Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 358 of 364

Italy demands Google poison DNS under strict Piracy Shield law

Technical discussion: DNS blocking and workarounds

  • Several comments note that DNS poisoning is usually done at ISP level; switching resolvers can bypass it.
  • DoH is said to help mainly by:
    • Hiding DNS queries inside HTTPS from local MITM censors.
    • Making it easy to use non-default, foreign resolvers (possibly over Tor or proxies).
  • Objection: if the resolver itself (e.g., Google) is compelled to lie, DoH alone doesn’t help; you need an uncooperative foreign resolver.
  • DNSSEC is described as providing authenticity and detectability of tampering, but not guaranteed access to uncensored records.
  • Some argue the only robust path is using resolvers in jurisdictions with no leverage or using VPNs; governments will then push to control browser defaults.

Jurisdiction and enforcement against Google/Cloudflare

  • Debate over how Italy can fine or coerce companies with no staff or hardware in-country.
  • Arguments for leverage:
    • Blocking their IPs nationally, hurting third-party services that rely on them.
    • Targeting domestic customers’ payments or bank accounts.
    • Using EU-wide legal frameworks for cross-border business.
  • Others argue: if a company is willing to abandon the market, practical enforcement becomes hard, similar to ignoring tickets in a foreign country.

Censorship, legality, and what should be blocked

  • One side: any “arbitrary restrictions” on content undermine the internet; corporations should resist.
  • Counterpoint: states must be able to block things like child sexual abuse material and possibly drug markets or destabilizing disinformation; deciding “non-arbitrary” limits should be the job of governments, not US tech firms.
  • Follow-on debate:
    • Some are strongly anti-state-intervention in general (“nanny state” criticism).
    • Others accept targeted blocking but see DNS poisoning as a poor or symbolic tool that doesn’t address root causes.

Sports piracy and copyright economics

  • Sports leagues are seen by some as a major driver of European censorship pressure.
  • One camp: re-broadcasters and users clearly violate the law and often monetize it; courts need “creative” tools when hosts sit in uncooperative jurisdictions.
  • Opposing view: this is driven by greed and broken licensing:
    • “Piracy as a service problem” — multiple subscriptions, regional blocks, rising prices, partial catalogs, and ads push people to pirate IPTV.
    • Streaming platforms are said to optimize revenue right up to the point where users churn, structurally incentivizing bad user experiences.
  • Disagreement over whether people primarily pirate to save money or because the legal UX is so bad.

Europe vs US and democratic responsibility

  • Some criticize “Europe” as regulation-obsessed and hostile to innovation; others stress this is specifically Italian (or specific EU states), not all of Europe.
  • Counter-critique: the US also shapes a non–free internet (DMCA, payment choke-points, TikTok ban debates, Operation Choke Point, FOSTA/SESTA).
  • Discussion whether citizens in democracies bear collective responsibility for such laws, with examples drawn from both EU and US politics.

Decentralizing DNS

  • One thread calls for urgent DNS decentralization, possibly using blockchain (e.g., Namecoin-style) to avoid state choke points.
  • Pushback:
    • DNS already has distributed elements, but the root and TLDs are central and that shared global view is valuable.
    • Fully divergent, user-specific DNS views would harm interoperability.
  • A more moderate suggestion is public, iterable TLD zone publication and users running their own authoritative/root mirrors; censorship would then be bypassed mainly via alternative infrastructures (or VPNs), not a full reinvention of DNS.

NixOS and reproducible builds could have detected the xz backdoor

Role of NixOS and reproducible builds

  • Several commenters stress that NixOS and reproducible builds did not detect the xz backdoor; NixOS actually shipped the malicious xz, though the payload didn’t trigger there.
  • The blog post is seen as “how Nix could be improved” rather than evidence that it already protects against such attacks.
  • Core idea: if Nix could fully rebuild xz from its VCS source during bootstrap, it would have noticed the tarball differed from the repository.
  • Others note this is not unique to Nix; any distro (Debian, RPM-based, etc.) can build from VCS and already works on reproducible builds.

Nature of the xz attack

  • The backdoor lived only in the release tarball, not in the corresponding git commit.
  • Build scripts enabled the malicious code only when detecting Debian/Fedora-like build environments; this avoided non-reproducibility in ecosystems where it might be noticed.
  • NixOS was unaffected operationally mainly because it wasn’t targeted (and also due to its different filesystem layout), not because the attacker couldn’t have supported it.

Human and process factors

  • Multiple comments emphasize this was a “meatspace” exploit: social engineering and maintainer burnout, not a pure technical bug.
  • Conclusion: no technical framework (including Nix) can be a “security cure‑all” while humans control review and approval.

Sandboxing and least privilege

  • Some argue Nix/Guix-style ephemeral containers or fine-grained sandboxes for every process would mitigate many supply-chain and library compromises.
  • Others counter that current Linux sandbox mechanisms (Flatpak, Snap, etc.) often break workflows and create poor UX; users then seek insecure workarounds.
  • There’s interest in macOS/iOS-style permission prompts and better UIs for per-app or per-shell isolation.

Bootstrapping and dependency tangles

  • The article’s note that autoconf “depends on xz” draws criticism; people question why a build system tool should rely on a compression utility so deep in the stack.
  • Explanation: in Nixpkgs, xz is part of the standard build environment and autoconf tarballs are distributed as .tar.xz, creating awkward circular bootstrapping issues.

Debate over claims and generality of solutions

  • Some see the article as overfitting to a single incident and argue a determined attacker could adapt to any such defense.
  • Repeated point: “a slightly improved version of any OS” could have caught this, not just Nix.
  • Others still find value in the analysis as a concrete proposal for better bootstrap and artifact-verification practices across ecosystems.

The polar vortex is hitting the brakes

Forecast & status of the polar vortex event

  • Some asked whether the forecasted stratospheric wind reversal actually occurred; one commenter checked reanalysis/visualization data and confirmed a reversal consistent with the article’s figures.
  • Others wondered why there hadn’t been follow‑up posts, speculating about layoffs or political pressure on NOAA; another pointed out the blog is roughly weekly and not an official communication channel.

NOAA, science agencies, and politics

  • Strong concern that the current administration aims to weaken or even eliminate NOAA and other science agencies (NSF, NIH, DOE, IRS), with references to policy documents describing NOAA as part of a “climate alarm” industry.
  • Debate over recent cuts: weather balloons reduced from two launches per day to one at many sites; some say that’s a serious degradation of observations, others downplay the impact.
  • Broader argument over whether office closures and firings are real service cuts or media exaggeration, with disagreements about journalistic bias and social‑media reports from affected staff.
  • Fears that dismantling public science benefits large corporations short‑term; others counter that many industries critically depend on federal science (NOAA, USGS, NIH).

Climate change impacts and societal risk

  • Discussion of long‑term warming, multi‑meter sea‑level rise, and loss of coastal cities; estimates of ultimate rise range from ~10 m to ~90 m over long timescales.
  • Debate on whether “organized human life” could collapse: scenarios include infrastructure loss, extreme weather, drought, food and water crises, and mass migration from equatorial regions with lethal wet‑bulb temperatures.
  • Most see human extinction as unlikely but large‑scale disruption, conflict, and refugee flows as plausible.

