit those cases with enabling the modern internet and startup ecosystem; others say reconsolidation and research cutbacks show the limits or costs of breakup.

Broader Antitrust and Political Context

  • Several comments highlight that major Google antitrust actions were filed under both Trump and Biden, and that Big Tech enforcement is now bipartisan, though motives differ.
  • Skeptics doubt meaningful consequences will follow or worry future administrations could weaken remedies or be “bought off.”
  • Others see the ruling as a long-overdue signal that digital platforms cannot act as exclusive, self-dealing market makers on both sides of critical online infrastructure.

HDR‑Infused Emoji

Browser and platform support

  • Works reliably in Chrome (desktop and Android) and Electron apps like Slack; many people report blindingly bright emojis there.
  • Safari: HDR video works; HDR images are in Technology Preview behind a flag. Shipping Safari on macOS generally doesn’t show this PNG-based trick yet (seen as intentional and low‑priority, not impossible).
  • Firefox has no real HDR support on most platforms despite work being discussed for years; several users see only flat white or muted colors.
  • Linux users report no effect in any tested browser despite OS/monitor HDR support.
  • Some Android users see it in Chrome/Vivaldi; others don’t, suggesting device/OS/version variance.

Potential for abuse and user‑hostile design

  • Many worry this will be used like autoplay audio / “loudness war” in audio: brighter‑than‑white elements to grab attention, especially in ads or chat apps.
  • Some consider Safari’s initial reluctance with HDR images “the correct behavior” for that reason.
  • Others counter that the web already allows very bothersome visuals and HDR images are not qualitatively worse.

How it works and technical notes

  • Trick: encode images in an HDR/wide‑gamut color space (e.g., Rec. 2020) so highlights exceed the usual #ffffff SDR white, while the rest of the page stays SDR.
  • On HDR displays, OS/browser tone‑mapping boosts those pixels, so emojis appear brighter than the brightest normal UI white.
  • CSS and spec work exists to control dynamic range per element, and to clamp content back to SDR if desired.
  • Some describe editorial uses: subtle halos or “gilded” accents via HDR video or HDR PNGs for tasteful emphasis.

Perception, brightness, and implementation quirks

  • Several users perceive the rest of the page dimming when HDR elements appear. Disagreement whether macOS actually darkens SDR content or whether this is a contrast illusion; some technical back‑and‑forth cites Apple’s EDR behavior.
  • HDR behavior varies by panel (XDR vs MacBook screens, TVs, phones). Window size/peak brightness constraints matter.
  • YouTube HDR examples prompt questions about how content is shot, encoded (HLG, HDR10, Dolby Vision), and preserved through editing/upload.

Use cases: fun vs annoyance and accessibility

  • Many enjoy using this for Slack emojis and profile pics or as a visual “wow” effect; others report strong peer pressure to remove them because they dominate channels.
  • People with light sensitivity describe sudden HDR flashes as physically painful and want system‑wide ways to disable HDR, especially on Android.
  • One observation: screenshots of these pages lose the HDR effect, potentially allowing hard‑to‑capture content.

Debate: HDR as advancement or gimmick

  • Supporters call HDR one of the biggest display improvements in years, especially for movies and games, valuing higher peak brightness and better dark scenes.
  • Skeptics liken it to 3D TVs or “surround sound for most people”: more marketing than meaning, or simply “too much brightness.”
  • Some note HDR’s real benefits are wider dynamic range and bit depth, not just “turning the brightness up.”

Control and mitigation

  • macOS: HDR can be effectively disabled by choosing SDR/sRGB display presets or toggling HDR options on certain displays.
  • Windows HDR is widely criticized as clumsy, requiring manual mode switches and producing bad mappings; screenshots/capture are problematic.
  • Browsers: Chrome can be forced to sRGB via chrome://flags/#force-color-profile. Slack inherits whatever the underlying engine does; users ask for app‑level toggles.
  • A GitHub project shows how to block HDR emojis, and commenters trade tips on OS/browser HDR test pages and switches.

First baby born in UK to woman with transplanted womb

Medical significance and cost

  • Commenters describe the procedure as “incredible technology” and emotionally powerful, especially seeing a seemingly low‑tech birth photo that embodies decades of research and teamwork.
  • Uterus transplants are typically temporary: often used for up to two pregnancies, then removed. IVF is required; natural conception isn’t currently an option.
  • The quoted UK cost (~£30k) is seen as remarkably low for a 17‑hour operation with ~30 staff, though some note this is within a clinical trial with donated time, so not indicative of future market pricing.

Safety, ethics, and alternatives

  • Several people worry about the ethics of exposing mother and fetus to powerful immunosuppressants, saying long‑term effects are unclear.
  • Some argue surrogacy is medically safer and ethically simpler than two major surgeries (donor and recipient) plus pregnancy risks. Others point out surrogacy is illegal or tightly restricted in some jurisdictions, making transplantation relatively more acceptable.
  • One view: individually it may be “crazy,” but societally it advances medical science.

Health system and affordability debates

  • Long thread on US vs UK cost structures: skepticism that such a transplant would be affordable in the US, discussion of insurance coverage (usually poor for fertility treatments), Medicaid variability, and inflated US list prices vs negotiated rates.
  • Comparisons are made to biologic drugs and radiopharmaceuticals that cost more per month or per dose than the entire transplant.

Gender, law, and definitions

  • The case is placed against recent UK legal debates on “biological woman.” Several commenters stress that women without wombs (e.g., MRKH, hysterectomy) are unambiguously women, and that legal rulings are about statutory wording, not metaphysical definitions.
  • Long subthread on competing definitions of “woman” (developmental pathway, chromosomes, reproductive organs, appearance), and the problems each has with edge cases and DSDs.

Transgender possibilities and politics

  • Many wonder if uterus transplants could one day enable pregnancy in trans women or other males. Some think it’s technically plausible (with C‑sections and appropriate anatomy), others predict extreme medical risk or ethics‑committee resistance.
  • Several note that political and ideological opposition to trans rights may be a bigger barrier than pure medical feasibility.

