Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 384 of 537

OpenAI looked at buying Cursor creator before turning to Windsurf

Deal size, valuation, and founder outcomes

  • Commenters speculate wildly on price: rumors around $3B; others imagine $20B and debate whether OpenAI could even fund that in cash.
  • OpenAI’s $40B SoftBank round is noted as conditional and possibly only partly realized, raising doubts about its ability to pay large all‑cash sums.
  • Cursor is said to be valued at ~100x revenue; several see this as bubble territory, especially given heavy inference costs for “agentic” products.
  • Rough cap-table math: at a ~$3B exit post‑Series C, founders might personally clear hundreds of millions, especially if they already took secondaries.

“Agentic Software Engineer” claims and reality

  • The CFO’s pitch that an “A‑SWE” can build apps end‑to‑end (PRs, QA, docs) is widely viewed as hype or outright vaporware.
  • Skeptics point out OpenAI is still aggressively hiring engineers; if A‑SWE could truly replace SWE work, they’d dogfood it and publicize that.
  • Developers report that tools like Cursor/Claude Code are great helpers but unreliable on non‑trivial tasks, with compounding errors and no real causal understanding.
  • Some see them as the CAD of software engineering: hard to imagine working without them, but far from a replacement for expertise.

Can AI keep improving without human programmers?

  • Debate centers on whether AI can “keep coding” once it largely replaces human coders.
  • One side argues RL + tool use (compile/run/test) can create a self‑improvement loop, even from existing “recipe books” of code.
  • Others stress missing human judgment and goal alignment: AI can generate novel combinations, but not decide what’s useful to humans or discover entirely new paradigms.
  • Concerns about training on AI‑generated output (ouroboros problem) and the long‑term quality of knowledge.

IDE data as a flywheel vs. developers training their replacements

  • Several argue OpenAI’s investments in Cursor/Windsurf are about capturing real‑world coding interaction data to drive RL and automation.
  • Others question how much developers will tolerate their editor analytics being used to build tools meant to replace them; some foresee many doing it anyway due to incentives or employer pressure.
  • A “prisoner’s dilemma” narrative appears: teams that avoid AI risk losing to those that embrace it, even if everyone suspects it erodes job security.

Strategic logic (or irrational bubble?) of buying wrapper IDEs

  • Some see this as classic vertical integration: like breweries buying pubs, OpenAI would secure distribution and make its models the “default” in popular IDEs.
  • Comparisons are drawn to Facebook buying Instagram/WhatsApp and to default search engine deals in browsers.
  • Others think paying billions for VS Code forks with prompt UIs and no proprietary models is irrational “Yahoo 2.0” behavior and a sign OpenAI may be hitting architectural limits instead of achieving AGI.
  • There’s skepticism about OpenAI spreading into too many fronts (IDE tools, possible social media, etc.) and losing focus on core models.

Lock‑in, choice, and user reactions

  • Some users say they’ll cancel if OpenAI acquires Windsurf; others would welcome Windsurf bundled into ChatGPT Plus.
  • A key concern: whether an acquired IDE would still support Anthropic, Google, DeepSeek, etc., or become OpenAI‑only. Many currently use Cursor/Windsurf precisely to mix models.

Competition and alternatives

  • Commenters note strong open‑source or cheaper setups: Cline + DeepSeek, Aider + OpenRouter, Gemini 2.5 Pro in custom flows, Claude Code, and VS Code’s own new Agent mode.
  • Microsoft is seen as having the endgame power via VS Code; Google’s Firebase Studio / idx is mentioned as a potential 800‑pound gorilla if they double down.
  • JetBrains’ Junie and Windsurf-on‑JetBrains are noted but seen as less polished than Cursor today.

Developer experience and sentiment

  • Many enjoy the “magic” of agents wandering a codebase and acting like a very smart junior dev, increasing joy and enabling doc‑driven or exploratory workflows.
  • At the same time, there’s a dark undercurrent: people marvel at the tools while worrying that the “cute junior dev” may grow into their replacement.
  • Some see embracing these tools as pragmatic self‑preservation (learn to operate the machines); others call developer enthusiasm for their potential replacement “really, really dumb.”

TikTok is harming children at an industrial scale

Scope: TikTok vs “all social media”

  • Many argue TikTok is not uniquely harmful: Instagram Reels, YouTube Shorts, Snapchat, Facebook, X, Reddit, Discord, etc. are seen as running the same engagement-maximizing playbook.
  • Others push back on “whataboutism,” noting the article’s author has long criticized social media broadly and that targeting TikTok doesn’t imply US platforms are benign.
  • Some think singling out TikTok is politically driven; others say it makes sense to start with the platform that dominates youth attention.