Energy solutions: nuclear vs renewables

  • One thread links governments’ growing climate concern to renewed interest in nuclear and enhanced geothermal; others question why that would displace solar/wind.
  • Pro‑nuclear arguments: reliable baseload, small land footprint, known technical solutions for waste (deep storage or reprocessing), and very low deaths per unit energy compared with fossil fuels.
  • Skeptics emphasize long‑term waste hazards, legacy contamination sites, accident risk, high cost and slow build‑out, and argue that renewables plus storage are already on a faster cost/scale trajectory.
  • Data points: China aggressively building both nuclear and renewables, but wind/solar additions far outpace nuclear in nameplate capacity; counter‑arguments note capacity factors and unresolved seasonal storage.
  • Some suggest the practical path is “all of the above” with rapid deployment of any low‑carbon option rather than technology tribalism.

Trust in government science & public research

  • Mixed views on government scientific credibility: examples of both failure (food pyramid, forest management) and success (accurate weather forecasting, aviation safety).
  • Contentious subthread on NIH: some cite poor reproducibility of academic biomedical results and question its value to pharma; others argue public basic research underpins talent, knowledge infrastructure, and transformative breakthroughs (e.g., mRNA vaccines), even if many individual studies don’t commercialize.

Temperature units debate

  • Several criticize use of Fahrenheit in a climate blog as outdated; defenders say Fahrenheit better matches everyday human experience and gives finer “whole‑number” resolution around comfort ranges.
  • Others stress that scientific work uses SI (Kelvin/Celsius) regardless of how outreach is written, and unit snobbery is viewed by some as unhelpful “I’m smarter than you” signaling.

Explaining “fake spring” and seasonal context

  • One commenter ties “fake spring” to the typical late‑winter collapse of the polar vortex: warming triggers vortex disruption, sending one last pulse of Arctic air south after an early warm spell.
  • Clarification of “warmer part of the year”: even during a March cold outbreak, higher sun angle, longer days, and warmer ground/buildings mean similar Arctic air usually feels less severe than in January.

Most AI value will come from broad automation, not from R & D

Emotional response to techno‑optimism

  • Many describe current AI/tech optimism as depressing or dystopian: it feels like hype detached from tangible social benefit and mostly about cost-cutting and surveillance.
  • Others argue tech progress is historically net-positive, but concede that in the short/medium term it often worsens inequality and can feel like “snake oil” (crypto comparisons come up).

Who benefits from automation and AI?

  • Strong concern that AI/automation will magnify wealth concentration: more output with fewer workers, higher profits, soaring asset prices (especially housing), and no built‑in mechanism to share gains.
  • Counterpoint: productivity gains have historically raised median living standards (more goods, better health), even while inequality rose; both can be true at once.
  • Several foresee “neo‑feudalism”: corporations owning robots, land, food, housing, and even breathable air, with most people as precarious tenants/consumers.

Work, jobs, and automation in practice

  • Concrete impacts already visible in art, game assets, voice acting, and some back‑office tasks; less so in complex software or physical trades (plumbers, electricians, caregivers).
  • Some engineers report large productivity gains using LLMs as advanced autocomplete, especially for boilerplate code, while others find hallucinations and unreliability negate the benefit.
  • Widespread fear that “assistants” today are a stepping stone to job cuts tomorrow; several layoff stories are tied to management’s AI narrative.

Historical analogies and metrics

  • Frequent comparison to agricultural and industrial revolutions: massive labor displacement, eventual new kinds of work, but requiring strong worker organization (unions, regulation) to avoid misery.
  • Debate over whether productivity gains have truly reduced working hours or just shifted burdens (e.g., housing, education, healthcare costs).
  • GDP is criticized as a misleading success metric that can rise even while unemployment, precarity, and inequality worsen.

Governance, regulation, and power

  • Automation’s social outcomes are framed as political, not technical: “Star Trek vs Blade Runner” depends on property rights, labor power, and regulation.
  • Many argue current governments are captured by capital, making “let the market handle it” or “government will fix distribution later” not credible.

R&D vs broad automation framing

  • Several think the article’s R&D vs automation split is ill-posed: R&D underlies all automation; capital deepening doesn’t happen without prior research.
  • Some call dismissals of R&D shortsighted and point out foundational researchers rarely capture a share of the value comparable to downstream corporations.

Technical side notes

  • A few highlight constraint programming and deterministic automation as under-discussed alternatives/complements to stochastic LLMs for many “broad automation” tasks.

California Attorney General issues consumer alert for 23andMe customers

Why People Used 23andMe Despite Risks

  • Many participants say they joined out of curiosity, for ancestry fun, or as gifts.
  • Some describe significant medical or personal benefits: discovering thrombosis risks, other actionable variants, or connecting with unknown biological relatives and half-siblings.
  • A few adopted users or those with missing parents saw it as uniquely valuable for identity and health history.
  • Others emphasize they knowingly traded limited SNP data for perceived small risk at the time, especially in the optimistic 2000s tech climate.

Privacy, Deletion, and Bankruptcy Fears

  • Central concern: a financially distressed company may treat genomic data as a monetizable asset in sale or bankruptcy, with prior privacy promises weakened or voided.
  • Commenters doubt deletion is verifiable; some report that after deletion requests, “regulatory obligations” still allow retention of samples or certain genetic records.
  • Several note that even if you delete your data, relatives’ uploads make you partially identifiable; genetic data is inherently shared within families.
  • Some argue data obligations should “follow” the data like real-estate covenants; others are pessimistic, expecting distressed firms to break promises.

Debate Over the Attorney General’s Role

  • One camp sees the alert as pro-consumer: it informs people of their right to delete and may be the maximum legally available tool.
  • Critics call it cosmetic “appearance of action,” arguing the AG and legislators should create stronger opt-in laws, ban secondary use/sale, and not shift burden to individuals.
  • There is broader frustration about perceived corporate capture of politics, campaign finance, and “cargo cult democracy” without robust rule-of-law constraints on data abuse.

How Bad Could Misuse Get?

  • Proposed harms: insurance discrimination, denial of coverage, targeted pricing, or exclusion from life/disability policies; others point to existing US laws limiting this but worry they’re fragile or incomplete.
  • More extreme scenarios: state targeting of groups by ancestry, use in mass deportations or camps, or future genetic weapons. Some see this as realistic given historical precedents; others call it speculative or only relevant in already-dystopian conditions.
  • Law-enforcement use via familial matching (e.g., serial killers caught) is cited as both a social good and a proof that non-users can be implicated by relatives’ tests.

Value and Viability of Genomic Data

  • Some argue that if large-scale consumer genomics were truly lucrative, 23andMe wouldn’t be near collapse; they claim the data has limited predictive or commercial value.
  • Others counter that, with full-genome coverage plus linked health records, modern compute could revolutionize prediction, drug discovery, and preventive care—though they doubt society would manage it ethically.