Artificial wombs and future biotech

  • Some see uterus transplants as an interim step toward artificial wombs, which might decouple reproduction from female bodies and pregnancy’s physical burden.
  • Others argue pregnancy has important emotional and biological roles that artificial gestation might not replicate.
  • Side discussions explore more radical biotech ideas (e.g., brainless animal bodies for bio‑computing), with mixed reactions ranging from fascination to horror.

Pregnancy biology and fetal–maternal conflict

  • Multiple threads highlight pregnancy as an evolutionary “conflict” between fetus and mother (placental invasion, hormonal struggles), referencing concepts like fetal/maternal microchimerism and the womb as a containment system rather than a purely nurturing cradle.
  • Some note microchimerism (fetal cells in the mother’s body and vice versa) is common and may even be protective in some diseases, though causality is unclear.

Heredity, infertility, and long‑term implications

  • MRKH and some male-factor infertility causes treated by ICSI are noted as heritable. Commenters speculate this might increase genetic infertility in the population while simultaneously making us more dependent on assisted reproduction—though others observe that “science cancels this out” by enabling those births in the first place.

Legal parentage and ownership questions

  • Clarifications that the womb donor’s genetics don’t determine the baby’s DNA; the egg and sperm do.
  • In UK law, the person who gives birth is the legal mother, which would apply even with a transplanted uterus.

“Miracle” vs achievement

  • Some push back on describing the event as a “miracle,” arguing it should be framed as a hard‑won scientific and medical achievement rather than something supernatural.

This 'College Protester' Isn't Real. It's an AI-Powered Undercover Bot for Cops

Traditional infiltration vs AI escalation

  • Several point out that infiltration and provocation in protest movements predate AI; activists have long been warned to distrust newcomers urging illegal acts.
  • Others argue AI is a qualitative escalation: same tactic, but cheaper, faster, and massively scalable, so the risk and “chilling effect” are greater.

Entrapment, radicalization, and legality

  • Many see this as “automated entrapment,” directly conflicting with US case law that government cannot induce crime and then prosecute it.
  • Commenters cite existing FBI stings where informants nudged vulnerable people into terror plots, arguing AI just industrializes an already-abused pattern.
  • A minority defend such tactics if they catch people “easily convinced” to commit atrocities, while opponents stress due process, the “fruit of the poisonous tree,” and how such logic erodes civil rights.

Bots that hunt bots and institutional incentives

  • People joke and speculate about AI personas increasingly talking to other AI personas, generating fake radicals, fake plots, and “self‑licking ice cream cones” that justify budgets.
  • Cynical takes emphasize KPIs and political incentives: if programs are judged on arrests, they are pressured to radicalize targets rather than de‑escalate.

Impact on online spaces and ‘dead internet’

  • The presence of law‑enforcement personas on Reddit/4chan is linked to “dead internet theory” (bots filling public forums). Many see this as confirmation that large portions of online discourse are synthetic.
  • Some foresee a feedback loop: AI agents posing as extremists contribute to radicalization in open communities, not just detect it.

Style, realism, and targeting

  • The example pimp/sex‑worker dialogue is widely mocked as cartoonish and stereotyped; speculation that training data comes from “the dumb ones who got caught” and that corny personas mainly impress purchasing managers, not real criminals.
  • Worry that lonely, mentally ill, or marginal people will be disproportionately engaged, nudged, and then punished.

Authentication and the future internet

  • A subthread imagines a “premium human‑only internet” with strong identity verification, but others note it would still be gamed, co‑opted by states, or resold by humans to bots, and risks becoming a dystopian “Torment Nexus” for surveillance.

OpenAI looked at buying Cursor creator before turning to Windsurf

Deal size, valuation, and founder outcomes

  • Commenters speculate wildly on price: rumors around $3B; others imagine $20B and debate whether OpenAI could even fund that in cash.
  • OpenAI’s $40B SoftBank round is noted as conditional and possibly only partly realized, raising doubts about its ability to pay large all‑cash sums.
  • Cursor is said to be valued at ~100x revenue; several see this as bubble territory, especially given heavy inference costs for “agentic” products.
  • Rough cap-table math: at a ~$3B exit post‑Series C, founders might personally clear hundreds of millions, especially if they already took secondaries.

“Agentic Software Engineer” claims and reality

  • The CFO’s pitch that an “A‑SWE” can build apps end‑to‑end (PRs, QA, docs) is widely viewed as hype or outright vaporware.
  • Skeptics point out OpenAI is still aggressively hiring engineers; if A‑SWE could truly replace SWE work, they’d dogfood it and publicize that.
  • Developers report that tools like Cursor/Claude Code are great helpers but unreliable on non‑trivial tasks, with compounding errors and no real causal understanding.
  • Some see them as the CAD of software engineering: hard to imagine working without them, but far from a replacement for expertise.

Can AI keep improving without human programmers?

  • Debate centers on whether AI can “keep coding” once it largely replaces human coders.
  • One side argues RL + tool use (compile/run/test) can create a self‑improvement loop, even from existing “recipe books” of code.
  • Others stress missing human judgment and goal alignment: AI can generate novel combinations, but not decide what’s useful to humans or discover entirely new paradigms.
  • Concerns about training on AI‑generated output (ouroboros problem) and the long‑term quality of knowledge.

IDE data as a flywheel vs. developers training their replacements

  • Several argue OpenAI’s investments in Cursor/Windsurf are about capturing real‑world coding interaction data to drive RL and automation.
  • Others question how much developers will tolerate their editor analytics being used to build tools meant to replace them; some foresee many doing it anyway due to incentives or employer pressure.
  • A “prisoner’s dilemma” narrative appears: teams that avoid AI risk losing to those that embrace it, even if everyone suspects it erodes job security.

Strategic logic (or irrational bubble?) of buying wrapper IDEs

  • Some see this as classic vertical integration: like breweries buying pubs, OpenAI would secure distribution and make its models the “default” in popular IDEs.
  • Comparisons are drawn to Facebook buying Instagram/WhatsApp and to default search engine deals in browsers.
  • Others think paying billions for VS Code forks with prompt UIs and no proprietary models is irrational “Yahoo 2.0” behavior and a sign OpenAI may be hitting architectural limits instead of achieving AGI.
  • There’s skepticism about OpenAI spreading into too many fronts (IDE tools, possible social media, etc.) and losing focus on core models.