Mechanisms of harm and what’s new

  • Core problem identified: infinite scroll + short-form video + algorithmic feeds tuned for engagement, not wellbeing.
  • Reported effects: diminished attention span, inability to tolerate boredom, difficulty with long-form reading, mental health issues (anxiety, depression, body dysmorphia), and compulsive use in both kids and adults.
  • Several see this as qualitatively different from TV, video games, or music: personalized feeds, ubiquity on phones, and dense dark patterns make it more like gambling or drugs.
  • Others say every generation has a “media panic” (TV, rock, D&D, games) and warn against overreacting, though some concede that this time the data on teen distress post‑2010 look more worrying.

Parental responsibility vs regulation

  • One camp: parents are primarily responsible; giving a child unsupervised access to TikTok/YouTube is likened to neglect, similar to leaving them with alcohol.
  • Counterpoint: individual parenting can’t solve peer effects and industrial-scale manipulation; “you can’t raise kids in a silo.”
  • Policy ideas floated: higher minimum ages for social media accounts, strict age verification, limits or taxes on algorithmic feeds, bans or throttling of infinite scroll, stronger privacy laws, and competition policy to weaken network-effect monopolies.
  • Others fear heavy-handed regulation, First Amendment conflicts, or “government as parent.”

Geopolitics and motives

  • Some see anti‑TikTok rhetoric as driven by national security: potential for Chinese state influence, data access, and covert coordination of crowds.
  • Others think the main driver is its refusal (relative to US platforms) to align with certain foreign-policy narratives (e.g., Palestine/Israel), or more generally as a trade‑war tool.
  • Several emphasize that US‑owned platforms already cause comparable social and political damage at home.

Coping tactics and alternative norms

  • Many parents in the thread describe strict regimes: no TikTok, banning YouTube entirely or Shorts only, whitelisting content via YouTube Kids, downloading videos and serving them offline, or using curated games and long-form shows instead of algorithmic feeds.
  • Practical tricks: disabling YouTube watch history to kill Shorts, using alternative frontends (Invidious, Jellyfin + yt‑dl), screen‑time rotation (e.g., only every second day), or limiting kids to specific non‑“dark pattern” games.
  • Several note that adults also struggle badly, deleting apps, installing blockers, or relying on Screen Time codes managed by partners.

Debate over evidence and “moral panic”

  • Some commenters think the social-science case against phones/social media is strong and that we’d be irresponsible to ignore it.
  • Others criticize the underlying research as methodologically weak or overconfident, and see a pattern of “boy who cried wolf” moral panics.
  • A recurring meta-critique: focusing solely on TikTok misses the structural issue—the ad-funded attention economy optimized to exploit human psychology at scale.

Encryption Is Not a Crime

Political efforts against encryption

  • Many comments focus on EU “chat control” and similar US efforts as recurring attempts to criminalize or weaken encryption, often exempting politicians and law enforcement themselves.
  • Motives are seen as a mix of “think of the children” and “tough on crime” messaging, which several describe as emotional, manipulative, and resistant to rational rebuttal.
  • Some note a surveillance‑industry lobby behind such laws, and connect this to broader systemic corruption and revolving‑door politics.

Tools, crime, and bad analogies

  • Participants compare banning or weakening encryption to banning air, wheels, roads, or houses because criminals use them, arguing encryption is a general‑purpose tool with both good and bad uses.
  • Others criticize oversimplified argument templates on both sides and warn against strawman analogies that ignore real harms.

Law enforcement access and backdoor schemes

  • A long subthread explores a “devil’s advocate” proposal: expiring, warrant‑based decryption certificates issued by vendors.
  • Critics argue any mechanism that lets a third party decrypt data is effectively a master key, vulnerable to abuse, leaks, coercion, and future authoritarian regimes.
  • Some stress that encryption doesn’t make investigations impossible, just less scalable and more work‑intensive; mass access to cleartext is framed as institutional laziness.
  • There is acknowledgement that surveillance has helped catch some terrorists, but several question effectiveness, trade‑offs, and lack of proper counterfactuals.

Trust, rights, and slippery slopes

  • A recurring theme is distrust of governments and police: even if “good” today, they may change, and powers granted are rarely rolled back.
  • Many see the right to try to keep secrets as foundational; making strong security itself suspicious or illegal is described as inherently tyrannical.
  • Some compare the call for backdoors to torture or prior eras of overbroad national‑security measures.

Nature and necessity of encryption

  • Commenters emphasize that modern internet usage (banking, authentication, messaging, commerce) depends on encryption; without it, routine accounts would be trivially compromised.
  • Others note encryption is not synonymous with privacy: metadata, client behavior, and policy/operational choices still matter greatly.
  • Several argue the public neither understands privacy nor sees where the fight over encryption is happening, making them susceptible to fear‑based arguments.