Wider Privacy Culture and Comparisons

  • Multiple comments note that people routinely trade far more immediately exploitable data to Google, social networks, ride-share, food delivery, and credit-card ecosystems.
  • A recurring theme is that most users either don’t understand or discount tail risks, prioritizing immediate benefits over abstract future harms.

Tencent's 'Hunyuan-T1'–The First Mamba-Powered Ultra-Large Model

Website UX & Naming

  • Several people note the official page renders poorly on phones, with text cut off and no right padding, calling it sloppy for a flagship AI product.
  • Discussion on the model name “Hunyuan”: explanation of the Chinese meaning (“Primordial Chaos/Original Unity”) and comparison to Western mythological naming like “Apollo” / “Prometheus”.
  • Debate over romanization: complaints that “Hunyuan” without tones is lossy; suggestions for tone-marked pinyin or spaced syllables (“Hun Yuan”) as more readable/lookup‑friendly, but others note tones don’t help most non‑Chinese speakers and Chinese readers just want characters.

Reinforcement Learning, Benchmarks & Goodhart’s Law

  • A key worry: RL might just “game” benchmarks rather than improve general usefulness, with parallels to Goodhart’s law and school testing.
  • Some argue all optimization is “gaming a benchmark” so the real issue is designing meaningful evals and train/test splits; others point out that for LLMs it’s hard to ensure test sets are truly unseen.
  • Mention of benchmark proliferation (ARC, etc.) and models rapidly “beating” them, raising contamination concerns.
  • Multiple comments stress that benchmarks are necessary but insufficient; real validation comes from deployment on real tasks and private evals.

Capabilities, Limitations & Hallucinations

  • Users report persistent hallucinations (e.g., fabricating GitHub code) even when told “don’t hallucinate,” contrasting with claims that it’s hard to find tasks models can’t do.
  • Some propose tool‑use (e.g., calculators via tool frameworks) as the practical fix for math and similar brittle areas.

Political Alignment & Information Control

  • Tests around topics like Tibet, Tiananmen, and US/China politics show strongly state-aligned narratives in Chinese models and safety refusals on sensitive topics (e.g., overthrowing governments).
  • Comparisons drawn to Western models’ own alignment/censorship, but commenters emphasize the more centralized, legally mandated nature of control in China.

Multilingual Behavior & System Prompts

  • Users observe that the model often responds in Chinese even to English prompts; inspection suggests this is explicitly dictated by its system prompt, which says it “mainly uses Chinese.”
  • Some connect bilingual behavior to questions about linguistic relativity (Whorfian hypothesis), though conclusions remain speculative/unclear.

Architecture, Mamba Hybrid & Significance

  • Interest that the base is a Hybrid Transformer–Mamba MoE model, not pure Mamba; taken as informal evidence that Mamba alone still has practical issues.
  • Excitement from some about strong performance of a Mamba‑based system; others note the sheer number of new models makes it hard to tell what is genuinely impactful.

Trust, Openness & Metrics

  • Question whether linking a Hugging Face demo implies future weight release; status remains unclear.
  • Skepticism about score‑centric marketing: fear that labs quietly train on test sets or otherwise “optimize to the leaderboard,” especially since training data is undisclosed.
  • Comparisons to standardized testing in education: benchmarks drive progress but also distort incentives.

Generation Behavior: Stopping & “Thinking Tokens”

  • One user notes “non‑stopping” responses as a practical issue; others ask how to better train end‑of‑sequence behavior, suggesting targeted fine‑tuning but noting weak generalization.
  • Discussion of “OK, so…” / “好的 …” as recurring first “thinking” tokens in chain‑of‑thought models: some see them as wasted, others cite research indicating extra “pause/thinking” tokens can improve reasoning by effectively increasing compute per answer.

Math & “Understanding”

  • A side debate over charts showing non‑perfect accuracy on multi‑digit multiplication: one camp treats any failure on trivial arithmetic as proof of “stochastic parrot” limits, another notes that for large numbers these models already exceed typical human mental‑math ability.

Facebook to stop targeting ads at UK woman after legal fight

Reliance on Facebook Despite Harms

  • Commenters praise the ruling and hope many such cases could undermine surveillance-based advertising.
  • Frustration that community groups, small businesses, municipalities, and even consulates often use Facebook/Instagram as their only communication channel.
  • Several argue that most small organizations could meet user needs with a simple static website rather than tying people to a tracking platform.

Data Collection vs Ad Targeting

  • Many see the core problem as pervasive data collection and profiling (including “shadow profiles”), not just the act of serving targeted ads.
  • Others argue an absolutist ban on data collection is impractical; prefer rules like minimum audience sizes for targeting.
  • A linked court document suggests the legal claim was indeed about data practices, not just ad content.

Pregnancy Ads and Microphone Surveillance Debate

  • The pregnancy-targeting example is seen as creepy and violating.
  • One side suspects covert microphone eavesdropping; others strongly push back, citing lack of evidence, technical and legal hurdles, and easier explanations via metadata and behavioral patterns.
  • Target-style “we know you’re pregnant” stories are debated: some see them as emblematic of powerful models, others as overblown anecdotes or statistical flukes.
  • Some argue that even without microphones, current tracking (location, purchases, browsing) is equally or more invasive.

Algorithmic Feeds, Propaganda, and AI

  • Concern that personalized feeds and “top comments” are themselves targeted, shaping perception beyond ads.
  • Cambridge Analytica–style political microtargeting is raised as precedent; people worry AI will supercharge personalized propaganda and misinformation.

Regulation, Bans, and Business Models

  • Strong support for an EU-wide ban or strict opt-in for targeted ads; many believe most people would refuse tracking if asked clearly.
  • Some want broad restrictions on advertising in public spaces, especially digital billboards.
  • Meta’s paid ad-free tier in the EU is noted; commenters say the service could still be profitable with non-personalized ads.
  • Settlement strategy is discussed: companies often settle when continuing is costlier than conceding, regardless of admitting fault; some think this deal was a tactical move to neutralize a privacy activist’s legal standing.

Psychological and Social Effects of Social Media

  • Multiple people report feeling markedly happier and less resentful after quitting Facebook or heavily restricting Reddit.
  • Techniques include deleting/locking themselves out of accounts, using friction apps, or blocking feed pages via browser filters.
  • Debate over whether ordinary life updates on Facebook are harmless sharing or evidence of a “clown circus” culture; some see social networks as inherently “soul cancer,” others as neutral tools misused at scale.

Ad Quality, Scams, and Offline Spam

  • Complaints about Facebook hosting scammy ads that lead to phishing or fake stores that harvest credit card details.
  • Offline: weekly supermarket leaflets dumped at every doorstep are cited as another form of unwanted, hard-to-escape advertising.

Personal Responsibility and Retrospective Doubts

  • A closing sentiment questions whether it was wise to put “entire chapters” of one’s life onto a platform whose core business is ad brokerage, even if legal victories can later limit how those data are used.