Lock‑in, choice, and user reactions

  • Some users say they’ll cancel if OpenAI acquires Windsurf; others would welcome Windsurf bundled into ChatGPT Plus.
  • A key concern: whether an acquired IDE would still support Anthropic, Google, DeepSeek, etc., or become OpenAI‑only. Many currently use Cursor/Windsurf precisely to mix models.

Competition and alternatives

  • Commenters note strong open‑source or cheaper setups: Cline + DeepSeek, Aider + OpenRouter, Gemini 2.5 Pro in custom flows, Claude Code, and VS Code’s own new Agent mode.
  • Microsoft is seen as having the endgame power via VS Code; Google’s Firebase Studio / idx is mentioned as a potential 800‑pound gorilla if they double down.
  • JetBrains’ Junie and Windsurf-on‑JetBrains are noted but seen as less polished than Cursor today.

Developer experience and sentiment

  • Many enjoy the “magic” of agents wandering a codebase and acting like a very smart junior dev, increasing joy and enabling doc‑driven or exploratory workflows.
  • At the same time, there’s a dark undercurrent: people marvel at the tools while worrying that the “cute junior dev” may grow into their replacement.
  • Some see embracing these tools as pragmatic self‑preservation (learn to operate the machines); others call developer enthusiasm for their potential replacement “really, really dumb.”

TikTok is harming children at an industrial scale

Scope: TikTok vs “all social media”

  • Many argue TikTok is not uniquely harmful: Instagram Reels, YouTube Shorts, Snapchat, Facebook, X, Reddit, Discord, etc. are seen as running the same engagement-maximizing playbook.
  • Others push back on “whataboutism,” noting the article’s author has long criticized social media broadly and that targeting TikTok doesn’t imply US platforms are benign.
  • Some think singling out TikTok is politically driven; others say it makes sense to start with the platform that dominates youth attention.

Mechanisms of harm and what’s new

  • Core problem identified: infinite scroll + short-form video + algorithmic feeds tuned for engagement, not wellbeing.
  • Reported effects: diminished attention span, inability to tolerate boredom, difficulty with long-form reading, mental health issues (anxiety, depression, body dysmorphia), and compulsive use in both kids and adults.
  • Several see this as qualitatively different from TV, video games, or music: personalized feeds, ubiquity on phones, and dense dark patterns make it more like gambling or drugs.
  • Others say every generation has a “media panic” (TV, rock, D&D, games) and warn against overreacting, though some concede that this time the data on teen distress post‑2010 look more worrying.

Parental responsibility vs regulation

  • One camp: parents are primarily responsible; giving a child unsupervised access to TikTok/YouTube is likened to neglect, similar to leaving them with alcohol.
  • Counterpoint: individual parenting can’t solve peer effects and industrial-scale manipulation; “you can’t raise kids in a silo.”
  • Policy ideas floated: higher minimum ages for social media accounts, strict age verification, limits or taxes on algorithmic feeds, bans or throttling of infinite scroll, stronger privacy laws, and competition policy to weaken network-effect monopolies.
  • Others fear heavy-handed regulation, First Amendment conflicts, or “government as parent.”

Geopolitics and motives

  • Some see anti‑TikTok rhetoric as driven by national security: potential for Chinese state influence, data access, and covert coordination of crowds.
  • Others think the main driver is its refusal (relative to US platforms) to align with certain foreign-policy narratives (e.g., Palestine/Israel), or more generally as a trade‑war tool.
  • Several emphasize that US‑owned platforms already cause comparable social and political damage at home.

Coping tactics and alternative norms

  • Many parents in the thread describe strict regimes: no TikTok, banning YouTube entirely or Shorts only, whitelisting content via YouTube Kids, downloading videos and serving them offline, or using curated games and long-form shows instead of algorithmic feeds.
  • Practical tricks: disabling YouTube watch history to kill Shorts, using alternative frontends (Invidious, Jellyfin + yt‑dl), screen‑time rotation (e.g., only every second day), or limiting kids to specific non‑“dark pattern” games.
  • Several note that adults also struggle badly, deleting apps, installing blockers, or relying on Screen Time codes managed by partners.

Debate over evidence and “moral panic”

  • Some commenters think the social-science case against phones/social media is strong and that we’d be irresponsible to ignore it.
  • Others criticize the underlying research as methodologically weak or overconfident, and see a pattern of “boy who cried wolf” moral panics.
  • A recurring meta-critique: focusing solely on TikTok misses the structural issue—the ad-funded attention economy optimized to exploit human psychology at scale.

Encryption Is Not a Crime

Political efforts against encryption

  • Many comments focus on EU “chat control” and similar US efforts as recurring attempts to criminalize or weaken encryption, often exempting politicians and law enforcement themselves.
  • Motives are seen as a mix of “think of the children” and “tough on crime” messaging, which several describe as emotional, manipulative, and resistant to rational rebuttal.
  • Some note a surveillance‑industry lobby behind such laws, and connect this to broader systemic corruption and revolving‑door politics.

Tools, crime, and bad analogies

  • Participants compare banning or weakening encryption to banning air, wheels, roads, or houses because criminals use them, arguing encryption is a general‑purpose tool with both good and bad uses.
  • Others criticize oversimplified argument templates on both sides and warn against strawman analogies that ignore real harms.

Law enforcement access and backdoor schemes

  • A long subthread explores a “devil’s advocate” proposal: expiring, warrant‑based decryption certificates issued by vendors.
  • Critics argue any mechanism that lets a third party decrypt data is effectively a master key, vulnerable to abuse, leaks, coercion, and future authoritarian regimes.
  • Some stress that encryption doesn’t make investigations impossible, just less scalable and more work‑intensive; mass access to cleartext is framed as institutional laziness.
  • There is acknowledgement that surveillance has helped catch some terrorists, but several question effectiveness, trade‑offs, and lack of proper counterfactuals.