Toothpaste widely contaminated with lead and other metals, US research finds

Heavy Metals, Hypertension, and Chelation Therapy

  • One participant links idiopathic hypertension to cumulative heavy metal exposure and reports self-directed chelation and supplementation (e.g., selenium) improving blood pressure.
  • Others strongly warn that chelation is risky, should be reserved for confirmed poisoning, and is often pushed by “quack” practitioners as a cure-all.
  • There is disagreement over mainstream medicine: some see doctors as overly dogmatic, others emphasize the need for evidence and hospital-based expertise before using chelation.
  • A more technical commenter notes that blood tests may miss metals stored in tissues, and mentions protocols involving enzymes and EDTA, but this remains anecdotal and controversial in the thread.

How Contaminated Is Toothpaste, and Does It Matter?

  • Commenters highlight that most tested toothpastes were below current FDA lead limits (10,000 ppb for children’s products; 20,000 ppb for adults) but often above much lower proposed or state-level limits (e.g., 2–5 ppb in proposed baby-food standards; 1,000 ppb in Washington state).
  • Debate centers on whether “no safe level of lead” in principle means any detectable amount in toothpaste is unacceptable, versus a more risk-based view that small doses from a non-swallowed product are insignificant compared with other exposures.
  • Some stress bioaccumulation and total lifetime dose across all foods, water, supplements, and consumer products, arguing current standards don’t account for cumulative, multi-source exposure.

Credibility of the Testing and Potential Conflicts

  • Several comments scrutinize the blogger-led testing (Lead Safe Mama), noting:
    • Single source, activist orientation, and affiliate links to “safe” products as potential conflicts of interest.
    • Unclear methodological details and possible misuse or limitations of ICP‑MS in complex consumer products.
  • Others counter that independent testing must be funded somehow, affiliate links are common (e.g., Consumer Reports), and government isn’t filling this role.

Fluoride, Toothpaste Use, and Alternatives

  • Some users report avoiding toothpaste entirely, citing research that brushing itself provides most plaque removal; fresh toothbrushes are emphasized as more important than paste choice.
  • Others defend fluoride as beneficial and safe at typical levels and note that some low- or zero-metal toothpastes lack fluoride.
  • Pediatric concerns arise: children often swallow toothpaste, and newer guidance to avoid rinsing after brushing increases contact time, which makes lead findings feel more relevant to some parents.

An intro to DeepSeek's distributed file system

Workload and Motivation

  • 3FS is described as born in a high‑frequency trading context (2019) and repurposed for AI workloads.
  • Target workload: huge, mostly read‑heavy datasets, petabyte scale, many clients, extremely high random‑read throughput.
  • Some suggest ML workloads only really need capacity, parallel reads, and redundancy, not strong consistency; others strongly push back that “consistency is hard, so skip it” tends to end badly at scale.

Architecture and Performance Characteristics

  • Architecturally, it’s a scale‑out metadata filesystem (like Colossus, Tectonic, HopsFS, etc.) with metadata in a distributed DB (FoundationDB).
  • Key points people highlight:
    • NVMe + RDMA, optimized for huge batched random reads from a small set of large files.
    • FUSE client for convenience, but with a hybrid mode: open via FUSE, then use a native library for the data path to avoid FUSE overhead.
    • Very high random IOPS per node (tens of GiB/s, multi‑million 4K IOPS) reported; metadata ops (mdbench) not especially stellar.

Comparisons to Other Systems

  • ZFS: acknowledged as not scale‑out; can grow storage on one node but not aggregate multiple machines for parallel IO.
  • CephFS: praised for real‑world PB‑scale and used at large orgs; criticized as complex to run and relatively slow on modern NVMe without major tuning; some counter with recent Ceph benchmarks (TiB/s, multi‑million IOPS).
  • Alluxio, HopsFS, ObjectiveFS, JuiceFS, SeaweedFS:
    • Alluxio/others already have FUSE and tiered storage; 3FS’s differentiator is truly scale‑out metadata and RDMA‑centric design.
    • JuiceFS/S3‑backed designs trade much higher latency for simplicity and cheap capacity.
    • SeaweedFS focuses on tiny objects with minimal metadata; 3FS on huge files, chunked and read at very high random IO rates with POSIX access.

Operations, Cost, and Cloud Constraints

  • Running your own 3FS‑style cluster on AWS vs FSx Lustre: rough back‑of‑envelope puts it ~12–30% cheaper, but you now own all operational complexity.
  • Several comments note that any self‑run storage cluster (Ceph included) is an operational bear.
  • Complaints that public‑cloud NVMe throughput lags commodity on‑prem SSDs, affecting how replicable 3FS‑like performance is in the cloud.

Durability, Backup, and DR

  • Common pattern: rely on intra‑cluster replication for hardware failures; use snapshots and possibly separate datacenters for “fat‑finger” and disaster recovery.
  • Distinction between redundancy (for continuous operation) and backups (for rollback in time and catastrophic mistakes) is emphasized.
  • Techniques mentioned: cross‑region mirroring, nearline/snapshot tiers, and traditional tape at hyperscaler scale.