Amazon wants a product safety regulator declared unconstitutional

Amazon’s Challenge to the CPSC & Public Reaction

  • Many comments frame Amazon’s move as “horrifically awful,” seeing it as prioritizing profit over consumer safety and emblematic of a wider slide toward oligarchic or even authoritarian tendencies.
  • Some express generalized loss of trust in Amazon’s products and behavior and argue that large tech companies should be broken up.
  • A few mention potential bias of the article source given ownership ties to Amazon’s founder, but still see the underlying facts as credible.

Is Amazon a Retailer, Platform, or Just a Shipper?

  • Central dispute: Amazon claims it’s like UPS/FedEx for third‑party goods and shouldn’t have recall obligations.
  • Critics note that “Fulfilled by Amazon” products are stored, shipped, refunded, and often branded as if sold by Amazon, so the company clearly has the data and operational control to support recalls.
  • Comparison with Walmart and traditional retailers: those stores routinely handle refunds and recalls; commenters fear if Amazon wins, others will follow its deregulatory path.

Should Marketplaces Like eBay/Facebook Be Responsible?

  • Some argue any platform that intermediates and holds buyer data should at least cooperate on recalls and labeling, especially for business sellers.
  • Others stress the practical burden: generic, low‑info secondhand listings make product identification and recall matching very hard, even with modern AI, and added compliance could kill cheap secondhand markets or push items underground.
  • There is disagreement over whether broad recall reach is a “must” or merely “nice to have.”

Value of the CPSC vs Private Oversight

  • Several praise the CPSC’s work and communication, contrasting it with proposals to shift safety checks to private entities under “government oversight,” which critics link to failed self‑regulation in other industries (e.g., aerospace).
  • One former Amazon engineer explains recalls are technically straightforward (delist, pull from warehouses, notify buyers); the real friction is cost and destruction of cheap, unsafe imports.

Law, Democracy, and Corporate Power

  • Commenters compare Amazon’s desired liability shield to Section 230 debates, seeing a pattern of corporations seeking maximal protection with minimal responsibility.
  • Extended subthreads discuss dysfunction in U.S. democracy, the dominance of corporate donors, Citizens United, and rising populism, arguing regulators are being gutted under an ideology that “government itself is irreparable.”

Amazon’s “Customer Obsession” vs Shareholder Primacy

  • Some note an apparent conflict between Amazon’s public leadership principles and fighting safety regulation.
  • Others counter that many customers mainly want low prices and fast shipping; as long as returns are easy, trust may not depend on robust safety oversight.
  • Several point to Amazon’s treatment of warehouse workers and worsening product quality/search experience as consistent with a shareholder‑first, not consumer‑first, reality.

Landrun: Sandbox any Linux process using Landlock, no root or containers

Comparison to existing sandbox tools (bubblewrap, firejail, nsjail, containers)

  • Landrun wraps Linux Landlock LSM, not namespaces; works unprivileged and doesn’t require containers, cgroups, or SELinux/AppArmor.
  • Several commenters say many Landrun use cases can be done with bubblewrap or firejail (mount/network namespaces), but note:
    • Namespaces may be disabled or require root on some systems, whereas Landlock is explicitly designed for unprivileged use.
    • Namespaces can expose a larger kernel attack surface; LSM-based controls are seen as safer for untrusted apps.
  • Firejail already integrates Landlock; nsjail relies on namespaces for FS isolation.
  • Landrun is viewed as closer in spirit to OpenBSD’s pledge/unveil than to full containers.

Landrun behavior, flags, and UX questions

  • Early confusion over --exec: users discovered many simple invocations failed without it; the author quickly refactored toward more granular --exec-path semantics.
  • Example from README initially failed (touch denied on /tmp), then was shown to need --exec and specific directory permissions.
  • Some argue “no rules” should mean “deny everything”; Landrun was updated to tighten this.
  • The default --best-effort mode (fall back to weaker sandbox) is widely criticized as unsafe; several suggest this should be opt‑in.
  • Option naming (--ro, --rw, --rox) is seen as confusing; some want clearer long/short flags.

Features, gaps, and kernel-level aspects

  • Today: fine-grained filesystem plus TCP port restrictions; UDP and more protocol controls are planned.
  • Landlock supports scoped abstract Unix sockets, but Go bindings currently struggle with them due to multithreading/signal issues; works from single‑threaded C.
  • Landlock is positioned as complementary to seccomp (attack surface reduction) and to namespaces (isolation); only LSMs can reliably block privileged child namespaces.

Configuration formats and ecosystem integration

  • Strong interest in declarative configs (JSON/TOML/YAML or reuse of existing policy formats). A separate landlockconfig project and OCI integration are in progress.
  • People want systemd integration akin to SystemCallFilter=, plus usage inside OCI containers as an extra layer.
  • Underlying Go/Rust/C libraries are MIT-licensed; Landrun’s GPLv2 CLI is acceptable to some, problematic to others.

Broader sandboxing / permissions discussion

  • Multiple commenters want macOS/Android‑style per‑app permissions and interactive prompts; Landlock could be a backend, but Landrun doesn’t provide that UX layer.
  • Alternatives mentioned for per‑app/network control: firejail, network namespaces + nftables, cgroups + firewall marks, Flatpak + xdg‑portals, and tools like OpenSnitch.

Unofficial Windows 7 Service Pack 2

Project status and technical details

  • Several commenters tried to understand how the Windows 8 “Reader” PDF app is being used on Windows 7.
    • Conclusion: the executable was extracted from the appx, not run as a UWP package.
    • Some doubt it can work cleanly on 7, suspecting dependencies on early Metro/UWP or browser engines.
  • People note there is no actual ISO or installer release yet despite the README implying one; it’s clearly marked as work-in-progress.
  • The repo’s license is criticized as “rich” given it is largely Microsoft binaries.
  • Questions are raised about whether high‑DPI improvements could reach per‑monitor v2 quality; others counter that many serious improvements since 7 (memory compression, security, WDDM) would still be missing.

Security and trust concerns

  • Running a very old PDF reader is widely viewed as risky; one person jokes the only worse idea would be an ancient TIFF reader.
  • Unofficial Win7 update packs (e.g., repackaged ESUs from Ukraine) are mentioned; some worry about hidden malware.
    • Debate follows about whether country of origin meaningfully affects risk; no consensus is reached.

Why people still want Windows 7 (and earlier)

  • Many see Windows 7 as the peak of usability, aesthetics, and speed; some argue Windows 2000 or Server 2003 were even better.
  • Users keep dedicated Win7 machines (sometimes heavily repaired over time) for Office 2003, specific plugins, CAD/PLC, or niche tooling.
  • Older Office with classic menus and pre‑Manifest‑V3 browsers are praised; the ribbon UI draws both strong dislike and strong defenses.
  • Several note how fast XP/2000/7 feel compared to modern Windows on far more powerful hardware, especially for launching Office.

Critiques of modern Windows (10/11)

  • UI/UX is a major sore point:
    • Loss of vertical taskbar and classic Quick Launch, inconsistent dual settings/control‑panel UIs, rounded corners with awkward resize areas.
    • Some appreciate 11’s visual consistency; others insist 7’s Aero era was superior.
  • There’s frustration with Windows 11’s onboarding (Microsoft account requirement) and general bulk.
  • Features like the file‑copy speed graph are debated as either useful diagnostics or needless distraction.