Trust, rights, and slippery slopes

  • A recurring theme is distrust of governments and police: even if “good” today, they may change, and powers granted are rarely rolled back.
  • Many see the right to try to keep secrets as foundational; making strong security itself suspicious or illegal is described as inherently tyrannical.
  • Some compare the call for backdoors to torture or prior eras of overbroad national‑security measures.

Nature and necessity of encryption

  • Commenters emphasize that modern internet usage (banking, authentication, messaging, commerce) depends on encryption; without it, routine accounts would be trivially compromised.
  • Others note encryption is not synonymous with privacy: metadata, client behavior, and policy/operational choices still matter greatly.
  • Several argue the public neither understands privacy nor sees where the fight over encryption is happening, making them susceptible to fear‑based arguments.

Toothpaste widely contaminated with lead and other metals, US research finds

Heavy Metals, Hypertension, and Chelation Therapy

  • One participant links idiopathic hypertension to cumulative heavy metal exposure and reports self-directed chelation and supplementation (e.g., selenium) improving blood pressure.
  • Others strongly warn that chelation is risky, should be reserved for confirmed poisoning, and is often pushed by “quack” practitioners as a cure-all.
  • There is disagreement over mainstream medicine: some see doctors as overly dogmatic, others emphasize the need for evidence and hospital-based expertise before using chelation.
  • A more technical commenter notes that blood tests may miss metals stored in tissues, and mentions protocols involving enzymes and EDTA, but this remains anecdotal and controversial in the thread.

How Contaminated Is Toothpaste, and Does It Matter?

  • Commenters highlight that most tested toothpastes were below current FDA lead limits (10,000 ppb for children’s products; 20,000 ppb for adults) but often above much lower proposed or state-level limits (e.g., 2–5 ppb in proposed baby-food standards; 1,000 ppb in Washington state).
  • Debate centers on whether “no safe level of lead” in principle means any detectable amount in toothpaste is unacceptable, versus a more risk-based view that small doses from a non-swallowed product are insignificant compared with other exposures.
  • Some stress bioaccumulation and total lifetime dose across all foods, water, supplements, and consumer products, arguing current standards don’t account for cumulative, multi-source exposure.

Credibility of the Testing and Potential Conflicts

  • Several comments scrutinize the blogger-led testing (Lead Safe Mama), noting:
    • Single source, activist orientation, and affiliate links to “safe” products as potential conflicts of interest.
    • Unclear methodological details and possible misuse or limitations of ICP‑MS in complex consumer products.
  • Others counter that independent testing must be funded somehow, affiliate links are common (e.g., Consumer Reports), and government isn’t filling this role.

Fluoride, Toothpaste Use, and Alternatives

  • Some users report avoiding toothpaste entirely, citing research that brushing itself provides most plaque removal; fresh toothbrushes are emphasized as more important than paste choice.
  • Others defend fluoride as beneficial and safe at typical levels and note that some low- or zero-metal toothpastes lack fluoride.
  • Pediatric concerns arise: children often swallow toothpaste, and newer guidance to avoid rinsing after brushing increases contact time, which makes lead findings feel more relevant to some parents.

An intro to DeepSeek's distributed file system

Workload and Motivation

  • 3FS is described as born in a high‑frequency trading context (2019) and repurposed for AI workloads.
  • Target workload: huge, mostly read‑heavy datasets, petabyte scale, many clients, extremely high random‑read throughput.
  • Some suggest ML workloads only really need capacity, parallel reads, and redundancy, not strong consistency; others strongly push back that “consistency is hard, so skip it” tends to end badly at scale.

Architecture and Performance Characteristics

  • Architecturally, it’s a scale‑out metadata filesystem (like Colossus, Tectonic, HopsFS, etc.) with metadata in a distributed DB (FoundationDB).
  • Key points people highlight:
    • NVMe + RDMA, optimized for huge batched random reads from a small set of large files.
    • FUSE client for convenience, but with a hybrid mode: open via FUSE, then use a native library for the data path to avoid FUSE overhead.
    • Very high random IOPS per node (tens of GiB/s, multi‑million 4K IOPS) reported; metadata ops (mdbench) not especially stellar.

Comparisons to Other Systems

  • ZFS: acknowledged as not scale‑out; can grow storage on one node but not aggregate multiple machines for parallel IO.
  • CephFS: praised for real‑world PB‑scale and used at large orgs; criticized as complex to run and relatively slow on modern NVMe without major tuning; some counter with recent Ceph benchmarks (TiB/s, multi‑million IOPS).
  • Alluxio, HopsFS, ObjectiveFS, JuiceFS, SeaweedFS:
    • Alluxio/others already have FUSE and tiered storage; 3FS’s differentiator is truly scale‑out metadata and RDMA‑centric design.
    • JuiceFS/S3‑backed designs trade much higher latency for simplicity and cheap capacity.
    • SeaweedFS focuses on tiny objects with minimal metadata; 3FS on huge files, chunked and read at very high random IO rates with POSIX access.

Operations, Cost, and Cloud Constraints

  • Running your own 3FS‑style cluster on AWS vs FSx Lustre: rough back‑of‑envelope puts it ~12–30% cheaper, but you now own all operational complexity.
  • Several comments note that any self‑run storage cluster (Ceph included) is an operational bear.
  • Complaints that public‑cloud NVMe throughput lags commodity on‑prem SSDs, affecting how replicable 3FS‑like performance is in the cloud.

Durability, Backup, and DR

  • Common pattern: rely on intra‑cluster replication for hardware failures; use snapshots and possibly separate datacenters for “fat‑finger” and disaster recovery.
  • Distinction between redundancy (for continuous operation) and backups (for rollback in time and catastrophic mistakes) is emphasized.
  • Techniques mentioned: cross‑region mirroring, nearline/snapshot tiers, and traditional tape at hyperscaler scale.

Security and Backdoor Debate

  • One subthread questions the odds that 3FS is backdoored.
  • Responses split:
    • Some say it’s low‑probability, especially if deployed on isolated networks.
    • Others argue supply‑chain and vendor backdoors are a very real, historically demonstrated risk, and that treating them as “odd” concerns undermines serious threat modeling.
  • Discussion touches on nation‑state involvement and the need for defense‑in‑depth even for “internal” infrastructure.