Security and Backdoor Debate

  • One subthread questions the odds that 3FS is backdoored.
  • Responses split:
    • Some say it’s low‑probability, especially if deployed on isolated networks.
    • Others argue supply‑chain and vendor backdoors are a very real, historically demonstrated risk, and that treating them as “odd” concerns undermines serious threat modeling.
  • Discussion touches on nation‑state involvement and the need for defense‑in‑depth even for “internal” infrastructure.

Other Questions and Speculation

  • Comparisons for homelab / small‑scale setups (JuiceFS+S3, SeaweedFS) focus on latency vs simplicity rather than raw performance.
  • Open questions raised (but not fully resolved) about:
    • How capacity expansion is handled in practice.
    • What happens on metadata manager failures and what redundancy model is used.
  • One commenter wonders if this kind of FS makes large, CPU+NVMe‑based distributed LLM inference/training more viable, but no concrete performance analysis is provided.

Discord's face scanning age checks 'start of a bigger shift'

Accuracy and Bias of Face-Based Age Checks

  • Many doubt AI can reliably distinguish, say, 17y11m from 18, or handle young‑looking adults, early or delayed puberty, and medically or hormonally atypical users.
  • Examples include adults routinely mistaken for teens and teens who look much older, plus reported failures of existing KYC face systems.
  • Concerns about racial bias and lighting (e.g. Black users needing many more attempts) and about trans users or people on puberty blockers being misclassified.
  • Commenters note edge cases aren’t rare, so false negatives could be common and hard to appeal.

Privacy, Biometrics, and Surveillance Fears

  • Strong worry that “we don’t store your face” is a semantic dodge: embeddings or “biometric metadata” can still uniquely identify people and be leaked, sold, or subpoenaed.
  • Many see this as normalization of biometric collection and the erosion of online anonymity, with parallels drawn to RealID, SIM registration, and face‑scanning borders.
  • Some fear a trajectory toward mandatory real‑ID for all internet use, centralized databases exploitable for blackmail or targeting minorities, and a broader “compliance‑industrial complex.”

Parents vs State: Who Should Protect Kids?

  • One camp says this is parental responsibility; laws are overreach and a power grab disguised as child protection.
  • Others argue parenting alone is unrealistic: social ostracism if kids are kept off platforms, widespread harms from algorithmic feeds, and analogies to age limits on alcohol, cigarettes, porn, and driving.
  • There’s tension between wanting to shield kids from porn and social‑media harms and not accepting mass ID checks or biometrics as the price.

Effectiveness and Workarounds

  • Many predict trivial circumvention: VPNs, older friends’ faces, stolen or shared IDs, AI‑generated faces, or moving to less‑regulated chat systems.
  • That leads some to label this “security theater” that mainly increases data collection while pushing kids to darker, less moderated corners of the net.

Legal and Structural Concerns

  • Commenters mention UK, Australian, US state laws and court cases as part of a broader, messy legal push on age verification that may be designed to be impossible to fully comply with.
  • Some small service operators plan to geoblock the UK rather than implement complex checks, expecting this might eventually force policy rollback.

Proposed Technical Alternatives

  • Ideas floated: device‑local age estimation with attestation tokens, bank/government‑issued verifiable credentials (e.g. OpenID‑based), national e‑ID systems, or simple content‑rating headers plus device/ISP filters.
  • Critics respond that coordination, incentives, issuer trust, and eventual misuse (for broader discrimination and tracking) make these “clean” crypto solutions fragile in practice.

Impact on Platforms, Users, and Society

  • Some see this as accelerating a shift off Discord (especially for open‑source projects) and entrenching big incumbents and specialized compliance vendors.
  • Others emphasize collateral damage: cutting abused, queer, or isolated teens off from vital online support; excluding people who can’t easily be verified; and further normalizing pervasive identity checks online.

mIRC 7.81

New release and ongoing development

  • Several commenters are surprised mIRC is still actively developed; 7.81 (April 9, 2025) is noted as a milestone for ~30‑year‑old, largely solo‑maintained software.
  • Some confusion stems from the main site not clearly dating the front‑page news; multiple people argue the HN post should have linked directly to the news page.

Platform, licensing, and business model

  • mIRC is still proprietary and Windows‑only; some Linux/macOS users mention WINE as a workaround and gripe about ARM Macs.
  • A long subthread revisits the “lifetime license” controversy:
    • One side says early “lifetime” licenses were effectively capped at ~10 years and that this feels like a broken promise.
    • Others report old licenses (2010 and even earlier) still working and note archived FAQs that asked old users to re‑register if they could, or email for a free renewal.
    • It’s unclear what the current policy is; some say the stricter approach has been quietly softened.
  • A few people speculate mIRC likely was, or is, a multi‑million‑dollar business, but this is based on filings and guesswork, not detailed discussion.

mIRC scripting and learning to program

  • Many reminisce that mIRC scripting was their first real programming environment: bots, trivia games, auto‑responses, custom dialogs, even full GUIs and Win32 API hacks.
  • The immediacy (“my friends can use this right now”) is contrasted with more abstract “hello world” learning.
  • People compare today’s equivalents (Roblox scripting, Discord bots) but note higher friction and less openness than raw IRC.