Retrocomputing, drivers, and ecosystem

  • There’s an active ecosystem around running 7/XP on modern hardware: driver torrents, driver integrators, custom ISOs with NVMe/ACPI support, and tools like NTLite.
  • Similar interest exists in lightweight 8/8.1 via Server variants with extended support.
  • Some hope this project might eventually enable a minimal, reasonably secure modern browser on Windows 7.

Alternatives and lookalikes

  • Suggestions include ReactOS and Linux distros/DEs mimicking Windows 7 (e.g., XFCE mods).
  • Skepticism remains: visual clones often feel “off,” and for many the real draw is Windows’ software/hardware ecosystem, not just the UI.

When you deleted /lib on Linux while still connected via SSH (2022)

Directory hard links and Solaris specifics

  • Early subthread digs into whether you can hard-link directories to recover a moved /lib.
  • Consensus: POSIX forbids directory hard links, but some Solaris/illumos UFS implementations historically allowed root to do it, while ZFS and modern docs explicitly disallow it.
  • GNU ln even has a “try directories” flag for root, though it usually fails; underlying link() may or may not permit it depending on filesystem.

Static binaries, busybox, and modern recovery options

  • Older Unix/Linux systems often shipped statically linked tools in /sbin (or a static sln/busybox) to survive library loss.
  • Many distros have removed statically linked system binaries; recovery is now expected via initramfs, rescue media, or snapshots.
  • Several people describe recovering by:
    • Copying binaries from another identical machine (scp/rsync/uuencode+cat).
    • Reconstructing a static busybox or small helper program by echoing hex bytes over an existing executable path.
    • Using exec -a to satisfy busybox’s applet-name expectations.

Unlinked libraries and /proc tricks

  • Deleted libraries in use stay as “unlinked” (anonymous) inodes until last user exits.
  • In principle you can find inode numbers via /proc/$PID/maps and use filesystem tools (debugfs, zdb) to extract them.
  • Practically, this is hard because most tools you’d use are dynamically linked themselves; you may need to rely on shell builtins and then drop in a static tool over the network.

Human error stories and operational lessons

  • Many anecdotes: rm -rf /bin vs ./bin, rm -rf /, wiping /etc, removing all execute bits with chmod -R, even umount / on AIX.
  • Patterns of advice:
    • Don’t reboot immediately when things act weird; investigate first.
    • Avoid having humans type long destructive sequences; script and test them.
    • Keep two root shells when editing sudoers or critical SSH tunnels.
    • Pause and double-check before rm -rf or dd; some use echo, du -sh, or a # prefix as a safety step.

Safer deletion, trash vs snapshots, and tooling gaps

  • Suggestions: rm --preserve-root exists; people wish for a --preserve-home or top-level “are you sure?” prompts.
  • Opinions split between:
    • Using trash/recycle tooling (trash-cli, safe-rm) for day-to-day safety.
    • Relying instead on proper backups and/or filesystem snapshots (btrfs/ZFS), sometimes only for selected directories.
  • Some skepticism about trash tools’ reliability and snapshot bloat; others argue CoW snapshots are cheap and transformative.

Broader themes

  • Root’s lack of guardrails is highlighted as the root cause; immutable or restricted systems might reduce these incidents.
  • The situation is framed as a bootstrapping problem: as long as you have one running shell, one executable, and a way to overwrite it, you can theoretically rebuild a minimal system.
  • Techniques used here closely resemble “living off the land” methods from exploit writeups, but applied to self-rescue instead of offense.

George Foreman has died

Boxing Legacy and Personal Impact

  • Many call him a legend and one of the all‑time great heavyweights.
  • His late‑career title win in his mid‑40s/late‑40s inspires people who feel “too old” for physical challenges.
  • Commenters praise his ring IQ, power, and ability to reinvent himself after setbacks, with multiple recommendations of the documentary When We Were Kings.
  • Some share personal or secondhand anecdotes of him as kind, humble, and generous with fans.

Foreman Grill and Everyday Utility

  • Numerous commenters say the grill was genuinely useful, especially for students and apartment dwellers who couldn’t have outdoor grills or good ventilation.
  • Praised for: heating quickly, cooking both sides at once, being easy to clean, and working on standard circuits.
  • Debate over its treatment of meat: some see it as abusing steak by squeezing out juices; others argue it’s fine for burgers, chicken, and “non-connoisseur” cooking.
  • Long sub‑thread on cooking science: searing vs “sealing” juices, moisture management, reverse sear, tenderizing, and the tradeoff between ideal technique and convenience.

Money, Branding, and Endorsement Stories

  • People cite large reported earnings from the grill endorsement, noting he made more from it than from boxing.
  • A popular (and contested) story has another celebrity allegedly turning down the grill endorsement for a lesser appliance. Some call this person an unreliable narrator.
  • Several remark that Foreman’s affable, down‑to‑earth, “backyard dad” image made him an ideal pitchman, and for some he’s more famous for the grill than for boxing.

Faith and Personal Life

  • One comment praises him as a “great Christian,” prompting debate about what that means given his five marriages.
  • Some see multiple marriages as inconsistent with Christian values; others stress that Christianity centers on repentance and that imperfect people are exactly its target.
  • There’s broader critique that American Christianity often functions more as identity/brand than as lived discipleship.

Health, Aging, and Ethics of Combat Sports

  • Admiration for his mental sharpness late in life sits alongside concern about brain damage in boxing and American football.
  • Commenters share stories of fighters and players suffering cognitive decline, question the ethics of being a fan, and discuss how early, poorly compensated careers front‑load the risk.

Miscellaneous and Tangents

  • Lighthearted mentions: his TV work, naming all his sons George, and childhood confusion over whether he “invented” the grill.
  • A long off‑topic branch debates a separate scandal involving another celebrity, media ethics, and modern politics.

The Wright brothers invented the airplane, right? Not if you're in Brazil

Competing “first flight” claims

  • Commenters list many national claimants: Wright brothers (US), Santos-Dumont (Brazil), Lilienthal and Grade (Germany), Ader and Blériot (France), Pearse (New Zealand), Mozhaysky (Russia), Whitehead and others.
  • Several note they were taught different “inventors” in school depending on country, mirroring similar disputes for radio, television, computers, X‑rays, etc.

What counts as an airplane / first flight?

  • Key disputed criteria:
    • Powered vs. glider
    • Heavier-than-air
    • Controlled (3‑axis) vs. mere hop
    • Sustained vs. very short distance
    • Takeoff from level ground under own power vs. rail, hill, catapult, headwind.
  • Some argue that if catapults or rails “don’t count,” then many early flights (including Santos-Dumont’s and others) must also be reconsidered.
  • Others insist the Wrights’ 1903 flights did not use catapults and met reasonable powered-flight criteria.