Other Questions and Speculation

  • Comparisons for homelab / small‑scale setups (JuiceFS+S3, SeaweedFS) focus on latency vs simplicity rather than raw performance.
  • Open questions raised (but not fully resolved) about:
    • How capacity expansion is handled in practice.
    • What happens on metadata manager failures and what redundancy model is used.
  • One commenter wonders if this kind of FS makes large, CPU+NVMe‑based distributed LLM inference/training more viable, but no concrete performance analysis is provided.

Discord's face scanning age checks 'start of a bigger shift'

Accuracy and Bias of Face-Based Age Checks

  • Many doubt AI can reliably distinguish, say, 17y11m from 18, or handle young‑looking adults, early or delayed puberty, and medically or hormonally atypical users.
  • Examples include adults routinely mistaken for teens and teens who look much older, plus reported failures of existing KYC face systems.
  • Concerns about racial bias and lighting (e.g. Black users needing many more attempts) and about trans users or people on puberty blockers being misclassified.
  • Commenters note edge cases aren’t rare, so false negatives could be common and hard to appeal.

Privacy, Biometrics, and Surveillance Fears

  • Strong worry that “we don’t store your face” is a semantic dodge: embeddings or “biometric metadata” can still uniquely identify people and be leaked, sold, or subpoenaed.
  • Many see this as normalization of biometric collection and the erosion of online anonymity, with parallels drawn to RealID, SIM registration, and face‑scanning borders.
  • Some fear a trajectory toward mandatory real‑ID for all internet use, centralized databases exploitable for blackmail or targeting minorities, and a broader “compliance‑industrial complex.”

Parents vs State: Who Should Protect Kids?

  • One camp says this is parental responsibility; laws are overreach and a power grab disguised as child protection.
  • Others argue parenting alone is unrealistic: social ostracism if kids are kept off platforms, widespread harms from algorithmic feeds, and analogies to age limits on alcohol, cigarettes, porn, and driving.
  • There’s tension between wanting to shield kids from porn and social‑media harms and not accepting mass ID checks or biometrics as the price.

Effectiveness and Workarounds

  • Many predict trivial circumvention: VPNs, older friends’ faces, stolen or shared IDs, AI‑generated faces, or moving to less‑regulated chat systems.
  • That leads some to label this “security theater” that mainly increases data collection while pushing kids to darker, less moderated corners of the net.

Legal and Structural Concerns

  • Commenters mention UK, Australian, US state laws and court cases as part of a broader, messy legal push on age verification that may be designed to be impossible to fully comply with.
  • Some small service operators plan to geoblock the UK rather than implement complex checks, expecting this might eventually force policy rollback.

Proposed Technical Alternatives

  • Ideas floated: device‑local age estimation with attestation tokens, bank/government‑issued verifiable credentials (e.g. OpenID‑based), national e‑ID systems, or simple content‑rating headers plus device/ISP filters.
  • Critics respond that coordination, incentives, issuer trust, and eventual misuse (for broader discrimination and tracking) make these “clean” crypto solutions fragile in practice.

Impact on Platforms, Users, and Society

  • Some see this as accelerating a shift off Discord (especially for open‑source projects) and entrenching big incumbents and specialized compliance vendors.
  • Others emphasize collateral damage: cutting abused, queer, or isolated teens off from vital online support; excluding people who can’t easily be verified; and further normalizing pervasive identity checks online.

mIRC 7.81

New release and ongoing development

  • Several commenters are surprised mIRC is still actively developed; 7.81 (April 9, 2025) is noted as a milestone for ~30‑year‑old, largely solo‑maintained software.
  • Some confusion stems from the main site not clearly dating the front‑page news; multiple people argue the HN post should have linked directly to the news page.

Platform, licensing, and business model

  • mIRC is still proprietary and Windows‑only; some Linux/macOS users mention WINE as a workaround and gripe about ARM Macs.
  • A long subthread revisits the “lifetime license” controversy:
    • One side says early “lifetime” licenses were effectively capped at ~10 years and that this feels like a broken promise.
    • Others report old licenses (2010 and even earlier) still working and note archived FAQs that asked old users to re‑register if they could, or email for a free renewal.
    • It’s unclear what the current policy is; some say the stricter approach has been quietly softened.
  • A few people speculate mIRC likely was, or is, a multi‑million‑dollar business, but this is based on filings and guesswork, not detailed discussion.

mIRC scripting and learning to program

  • Many reminisce that mIRC scripting was their first real programming environment: bots, trivia games, auto‑responses, custom dialogs, even full GUIs and Win32 API hacks.
  • The immediacy (“my friends can use this right now”) is contrasted with more abstract “hello world” learning.
  • People compare today’s equivalents (Roblox scripting, Discord bots) but note higher friction and less openness than raw IRC.

IRC vs Discord, forums, and modern platforms

  • Views on IRC’s health diverge: some call it a “wasteland,” others say tech/science channels and certain networks are still solid.
  • Discord is seen as the de facto replacement for group chat but criticized as a silo, poor archive, and bad substitute for forums.
  • Large tangent on vBulletin‑style forums vs Reddit/HN:
    • Pro‑forum: better long‑term organization, stronger sense of community, no karma‑driven “hivemind,” good for work and niche hobbies.
    • Anti‑forum: huge threads are hard to mine; modern threaded + voting systems surface relevance better.
    • Several note how votes become de facto agreement signals and can suppress unpopular but accurate content; ideas like AI‑based scoring are floated.

Alternative IRC clients and ecosystem

  • For non‑Windows users, HexChat is suggested as a “spiritual successor,” though it is now explicitly abandoned and depends on community patches.
  • Halloy (Rust + iced GUI) is highlighted; some push back on the trend of “X but in Rust” rewrites.
  • Other clients mentioned include irssi, WeeChat, and historic ones like amIRC and KVIRC; one point notes mIRC as having strong IRCv3 support.