IRC vs Discord, forums, and modern platforms

  • Views on IRC’s health diverge: some call it a “wasteland,” others say tech/science channels and certain networks are still solid.
  • Discord is seen as the de facto replacement for group chat but criticized as a silo, poor archive, and bad substitute for forums.
  • Large tangent on vBulletin‑style forums vs Reddit/HN:
    • Pro‑forum: better long‑term organization, stronger sense of community, no karma‑driven “hivemind,” good for work and niche hobbies.
    • Anti‑forum: huge threads are hard to mine; modern threaded + voting systems surface relevance better.
    • Several note how votes become de facto agreement signals and can suppress unpopular but accurate content; ideas like AI‑based scoring are floated.

Alternative IRC clients and ecosystem

  • For non‑Windows users, HexChat is suggested as a “spiritual successor,” though it is now explicitly abandoned and depends on community patches.
  • Halloy (Rust + iced GUI) is highlighted; some push back on the trend of “X but in Rust” rewrites.
  • Other clients mentioned include irssi, WeeChat, and historic ones like amIRC and KVIRC; one point notes mIRC as having strong IRCv3 support.

Nostalgia, warez, and culture

  • Many share memories: school IRC servers, town‑specific channels, the mIRC connection sound, About‑box easter eggs, scripting “AI” bots, and custom scripts like NoNameScript/ircN.
  • Several recount using mIRC for MP3 and warez trading (DCC, FTP trading rings), early broadband excess, and university or law‑enforcement encounters from that era.
  • There’s a sense that early IRC + forums culture fostered deeper, less gamified conversation than much of today’s social media.

As 'Bot' Students Continue to Flood In, Community Colleges Struggle to Respond

How the scam works

  • Several commenters clarify that aid isn’t only tuition: Pell grants, loans, and other packages often include living-expense money beyond what the college charges.
  • Excess funds, after tuition/fees, are refunded to the student’s bank account; scammers exploit this by creating fake identities, enrolling in multiple online classes, doing minimal AI-generated work for a few weeks, then cashing out.
  • Some aid is not strictly mediated by the college’s bursar, further widening attack surface.
  • One community college professor describes 10–50% of students in some online sections being “fake,” with telltale boilerplate posts and mismatched contact info.

Online vs in‑person education

  • One camp argues the fix is to stop or sharply limit online classes, claiming online quality is worse, cheating is rampant, and community college should be a “grind” that certifies real learning.
  • Others counter that online and remote formats are essential for: working adults, parents, people in conservative/controlling homes, disabled or ill students, and those far from campus. For many, the alternative isn’t in‑person school; it’s no school.
  • Experiences with online programs vary: some report high engagement and solid learning (e.g., online master’s), others say even well-designed courses still feel weaker than in-person.

Financial aid, incentives, and fairness

  • Critics say California is effectively “paying people to attend online community college,” creating predictable fraud and burdening taxpayers, including non-college-goers.
  • Supporters argue that modest living-support aid is necessary so low‑income students don’t need full‑time work, and that societal returns (better jobs, higher taxes, less social-service use) justify subsidies.
  • There is debate over “skin in the game”: some claim paying nothing reduces commitment; others note plenty succeed without debt and that free K–12 is already accepted.
  • One figure cited: this fraud is about 0.3% of total state student aid, suggesting it’s sizable but not system-dominating.

Verification and proposed fixes

  • Suggested countermeasures include: mandatory in-person orientation or first-week attendance for aid recipients; random or repeated ID checks; tying aid to demonstrated participation; paying landlords/booksellers directly; or limiting first-time online-only enrollment.
  • Critics of in-person requirements warn this can exclude exactly the populations aid is meant to help.
  • Commenters note colleges are starting to use third-party ID verification services, but AI and global connectivity make “Sybil attacks” on aid programs much easier.

Broader concerns

  • Some see this as one instance of a wider “post-truth” era where distinguishing real from fake (students, work, identities) is increasingly hard, and where both access and integrity are in tension.

Which year: guess which year each photo was taken

Overall reception & gameplay

  • Widely described as very fun and addictive; many say they’ll add it to their daily “-dle” rotation.
  • Players post scores and average years off; many land in the 2–10 year range, some as high as ~14 years off, a few near-perfect.
  • People enjoy the satisfaction of “just knowing” from subtle cues, not only from recognizing famous events.

Strategies and difficulty

  • Common heuristics: clothing, hairstyles, film/print quality, presence/absence and type of phones, smoking indoors, car/architecture styles, and event context.
  • Several rounds hinge on recognizable events (Arab Spring, London Blitz, gay marriage protests, disco era), making precise dating easier for history buffs.
  • Black‑and‑white early‑20th‑century images, especially beach/swimsuit photos, are consistently the hardest and can throw guesses off by decades.