Arguments for Wright priority

  • Supporters emphasize: development of 3‑axis control, understanding of roll and adverse yaw, wind‑tunnel work to fix bad lift data, efficient propeller theory, and a lightweight engine.
  • They stress the Wrights’ exhaustive documentation, witnesses, photographs, and flight distances (kilometers by 1905) versus rivals’ shorter, less-documented hops.
  • Replicas of the Flyer reportedly reproduce the documented performance, which many see as strong evidence.

Arguments for Santos-Dumont and others

  • Brazil-centered view: Santos-Dumont’s public, unaided takeoffs from wheels in 1906–07, prize-winning distances, and “open source” approach.
  • Skeptics question claims that he secretly used Wright-style propellers when Europe allegedly didn’t yet know their work.

Nationalism, education, and narrative

  • Many see these disputes as products of national pride and school curricula: countries prefer “their” inventor.
  • Several argue the “who invented X?” question is often ill-posed: inventions arise from overlapping, incremental work; crediting a single person oversimplifies.

Patents, secrecy, and impact

  • Wrights’ control patents and litigation are said to have slowed later innovation; their secrecy delayed broader recognition, especially in Europe.
  • Broader analogies are drawn to the space race, SpaceX, and the steam engine: timing, funding, politics, and narrative can matter as much as strict priority.

Monster Cables picked the wrong guy to threaten (2008)

Outcome of the Monster vs Blue Jeans incident

  • Linked follow-up shows Monster ultimately went silent after receiving Blue Jeans’ detailed response; no lawsuit or penalties followed.
  • Some commenters say this undercuts the “picked the wrong guy” framing: Monster backed off, then likely continued similar tactics against easier targets.
  • Others argue the public nature of the exchange inflicted reputational harm, reducing the intimidation value of Monster’s threats.

Legal bullying vs. smart enforcement

  • Thread compares Monster to other heavy‑handed firms (Monster Energy, Caterpillar vs Cat & Cloud, Monster vs Monster Mini Golf).
  • Multiple anecdotes: HOAs, small businesses, and individuals receiving aggressive demand letters over domains, logos, or trivial “infringements.”
  • Contrast is drawn with “gold standard” polite cease‑and‑desists (Jack Daniel’s, Netflix’s “Stranger Things” bar letter), which explain the legal need to act, propose reasonable fixes, and avoid threats.

Trademark realities and countersuits

  • Several people stress that trademark owners are indeed pressured to police infringement or risk dilution, which partly explains (but doesn’t excuse) overreach.
  • Question raised: can you hit back just for a baseless threat? Answer: rarely worthwhile; “barratry” laws exist but are hard to use for one C&D.
  • Declaratory judgments are mentioned as a tool: if someone threatens to sue, you can proactively sue to have their claims declared groundless.

Reactions to Blue Jeans’ letter and legal mindset

  • Commenters admire how the author channels adrenaline into methodical legal analysis rather than panic; the discovery requests and antitrust hints are seen as a calculated threat back.
  • Some note that this “I enjoy litigation and will go the distance” posture is standard litigator psychology, not just theatrics.

Monster, cables, and audiophile skepticism

  • Many recall Monster’s high‑margin upsells and dubious performance claims, especially around digital video and “better picture.”
  • Several point out that cable quality does matter at long runs/bandwidth (e.g., 4K HDMI, long projector runs), but not in the magical way Monster advertises.
  • Audiophile marketing hyperbole around cables is widely mocked; people note that once a digital or analog spec is met, expensive “snake oil” doesn’t add value.

Blue Jeans Cable’s reputation

  • Multiple commenters say this episode introduced them to Blue Jeans and led them to purchase; BJC is praised as an honest, technically solid, anti‑snake‑oil vendor.
  • The story reinforces BJC’s brand as competent, no‑nonsense, and willing to push back against legal bullying.

Not OK Cupid – A story of poor email address validation

Broken basics & “enshittification”

  • Several commenters generalize the blog’s issue to a broader sense that basic web functions are routinely broken: unsubscribes fail, logins don’t work, payment pages are dead, and sites give no way to contact support.
  • One example: severe input lag and jumbled typing in Google Search on Android unless you wait ~30 seconds, seen as unacceptable for a core, cash-rich product.
  • Some frame this as part of a general “enshittification” of tech, where things feel constantly broken and nobody is accountable.

Email validation failures & misdirected accounts

  • Many report accounts or notifications created with their email at banks, credit bureaus, retailers, Amazon, Apple, PayPal, Venmo, credit card companies, universities, and more.
  • Consequences range from nuisance spam to serious exposure: job offers missed, factory IT/SCADA credentials sent to the wrong person, detective crime-scene videos, utility bills, and personal identifiers (e.g., national ID numbers) revealed.
  • People with common or short Gmail usernames are especially affected.

Dating apps, OkCupid, and misaligned incentives

  • OkCupid is widely described as having declined sharply: more bots and scams, less trustworthy, worse user experience, especially post-acquisition by Match Group.
  • Others counter with positive past experiences, including long-term relationships and marriage, but agree the service has changed since roughly 2010–2015.
  • Broader critique: dating apps’ business model is to maximize engagement and recurring fees, not successful matches (which cause churn).
  • Ideas floated include nonprofit matchmaking or escrow-based “pay on successful match/marriage” models, but commenters doubt consumer willingness to pay and note practical and incentive problems.

Coping with spam & legal angles

  • Common strategies: marking as spam, creating filters to auto-delete, or using aliases to kill a compromised address. Some threaten CAN-SPAM complaints; links to the FTC’s fraud/spam reporting portal are shared.
  • There is skepticism that complaints or blog “shaming” will materially change behavior; filters are seen as the only reliable defense.

Email as identity, security questions & aliases

  • Using email as a login ID is criticized as insecure (password reuse, massive exposure of addresses) and impractical for users who change providers.
  • Some advocate owning a personal domain for a “lifetime” email identity.
  • Security questions are seen as weak; advice is to answer with password-manager-generated phrases, though this may clash with phone-based support workflows.
  • Fastmail-style masked emails, custom-domain catch-alls, and vendor-specific aliases are praised as powerful tools to manage spam and identify leaks, though managing hundreds of aliases requires supporting tools and clients.

Security & ethics around misdirected accounts

  • Some users “take over” misdirected accounts (resetting passwords, changing details) to stop spam; others argue this is unethical and possibly illegal (e.g., CFAA), even if companies and mis-typers are careless.
  • An additional OkCupid-specific issue is noted: emailed match links that auto-log into accounts; a report of this was allegedly marked WONTFIX.

France rejects backdoor mandate

French political context and motives

  • Commenters stress this was the National Assembly blocking a government-backed measure, not “France” as a whole. Interior ministry and security services still want backdoors.
  • Some see the vote as “cheap” politics: it hurts a powerful minister, plays well in media (“spying WhatsApp”), and there’s no recent major attack to create urgency.
  • Several expect many of the same MPs would vote the opposite way after a terrorist incident or under stronger party discipline.