Nostalgia, warez, and culture

  • Many share memories: school IRC servers, town‑specific channels, the mIRC connection sound, About‑box easter eggs, scripting “AI” bots, and custom scripts like NoNameScript/ircN.
  • Several recount using mIRC for MP3 and warez trading (DCC, FTP trading rings), early broadband excess, and university or law‑enforcement encounters from that era.
  • There’s a sense that early IRC + forums culture fostered deeper, less gamified conversation than much of today’s social media.

As 'Bot' Students Continue to Flood In, Community Colleges Struggle to Respond

How the scam works

  • Several commenters clarify that aid isn’t only tuition: Pell grants, loans, and other packages often include living-expense money beyond what the college charges.
  • Excess funds, after tuition/fees, are refunded to the student’s bank account; scammers exploit this by creating fake identities, enrolling in multiple online classes, doing minimal AI-generated work for a few weeks, then cashing out.
  • Some aid is not strictly mediated by the college’s bursar, further widening attack surface.
  • One community college professor describes 10–50% of students in some online sections being “fake,” with telltale boilerplate posts and mismatched contact info.

Online vs in‑person education

  • One camp argues the fix is to stop or sharply limit online classes, claiming online quality is worse, cheating is rampant, and community college should be a “grind” that certifies real learning.
  • Others counter that online and remote formats are essential for: working adults, parents, people in conservative/controlling homes, disabled or ill students, and those far from campus. For many, the alternative isn’t in‑person school; it’s no school.
  • Experiences with online programs vary: some report high engagement and solid learning (e.g., online master’s), others say even well-designed courses still feel weaker than in-person.

Financial aid, incentives, and fairness

  • Critics say California is effectively “paying people to attend online community college,” creating predictable fraud and burdening taxpayers, including non-college-goers.
  • Supporters argue that modest living-support aid is necessary so low‑income students don’t need full‑time work, and that societal returns (better jobs, higher taxes, less social-service use) justify subsidies.
  • There is debate over “skin in the game”: some claim paying nothing reduces commitment; others note plenty succeed without debt and that free K–12 is already accepted.
  • One figure cited: this fraud is about 0.3% of total state student aid, suggesting it’s sizable but not system-dominating.

Verification and proposed fixes

  • Suggested countermeasures include: mandatory in-person orientation or first-week attendance for aid recipients; random or repeated ID checks; tying aid to demonstrated participation; paying landlords/booksellers directly; or limiting first-time online-only enrollment.
  • Critics of in-person requirements warn this can exclude exactly the populations aid is meant to help.
  • Commenters note colleges are starting to use third-party ID verification services, but AI and global connectivity make “Sybil attacks” on aid programs much easier.

Broader concerns

  • Some see this as one instance of a wider “post-truth” era where distinguishing real from fake (students, work, identities) is increasingly hard, and where both access and integrity are in tension.

Which year: guess which year each photo was taken

Overall reception & gameplay

  • Widely described as very fun and addictive; many say they’ll add it to their daily “-dle” rotation.
  • Players post scores and average years off; many land in the 2–10 year range, some as high as ~14 years off, a few near-perfect.
  • People enjoy the satisfaction of “just knowing” from subtle cues, not only from recognizing famous events.

Strategies and difficulty

  • Common heuristics: clothing, hairstyles, film/print quality, presence/absence and type of phones, smoking indoors, car/architecture styles, and event context.
  • Several rounds hinge on recognizable events (Arab Spring, London Blitz, gay marriage protests, disco era), making precise dating easier for history buffs.
  • Black‑and‑white early‑20th‑century images, especially beach/swimsuit photos, are consistently the hardest and can throw guesses off by decades.

Design, UX, and mobile issues

  • UI is praised as polished and more pleasant than some predecessors; the end-of-game global score distribution is a standout feature.
  • Complaints: laggy year slider on some iOS devices, difficulty zooming on Firefox/Android, and unintuitive full-image close (no Escape key support).
  • Share output is considered cluttered (too many metrics) and the emojis for per-photo accuracy are confusing; the “blind person” emoji is specifically called out as a poor choice.

Daily format & feature requests

  • Current mode is a single 5‑photo daily challenge. Some appreciate the wordle-style cadence; others find “come back tomorrow” frustrating and want freeplay/grind modes and multiplayer.
  • Requests include clickable logo to return home, clear “play again” or “next day” cues, per‑photo distributions, and better share text (clickable URL, different wording).

Use of AI and data concerns

  • Several users test frontier models (o3, GPT‑4o), which nearly ace the game; debate ensues over memorization (training on the same web photos) vs genuine visual reasoning.
  • Some speculate games like this could double as labeling interfaces for training “when-was-this-taken” models; others note the underlying archive already has dates.

Photo selection, history, and culture

  • Mixed feedback on very old photos: some find them frustrating and want fewer; others say they’re the most fun and want them kept, especially since they’re scored more leniently.
  • Some non‑US players note difficulty when events are strongly US‑centric.
  • Multiple commenters observe that fashion appears to have changed less since the 2000s (“stuck culture”), making recent years harder to distinguish than mid‑20th‑century decades.

Comparisons & related games

  • Frequently compared to chronophoto.app (same core idea but this has nicer UX/daily structure) and to timeguessr/WhenTaken, which also ask for location.
  • A few users link similar chronoguesing and ethnicity‑guessing games as adjacent curiosities.

Bugs and minor issues

  • Reported issues: stats page double‑counting a single game, minimum “top 2%” display, timezone confusion around when the new daily puzzle unlocks, and share dates not matching the puzzle’s actual day.

US Government threatens Harvard with foreign student ban

Blame, Responsibility, and Protests

  • One axis of debate is whether anger should focus on Trump/Republicans in office or on the voters who put them there.
  • Some argue Trump is “a symptom, not the disease”: Republican voters, often consuming partisan media, are ultimately responsible.
  • Others stress individual responsibility over “brainwashing,” while a counterview emphasizes the overwhelming power of corporate and social-media propaganda.
  • There’s disagreement on efficacy of protests: some call them pointless in an increasingly autocratic culture; others say they signal resistance to officials, voters, and non‑voters and are a key part of a political “ecosystem.”