Design, UX, and mobile issues

  • UI is praised as polished and more pleasant than some predecessors; the end-of-game global score distribution is a standout feature.
  • Complaints: laggy year slider on some iOS devices, difficulty zooming on Firefox/Android, and unintuitive full-image close (no Escape key support).
  • Share output is considered cluttered (too many metrics) and the emojis for per-photo accuracy are confusing; the “blind person” emoji is specifically called out as a poor choice.

Daily format & feature requests

  • Current mode is a single 5‑photo daily challenge. Some appreciate the wordle-style cadence; others find “come back tomorrow” frustrating and want freeplay/grind modes and multiplayer.
  • Requests include clickable logo to return home, clear “play again” or “next day” cues, per‑photo distributions, and better share text (clickable URL, different wording).

Use of AI and data concerns

  • Several users test frontier models (o3, GPT‑4o), which nearly ace the game; debate ensues over memorization (training on the same web photos) vs genuine visual reasoning.
  • Some speculate games like this could double as labeling interfaces for training “when-was-this-taken” models; others note the underlying archive already has dates.

Photo selection, history, and culture

  • Mixed feedback on very old photos: some find them frustrating and want fewer; others say they’re the most fun and want them kept, especially since they’re scored more leniently.
  • Some non‑US players note difficulty when events are strongly US‑centric.
  • Multiple commenters observe that fashion appears to have changed less since the 2000s (“stuck culture”), making recent years harder to distinguish than mid‑20th‑century decades.

Comparisons & related games

  • Frequently compared to chronophoto.app (same core idea but this has nicer UX/daily structure) and to timeguessr/WhenTaken, which also ask for location.
  • A few users link similar chronoguesing and ethnicity‑guessing games as adjacent curiosities.

Bugs and minor issues

  • Reported issues: stats page double‑counting a single game, minimum “top 2%” display, timezone confusion around when the new daily puzzle unlocks, and share dates not matching the puzzle’s actual day.

US Government threatens Harvard with foreign student ban

Blame, Responsibility, and Protests

  • One axis of debate is whether anger should focus on Trump/Republicans in office or on the voters who put them there.
  • Some argue Trump is “a symptom, not the disease”: Republican voters, often consuming partisan media, are ultimately responsible.
  • Others stress individual responsibility over “brainwashing,” while a counterview emphasizes the overwhelming power of corporate and social-media propaganda.
  • There’s disagreement on efficacy of protests: some call them pointless in an increasingly autocratic culture; others say they signal resistance to officials, voters, and non‑voters and are a key part of a political “ecosystem.”

Authoritarian Drift and Use of State Power

  • Many see the Harvard threats (funding, tax status, foreign student visas) as classic dictatorship tactics: coercing institutions into ideological submission and punishing disobedience.
  • Commenters link this with visa cancellations, proposed renditions to foreign prisons, targeting law firms, corporations, media, and the military—interpreting it as a broad project to dismantle rival power centers.
  • Several note the Supreme Court’s presidential immunity ruling and the replacement of experienced officials with loyalists as critical enablers; Trump 2.0 is viewed as more prepared, vengeful, and unconstrained than in his first term.
  • Comparisons to historical authoritarian regimes (Hitler, Putin) are contested but recur; some think such analogies are premature, others say waiting for mass atrocities is exactly how societies sleepwalk into them.

Universities, Harvard, and Foreign Students

  • Harvard’s role divides commenters: some see it as a key research and medical institution whose defunding harms the country; others say it’s an exclusivist brand that is not “noble” and already mired in racial politics.
  • There is debate over race-conscious programs and affinity events under civil-rights law, with opposing readings of whether they constitute illegal discrimination.
  • On foreign students, some think the threat is bluster or that fewer people want to come anyway; others cite high international demand (India, Australia) and note Harvard’s large foreign share and need-blind policies.
  • Several foreign-educated participants now advise students not to study in the US, citing visa precarity, xenophobic targeting, and safety concerns.

Culture War, Media, and Identity Politics

  • Right-wing support is variously attributed to economic anxiety, identity politics, or deep resentment of “coastal elites” and perceived cultural marginalization.
  • Others insist these are still “material conditions” (status, class, geography) and point to long-running information warfare and partisan media ecosystems.
  • Disputes over “cancel culture,” DEI, and trans athletes are framed by some as core moral battles, by others as distractions compared to institutional collapse.
  • A recurring worry is that both left and right are eroding liberal norms, but with one side now openly embracing authoritarian methods.

America’s Trajectory and Constitutional Design

  • Several trace today’s crisis back to post‑9/11 expansions of executive power, AUMFs, torture, and the security state under both parties.
  • The US presidential system is criticized as too executive‑heavy; some contrast it with parliamentary systems where leaders are more easily removed.
  • Others argue the system was meant to restrain presidents, but Congress and courts have progressively abdicated, letting emergency powers and military authority be abused.
  • Federalism, state National Guards, and a heavily armed populace are seen by some as remaining checks; others warn these factors could just as easily fuel internal conflict.