Technical debate on backdoors

  • Long subthread on whether backdoored encryption is inherently impossible vs merely high-risk:
    • One side: any systemic backdoor inevitably leaks to hostile states, criminals, and insiders; it’s a security disaster at modern scale, not a policy option.
    • Other side: cryptography can technically support multiple decryption keys; the real question is risk tolerance and governance, not basic literacy.
  • Threat models clash: some people emphasize foreign adversaries and hackers; others emphasize domestic law enforcement and accept increased technical risk.
  • Many note practical problems: keeping a “master secret” for millions of users secure, billions in incentives to steal it, and the difficulty of limiting which agencies/ regimes can use it.

Government intent vs ignorance

  • Disagreement whether politicians are mostly:
    • Ignorant of technical realities and scale effects; or
    • Fully aware, but prioritizing state power and surveillance over citizen security.
  • Several argue policy rhetoric (“for children”, “for drugs/terrorism”) masks a persistent desire for generalized surveillance; others caution that calling opponents stupid is counterproductive.

Crime, drugs, and effectiveness

  • Skepticism that backdoors would meaningfully hurt organized crime: serious actors can move to open-source, decentralized, or manual cryptography.
  • Many frame “war on drugs” and “war on crime” as pretexts: legalization/decriminalization (e.g., cannabis) is presented as a more effective way to undercut cartels.
  • Some argue surveillance can and has reduced gang violence (e.g., Danish example), but concede that targeting general E2EE mainly impacts ordinary users.

Public opinion, democracy, and French privacy culture

  • Debate over whether voters would accept surveillance if framed as fighting crime or protecting children; experiences differ by country.
  • French political culture is described as historically skeptical of state power, with institutions like CNIL and strong data‑protection precedents, though some feel these have weakened.
  • Others emphasize that civil liberties are not “won” once but require constant active defense by citizens.

EU and international angle

  • Several warn that EU-level “chat control” / on-device scanning proposals remain alive; France’s national rejection doesn’t stop a future EU mandate.
  • Concerns about reliance on US platforms and intelligence sharing: some describe the US as increasingly hostile or unreliable; others call that exaggerated and stress ongoing alliances.
  • There is worry that European states try to stay “clean” while other powers already use secret backdoors and zero‑day exploits.

Alternatives, providers, and future risks

  • Some argue law enforcement will (and already does) rely on device exploits (Pegasus-style), metadata, and targeted hacking instead of formal backdoors.
  • Others highlight that providers themselves benefit from strong E2EE to limit breach impact; some would rather exit markets than weaken security.
  • Longer-term fears include AI-driven mass surveillance on top of any mandated access, turning exceptional powers into pervasive monitoring.

Tech terms I was pronouncing wrong

Range of disputed pronunciations

  • Mathematical and personal names:

    • “Euler” ≈ “oiler” (oil), “von Mises” vs “Mises Pieces” joke; widespread admission that German/Dutch names (Gödel, Schrödinger, Dijkstra, Huygens, Einstein) are often mangled in English.
    • Fresnel, Poisson: many pronounced phonetically until corrected; some playfully “refuse” French nasalization.
  • Core tech terms:

    • GIF: ongoing hard-G vs soft-G battle; some appeal to the creator, others ignore it.
    • regex: many options—“reg-ex”, “rej-ex”, “rezh-ex”, “ray-gex/jex”—with some arguing it should follow “regular expression”, others treating it like its own word.
    • LaTeX/TeX: debate over “LAH-tek”, “LAY-tek”, stress placement, and whether to honor the Greek χ sound; some reject pedantry for the sake of communication with non-technical people.
    • Linux and Linus: “lih-nux”, “lee-nooks”, “lie-nix”; audio clips from Linus exist, but people still vary.
    • Azure: multiple regional forms (ah-zure vs ay-zure etc.), with confusion especially outside Anglophone countries.
    • cache: cash, “cach-ay”, “caysh”; Australia/NZ note local variants.
  • Other terms mentioned: tuple (too-pul/tupple), idempotent, homogeneous, Redis, nginx, Xfce, PNG, JWT (“jot”), GNU (noo, g-noo, “gee en you”), SQL/SQLite/PostgreSQL, JSON, NumPy/SciPy, vi/vim, SIEM, repo, pypi, etc., with examples of every variant someone has actually heard.


Regional and linguistic influences

  • Several comments tie pronunciation to native language phonetics (e.g., German speakers on “ch”, languages where “gn” is natural).
  • English-specific rules (silent g in “gn”, silent k in “kn”) explain why many drop consonants in GNU-like words.
  • Country/dialect differences (US vs Australia vs NZ vs Germany) are cited for vowels (Azure, mobile, repo, cache).

Authority vs common usage

  • Some defer strongly to creators’ pronunciations (GIF, regex originator, Knuth on TeX, SQLite creator, GNU/JWT videos).
  • Others argue that once a term spreads, normal spelling and local phonology should govern, not original intent.

Attitudes toward mispronunciation

  • Range from joking disgust (“nails on a chalkboard”) to strong sympathy: mispronunciation often means someone learned by reading.
  • Several people prefer writing about programming to avoid awkwardness.
  • Many share nostalgic or humorous stories (BBS “sis-op”, “hotmail files”, “pup” for PHP, “squeal” for SQL) as harmless quirks.

Meta

  • Multiple commenters note the thread was flagged and question why, given it’s on-topic and culturally revealing.

Scientists break down plastic using a simple, inexpensive catalyst and air

Technical process and capabilities

  • Catalyst is activated carbon/molybdenum dioxide operating around 265 °C in air with ambient moisture, converting PET to terephthalic acid (TPA) and acetaldehyde.
  • Paper reports ~94% of possible TPA recovered in 4 hours at 1 atm, including from “real-world” inputs like bottles, textiles, colored and mixed plastics.
  • Several commenters note these temperatures are comparable to PET melting and existing recycling/molding processes, so not extreme by industrial standards.
  • Compared with pyrolysis that yields mixed petrochemicals, this gives relatively pure monomers that can be re‑polymerized into PET.

Economics, energy, and scalability

  • Article headlines “simple, inexpensive catalyst,” but gives no explicit process cost; commenters criticize this and note that cheap virgin feedstocks (~$0.50/lb for BTX-type chemicals) are the real benchmark.
  • Energy input for heating and the 4‑hour residence time raise questions about throughput and capital cost; continuous processes can help but Little’s Law still applies.
  • Upstream logistics (collection, sorting, cleaning) are seen as the dominant cost for any PET recycling, often outweighing reaction/separation costs.
  • Mechanical PET recycling remains cheaper when possible because it avoids depolymerization and re‑polymerization steps.
  • Heat recovery and general energy integration are assumed standard in industrial practice, so not a unique advantage here.

Mixed plastics, sorting, and other polymers

  • A key appeal is extracting PET from mixed streams without perfect sorting; paper explicitly discusses this use case.
  • Commenters stress that “plastic” is many materials with different properties; PET (#1) and HDPE (#2) are relatively easy, but most others are not, and sorting remains a major hurdle.
  • There is discussion of mechanical closed‑loop PET bottle recycling, including existing 100% recycled bottles and textile fibers, but also concern that fabrics are major microplastic sources.