Authoritarian Drift and Use of State Power

  • Many see the Harvard threats (funding, tax status, foreign student visas) as classic dictatorship tactics: coercing institutions into ideological submission and punishing disobedience.
  • Commenters link this with visa cancellations, proposed renditions to foreign prisons, targeting law firms, corporations, media, and the military—interpreting it as a broad project to dismantle rival power centers.
  • Several note the Supreme Court’s presidential immunity ruling and the replacement of experienced officials with loyalists as critical enablers; Trump 2.0 is viewed as more prepared, vengeful, and unconstrained than in his first term.
  • Comparisons to historical authoritarian regimes (Hitler, Putin) are contested but recur; some think such analogies are premature, others say waiting for mass atrocities is exactly how societies sleepwalk into them.

Universities, Harvard, and Foreign Students

  • Harvard’s role divides commenters: some see it as a key research and medical institution whose defunding harms the country; others say it’s an exclusivist brand that is not “noble” and already mired in racial politics.
  • There is debate over race-conscious programs and affinity events under civil-rights law, with opposing readings of whether they constitute illegal discrimination.
  • On foreign students, some think the threat is bluster or that fewer people want to come anyway; others cite high international demand (India, Australia) and note Harvard’s large foreign share and need-blind policies.
  • Several foreign-educated participants now advise students not to study in the US, citing visa precarity, xenophobic targeting, and safety concerns.

Culture War, Media, and Identity Politics

  • Right-wing support is variously attributed to economic anxiety, identity politics, or deep resentment of “coastal elites” and perceived cultural marginalization.
  • Others insist these are still “material conditions” (status, class, geography) and point to long-running information warfare and partisan media ecosystems.
  • Disputes over “cancel culture,” DEI, and trans athletes are framed by some as core moral battles, by others as distractions compared to institutional collapse.
  • A recurring worry is that both left and right are eroding liberal norms, but with one side now openly embracing authoritarian methods.

America’s Trajectory and Constitutional Design

  • Several trace today’s crisis back to post‑9/11 expansions of executive power, AUMFs, torture, and the security state under both parties.
  • The US presidential system is criticized as too executive‑heavy; some contrast it with parliamentary systems where leaders are more easily removed.
  • Others argue the system was meant to restrain presidents, but Congress and courts have progressively abdicated, letting emergency powers and military authority be abused.
  • Federalism, state National Guards, and a heavily armed populace are seen by some as remaining checks; others warn these factors could just as easily fuel internal conflict.

International Perceptions and Personal Choices

  • Non‑US commenters describe the US as sliding toward “banana republic” or “age of darkness,” while acknowledging its enduring tech, scientific and financial dominance.
  • There’s tension between seeing the decline as driven by capitalism and inequality versus identity backlash and culture war.
  • Some former Trump‑neutral or even sympathetic voices openly recant, saying the “Rubicon” was crossed with extrajudicial renditions and direct attacks on universities and courts.

HN Meta-Discussion (Flagging & Politics)

  • A long subthread debates why this and similar political posts get flagged or downranked on HN.
  • Explanations range from user fatigue and anti‑politics norms to claims of ideological suppression.
  • Moderators reiterate that HN is not a current‑affairs site, political topics already get large threads, and front-page space is intentionally limited and curated against repetition.

Advanced Shell Scripting with Bash (2006) [pdf]

Access to the material and updates

  • Original 2006 slides are still available (HTTP and archive); confusion arose from lack of HTTPS.
  • A new 2025 talk, “Seat Belts and Airbags for bash,” with updated slides and an 87‑minute video is linked.
  • The same author maintains a stringent.sh library used in the newer talk, available on GitHub.

Safer Bash scripting practices

  • The slides and newer talk focus on avoiding Bash pitfalls and building “production‑quality” scripts rather than teaching basic syntax.
  • People highlight set -e/errexit, pipefail, and especially trapping ERR with LINENO for stack‑trace‑like debugging.
  • Greg’s Bash wiki and ShellCheck are repeatedly recommended as core resources for learning good patterns and avoiding common mistakes.
  • There is interest in reference variables as a safer alternative to eval, and in potentially expanding material to cover debugging and use with sudo.

Anti‑patterns and the limits of Bash

  • Several commenters argue that “advanced” Bash is usually a bad idea; the main skill is knowing when to stop and switch languages.
  • A notorious pattern buggy_command || : is called out as effectively “a penny in the fusebox,” hiding failures in deployment scripts.
  • Some stress that complex parameter expansion (${var##pattern}, deep nesting) quickly becomes unreadable and unmaintainable.

Alternatives to Bash for scripting

  • Many share “replacement” or “escape hatch” languages: Python, Ruby, Perl, Raku, Lua (and LuaJIT), awk/gawk, Guile, QuickJS‑based JS, zx, xonsh, nushell, Elvish, Murex, Oil, NGS, schemesh.
  • Tradeoffs discussed include startup cost, availability on target systems, standard library richness, subprocess ergonomics, typing, and learning curve.
  • Views differ on stringly‑typed languages (Bash, Tcl, Perl): some see them as inherently fragile; others defend Perl and modern Tcl as more capable than caricature suggests.

What shells are really for

  • Several comments frame Bash primarily as a “subprocess orchestration language” whose superpower is piping and job control, not rich data structures.
  • Guidelines emerge: use Bash for simple glue around existing tools and environment setup; use a general‑purpose language once you need complex flow, data structures, or nontrivial text/structured‑data processing.
  • A linked parable (“Emperor Sh and the Traveller”) and personal practices reinforce the idea that good shell scripts wrap existing tools rather than re‑implement them.

“Most promising signs yet” of alien life on a planet beyond our Solar System

Reported Finding on K2-18b

  • JWST spectra of K2‑18b (a cool, likely ocean-bearing exoplanet) show methane and CO₂ plus a tentative signal of dimethyl sulfide (DMS) and dimethyl disulfide (DMDS), gases that on Earth are strongly associated with marine life.
  • The DMS/DMDS detection is currently at ~3‑sigma significance (≈0.3% chance of being noise), below the ~5‑sigma bar usually expected for a “discovery.”
  • The planet’s hydrogen‑rich atmosphere and position in the habitable zone make liquid water and some form of chemistry-rich environment plausible, but its conditions are very unlike Earth’s.