International Perceptions and Personal Choices

  • Non‑US commenters describe the US as sliding toward “banana republic” or “age of darkness,” while acknowledging its enduring tech, scientific and financial dominance.
  • There’s tension between seeing the decline as driven by capitalism and inequality versus identity backlash and culture war.
  • Some former Trump‑neutral or even sympathetic voices openly recant, saying the “Rubicon” was crossed with extrajudicial renditions and direct attacks on universities and courts.

HN Meta-Discussion (Flagging & Politics)

  • A long subthread debates why this and similar political posts get flagged or downranked on HN.
  • Explanations range from user fatigue and anti‑politics norms to claims of ideological suppression.
  • Moderators reiterate that HN is not a current‑affairs site, political topics already get large threads, and front-page space is intentionally limited and curated against repetition.

Advanced Shell Scripting with Bash (2006) [pdf]

Access to the material and updates

  • Original 2006 slides are still available (HTTP and archive); confusion arose from lack of HTTPS.
  • A new 2025 talk, “Seat Belts and Airbags for bash,” with updated slides and an 87‑minute video is linked.
  • The same author maintains a stringent.sh library used in the newer talk, available on GitHub.

Safer Bash scripting practices

  • The slides and newer talk focus on avoiding Bash pitfalls and building “production‑quality” scripts rather than teaching basic syntax.
  • People highlight set -e/errexit, pipefail, and especially trapping ERR with LINENO for stack‑trace‑like debugging.
  • Greg’s Bash wiki and ShellCheck are repeatedly recommended as core resources for learning good patterns and avoiding common mistakes.
  • There is interest in reference variables as a safer alternative to eval, and in potentially expanding material to cover debugging and use with sudo.

Anti‑patterns and the limits of Bash

  • Several commenters argue that “advanced” Bash is usually a bad idea; the main skill is knowing when to stop and switch languages.
  • A notorious pattern buggy_command || : is called out as effectively “a penny in the fusebox,” hiding failures in deployment scripts.
  • Some stress that complex parameter expansion (${var##pattern}, deep nesting) quickly becomes unreadable and unmaintainable.

Alternatives to Bash for scripting

  • Many share “replacement” or “escape hatch” languages: Python, Ruby, Perl, Raku, Lua (and LuaJIT), awk/gawk, Guile, QuickJS‑based JS, zx, xonsh, nushell, Elvish, Murex, Oil, NGS, schemesh.
  • Tradeoffs discussed include startup cost, availability on target systems, standard library richness, subprocess ergonomics, typing, and learning curve.
  • Views differ on stringly‑typed languages (Bash, Tcl, Perl): some see them as inherently fragile; others defend Perl and modern Tcl as more capable than caricature suggests.

What shells are really for

  • Several comments frame Bash primarily as a “subprocess orchestration language” whose superpower is piping and job control, not rich data structures.
  • Guidelines emerge: use Bash for simple glue around existing tools and environment setup; use a general‑purpose language once you need complex flow, data structures, or nontrivial text/structured‑data processing.
  • A linked parable (“Emperor Sh and the Traveller”) and personal practices reinforce the idea that good shell scripts wrap existing tools rather than re‑implement them.

“Most promising signs yet” of alien life on a planet beyond our Solar System

Reported Finding on K2-18b

  • JWST spectra of K2‑18b (a cool, likely ocean-bearing exoplanet) show methane and CO₂ plus a tentative signal of dimethyl sulfide (DMS) and dimethyl disulfide (DMDS), gases that on Earth are strongly associated with marine life.
  • The DMS/DMDS detection is currently at ~3‑sigma significance (≈0.3% chance of being noise), below the ~5‑sigma bar usually expected for a “discovery.”
  • The planet’s hydrogen‑rich atmosphere and position in the habitable zone make liquid water and some form of chemistry-rich environment plausible, but its conditions are very unlike Earth’s.

Statistical and Methodological Skepticism

  • Multiple comments stress that 3‑sigma is not “very low” false-positive risk and could be improved only with more observation time or better instruments.
  • One detailed critique argues possible “p‑hacking”: fitting a weak spectrum against a small, handpicked set of candidate molecules (including speculative biosignatures), while ignoring a much larger space of plausible infrared‑active gases.
  • Others reply that early, somewhat noisy detections are acceptable as hypothesis generators, provided follow‑up work is done and caveats are clear.

Abiotic DMS and Biosignature Ambiguity

  • Several links point to detections of DMS in comets and the interstellar medium and to work arguing for efficient abiotic production, undermining “only from life” claims.
  • Counterpoints note that sustaining ppm–level DMS/DMDS in a large atmosphere may still be hard to explain without biology, especially without abundant H₂S, but this remains unsettled.
  • Many emphasize the need for multiple independent biomarkers and much better lab data on cross‑sections and abiotic pathways.