Microplastics and health concerns

  • Multiple comments focus on microplastics from clothing, tires and bottles, and on emerging evidence of plastics in human organs and infants.
  • Some argue landfilled “mountains” of plastic are less problematic than diffuse microplastic pollution; others see plastic pollution overall as an environmental catastrophe.

Policy, externalities, and alternatives

  • Strong thread on pricing externalities: proposals for lifecycle plastics taxes, tariffs on virgin plastic, and extended producer responsibility.
  • Counter‑arguments emphasize the difficulty and bureaucracy of fully internalizing cleanup costs in practice.
  • Debate over bans vs price signals: targeted phase‑outs of easily replaceable items (e.g., confetti, straws) vs blanket rules that would make essentials unaffordable.
  • Biodegradable/“eco” plastics are criticized as often underperforming, requiring industrial composting, and contaminating recycling streams; some see them as greenwashing.

Overall sentiment

  • Many are cautiously impressed by the chemistry and especially the ability to recover monomers from mixed PET streams.
  • At the same time, there is fatigue with recurring “breakthrough” stories that omit timelines, costs, and realistic paths to large‑scale impact amid ever‑growing plastic production.

Use Long Options in Scripts

Benefits of long options and formatting style

  • Long options are seen as more self-explanatory, easier to grep in man pages, and less prone to typos.
  • Many recommend:
    • Prefer long options in scripts.
    • Put each option on its own line for readability and easier git blame.
    • Use -- to separate options from dynamic arguments for safety.
  • Some also advocate clearer command names and multi-line invocations to reduce “cryptic one-liners”.

Portability vs GNU-isms

  • Major caveat: POSIX does not specify long options; many BSDs and BusyBox utilities only support short options, and GNU tools often have extra, non-portable options.
  • Examples:
    • BSD/macOS sed, rm lack GNU-style long options.
    • Some cases (e.g., base64 --decode) are actually more portable with long options across GNU/BSD.
  • For truly portable scripts or when targeting BusyBox/embedded systems, several commenters insist short options are the only reliable choice.
  • Others solve this by pinning toolchains via Nix or similar reproducible dev environments so they can safely use long options and newer features.

Shell execution and injection safety

  • Strong warning against mixing string interpolation with shell commands (e.g., system("cmd {user_input}")), calling it “SQL injection on steroids”.
  • Recommended patterns:
    • Use array/list-based exec APIs so arguments go directly to execve without going through a shell.
    • If you must use sh -c, treat the script as fixed and pass user data via positional parameters ("$1", $@) rather than string concatenation.
  • Some propose language features/macros that handle escaping for POSIX shells, though others note this is shell-specific and incomplete.
  • There is back-and-forth on when this really matters: some say “never send untrusted input to the shell”, others argue requirements change and trusted inputs can become untrusted.

ARG_MAX and huge argument lists

  • A few mention the ARG_MAX limit: expanding globs over millions of files can exceed it.
  • Suggested approaches: avoid giant argument lists (use stdin/list files, xargs-style patterns) rather than bolting on fragile length checks and eval.

Readability vs density; learning vs memorization

  • One camp: optimize scripts for novice readers and maintainers; long options and clarity beat terseness.
  • Opposing camp: long options are verbose GNU-isms; people should learn the short flags, and over-optimizing for “obviousness” leads to mediocre software.
  • Some note that long options can turn compact one-liners into multi-line blocks, reducing how much logic fits on screen at once.

I want a good parallel computer

Workloads that might benefit from more parallelism

  • Suggested candidates: video encoding, large-scale compilation/linking (e.g., Chromium), optimization problems (scheduling, routing), theorem proving, and complex 2D/3D rendering.
  • Video encoding is split into:
    • Real-time (video calls, broadcast): fixed‑function hardware for latency/power, but weaker compression.
    • “At rest” (YouTube, Blu‑ray): CPU software for best compression, but slow.
  • Some argue a GPU-based general encoder could combine software‑grade compression with GPU throughput; others reply that new codecs are rare, and fixed‑function is “good enough.”

GPU strengths, limits, and developer experience

  • GPUs excel at simple, massively data‑parallel workloads (graphics, linear algebra, ML).
  • Many proposed workloads are “thinking” tasks with heavy branching and irregular control flow, where GPUs and SIMT/SIMD are a poor fit.
  • Several comments call GPU programming “weird” and painful:
    • Separate compilation and runtime shader builds.
    • Distinct memory spaces and data shuffling.
    • Synchronization friction and vendor‑specific, complex APIs.
  • Some believe these issues are largely abstractable at the language/runtime level; others think the underlying execution model is inherently constraining.

Alternative manycore and parallel architectures

  • Past and niche efforts discussed: Connection Machine, Transputer, Cray MTA, Xeon Phi/Larrabee, GreenArrays, Epiphany, SGI NUMA, AIE arrays, etc.
  • Repeated theme: “hundreds of tiny CPUs on a chip” usually fail because of odd programming models and poor tooling, not raw hardware.
  • Cache coherence and shared-memory scaling are called out as core blockers for “a CPU with thousands of worker cores.”
  • Some advocate graph/DAG or dataflow-style IRs and graph reduction as a better fit than von Neumann-style threads.

Unified memory, APUs, and using GPUs as generic workers

  • Interest in APUs and unified memory (Apple Silicon, AMD Strix Halo, some Qualcomm/AMD parts) as a friendlier model that avoids PCIe copies.
  • Debate over AMD marketing claims that Strix Halo can beat an RTX 4090 on large LLMs: critics note these are memory‑bound benchmarks and cherry-picked.
  • Desire to treat iGPUs as transparent “efficiency cores” scheduled by the OS, but commenters note tool, API, and hardware constraints.

Rendering and dynamic workloads

  • Some see massively parallel 2D GPU renderers as overkill; others point to complex vector art, maps, text, and fluid 2D UIs that do need serious GPU help.
  • 3D rendering and lighting are highlighted as especially hard: general‑purpose renderers tend to scale poorly with scene complexity, and engines rely on deep integration with scene graphs and precomputation.
  • The original post’s complaint: GPUs struggle with dynamic, coarse‑grain scheduling and temporary buffer management, and current hardware increasingly accretes special‑case blocks (RT cores, video blocks) instead of general primitives.

Safety, memory models, and historical lessons

  • Strong pushback against ideas like “flattening address spaces”: people recall unstable, pre‑protection systems and architectures like Cell as cautionary tales.
  • Counterpoint: many of those designs were limited by their era; modern language and tooling advances (safe languages, IRs like SPIR‑V, JVM/WASM‑style runtimes) could revisit similar ideas more safely.
  • Some suggest moving more of protection/isolation into software runtimes to simplify hardware and potentially make parallel cores cheaper.

Why a “good parallel computer” is elusive

  • Ecosystem and economics matter: new architectures struggle without a critical mass of software and experts, even if technically elegant.
  • Several argue that much day‑to‑day software is bottlenecked by design, I/O, or concurrency, not raw parallel compute; optimizing code or UX often beats moving to GPUs.
  • Distinction emphasized between parallelism (throughput on homogeneous data) and concurrency (independent, interacting tasks) — most everyday apps are said to need the latter more than the former.