Statistical and Methodological Skepticism

  • Multiple comments stress that 3‑sigma is not “very low” false-positive risk and could be improved only with more observation time or better instruments.
  • One detailed critique argues possible “p‑hacking”: fitting a weak spectrum against a small, handpicked set of candidate molecules (including speculative biosignatures), while ignoring a much larger space of plausible infrared‑active gases.
  • Others reply that early, somewhat noisy detections are acceptable as hypothesis generators, provided follow‑up work is done and caveats are clear.

Abiotic DMS and Biosignature Ambiguity

  • Several links point to detections of DMS in comets and the interstellar medium and to work arguing for efficient abiotic production, undermining “only from life” claims.
  • Counterpoints note that sustaining ppm–level DMS/DMDS in a large atmosphere may still be hard to explain without biology, especially without abundant H₂S, but this remains unsettled.
  • Many emphasize the need for multiple independent biomarkers and much better lab data on cross‑sections and abiotic pathways.

Media, Hype, and Scientific Communication

  • Strong criticism of headlines that drop qualifiers like “promising signs” and of press outreach that leans into “ALIENS?!” while the paper itself is careful and tentative.
  • Some argue sensational coverage erodes trust; others say it at least gets people to read about real science.

Broader Context: Life, Fermi, and Travel

  • Long side discussions cover: life vs intelligent life rarity, the Great Filter, dark‑forest vs cooperation scenarios, and whether quiet skies imply short‑lived civilizations.
  • Many note that even nearby exoplanets are unimaginably far (hundreds of trillions of km), making visits effectively impossible with foreseeable propulsion, so atmospheric spectroscopy may be our main tool for a long time.

The Halting Problem is a terrible example of NP-Harder

Halting problem, finite machines, and “fantasy” models

  • Some argue that on a finite-state machine the halting problem is decidable: after at most 2ⁿ steps you either halt or revisit a state and thus loop forever.
  • Others respond this misses the classical halting problem, which assumes unbounded program size and unbounded memory (Turing machines), not fixed finite hardware.
  • It’s noted that physical machines can be modeled with I/O and external storage to approximate “unbounded” memory, and that tracking the full state space is astronomically impractical even if finite.
  • This leads to the broader point: many impossibility results use infinite or asymptotic assumptions, but still map to “no reasonable way to do this” in practice.

Usefulness and limits of Big-O in the real world

  • One subthread debates whether Big-O is “almost useless” for real-world problems because constants and small N dominate.
  • Counterarguments: Big-O is crucial for reasoning about scalability and for insights like hybrid sorts (quicksort + insertion sort) and algorithm choice.
  • Critics emphasize that empirical benchmarks and more detailed cost models (cache, memory layout, constants) are needed beyond pure asymptotics.

NP, NP-hard, NP-complete, and beyond

  • Several comments clarify:
    • NP-complete = NP ∩ NP-hard.
    • NP-hard problems may lie outside NP (e.g., not polynomially verifiable).
    • Membership in NP is about ease of verification, NP-hardness about difficulty of solving.
  • There’s discussion of HALT as RE-complete and “bigger” than NP, and of the time hierarchy theorem and polynomial hierarchy as more precise frameworks than just invoking halting.

Vector Addition Systems / Diophantine reachability as “NP-harder”

  • The article’s grid/jump problem is identified as Vector Addition System (VAS) reachability, equivalent to Petri nets.
  • Key property: shortest witnesses can be Ackermann-scale long, far beyond any polynomial in input size, so even verifying a “path” certificate is not polynomial in the original input. Hence it’s decidable and NP-hard but not in NP.
  • Some readers struggle with decision vs search formulations and with separating “long outputs” from genuine super-polynomial verification cost.

Approximate halting and practical complexity

  • A side discussion covers partial “halting oracles” (time-bounded or problem-restricted analyses), genetic programming with cutoffs, and heuristic solvers.
  • Consensus: such methods don’t evade the fundamental theorems; they exploit that many real instances are easy while the worst cases remain intractable.

US judge finds administration wilfully defied court order in deportation flights

Rule of Law vs. Constitutional Crisis

  • Many argue the administration’s defiance of the deportation order shows the US is effectively “lawless,” with courts unable to restrain executive power in practice.
  • Others say it’s serious but not yet a full constitutional crisis: courts are still issuing orders and contempt findings; a true crisis would be systematic noncompliance or ignoring a clear Supreme Court ruling.
  • Several see this as part of a longer slide: precedents like pardoning contempt of court are framed as proof the president can nullify judicial checks.

Courts, Contempt, and Pardons

  • Lawyers in the thread highlight a key pressure point: if officials are held in criminal contempt and then pardoned, judicial authority is effectively gutted.
  • Arpaio’s pardon is cited as a prior “proof of concept”; disagreement over whether that already constituted a constitutional crisis.
  • Debate over presidential pardon power: some see it as a dangerous contradiction of separation of powers; others note its intended use as a humanitarian safety valve, albeit vulnerable to abuse.

Enforcement, the Military, and “Who Has the Guns”

  • Skepticism that any order against senior officials would be enforced, since the executive controls federal law enforcement.
  • Discussion turns to whether the military would obey unconstitutional orders against citizens; some believe the oath to the Constitution would hold, others fear politicization of the officer corps and “civil war 2.0” scenarios.

Public Response and Political Culture

  • Multiple comments criticize US public complacency compared to mass protests and strikes in Europe or Ukraine’s Maidan, arguing that online outrage without sustained action changes little.
  • Others counter that sizable protests are happening but lack organizing infrastructure for general strikes; current activism is seen as groundwork for that.

Immigrants’ Rights as Everyone’s Rights

  • Strong concern that if habeas corpus and due process can be ignored for a documented migrant, the precedent can extend to citizens, corporations, and political opponents.
  • Some note that support for harsh measures is high while targets are immigrants; warnings that “it won’t stop there” are common.

System Design and Structural Limits

  • Discussion of the founding framework: one branch controls the military; no system can fully “design around” a mad or authoritarian executive.
  • Some argue the aged US constitutional order hasn’t been updated like other countries’ and is now colliding with modern realities (instant communication, mass surveillance).