Media, Hype, and Scientific Communication

  • Strong criticism of headlines that drop qualifiers like “promising signs” and of press outreach that leans into “ALIENS?!” while the paper itself is careful and tentative.
  • Some argue sensational coverage erodes trust; others say it at least gets people to read about real science.

Broader Context: Life, Fermi, and Travel

  • Long side discussions cover: life vs intelligent life rarity, the Great Filter, dark‑forest vs cooperation scenarios, and whether quiet skies imply short‑lived civilizations.
  • Many note that even nearby exoplanets are unimaginably far (hundreds of trillions of km), making visits effectively impossible with foreseeable propulsion, so atmospheric spectroscopy may be our main tool for a long time.

The Halting Problem is a terrible example of NP-Harder

Halting problem, finite machines, and “fantasy” models

  • Some argue that on a finite-state machine the halting problem is decidable: after at most 2ⁿ steps you either halt or revisit a state and thus loop forever.
  • Others respond this misses the classical halting problem, which assumes unbounded program size and unbounded memory (Turing machines), not fixed finite hardware.
  • It’s noted that physical machines can be modeled with I/O and external storage to approximate “unbounded” memory, and that tracking the full state space is astronomically impractical even if finite.
  • This leads to the broader point: many impossibility results use infinite or asymptotic assumptions, but still map to “no reasonable way to do this” in practice.

Usefulness and limits of Big-O in the real world

  • One subthread debates whether Big-O is “almost useless” for real-world problems because constants and small N dominate.
  • Counterarguments: Big-O is crucial for reasoning about scalability and for insights like hybrid sorts (quicksort + insertion sort) and algorithm choice.
  • Critics emphasize that empirical benchmarks and more detailed cost models (cache, memory layout, constants) are needed beyond pure asymptotics.

NP, NP-hard, NP-complete, and beyond

  • Several comments clarify:
    • NP-complete = NP ∩ NP-hard.
    • NP-hard problems may lie outside NP (e.g., not polynomially verifiable).
    • Membership in NP is about ease of verification, NP-hardness about difficulty of solving.
  • There’s discussion of HALT as RE-complete and “bigger” than NP, and of the time hierarchy theorem and polynomial hierarchy as more precise frameworks than just invoking halting.

Vector Addition Systems / Diophantine reachability as “NP-harder”

  • The article’s grid/jump problem is identified as Vector Addition System (VAS) reachability, equivalent to Petri nets.
  • Key property: shortest witnesses can be Ackermann-scale long, far beyond any polynomial in input size, so even verifying a “path” certificate is not polynomial in the original input. Hence it’s decidable and NP-hard but not in NP.
  • Some readers struggle with decision vs search formulations and with separating “long outputs” from genuine super-polynomial verification cost.

Approximate halting and practical complexity

  • A side discussion covers partial “halting oracles” (time-bounded or problem-restricted analyses), genetic programming with cutoffs, and heuristic solvers.
  • Consensus: such methods don’t evade the fundamental theorems; they exploit that many real instances are easy while the worst cases remain intractable.

US judge finds administration wilfully defied court order in deportation flights

Rule of Law vs. Constitutional Crisis

  • Many argue the administration’s defiance of the deportation order shows the US is effectively “lawless,” with courts unable to restrain executive power in practice.
  • Others say it’s serious but not yet a full constitutional crisis: courts are still issuing orders and contempt findings; a true crisis would be systematic noncompliance or ignoring a clear Supreme Court ruling.
  • Several see this as part of a longer slide: precedents like pardoning contempt of court are framed as proof the president can nullify judicial checks.

Courts, Contempt, and Pardons

  • Lawyers in the thread highlight a key pressure point: if officials are held in criminal contempt and then pardoned, judicial authority is effectively gutted.
  • Arpaio’s pardon is cited as a prior “proof of concept”; disagreement over whether that already constituted a constitutional crisis.
  • Debate over presidential pardon power: some see it as a dangerous contradiction of separation of powers; others note its intended use as a humanitarian safety valve, albeit vulnerable to abuse.

Enforcement, the Military, and “Who Has the Guns”

  • Skepticism that any order against senior officials would be enforced, since the executive controls federal law enforcement.
  • Discussion turns to whether the military would obey unconstitutional orders against citizens; some believe the oath to the Constitution would hold, others fear politicization of the officer corps and “civil war 2.0” scenarios.

Public Response and Political Culture

  • Multiple comments criticize US public complacency compared to mass protests and strikes in Europe or Ukraine’s Maidan, arguing that online outrage without sustained action changes little.
  • Others counter that sizable protests are happening but lack organizing infrastructure for general strikes; current activism is seen as groundwork for that.

Immigrants’ Rights as Everyone’s Rights

  • Strong concern that if habeas corpus and due process can be ignored for a documented migrant, the precedent can extend to citizens, corporations, and political opponents.
  • Some note that support for harsh measures is high while targets are immigrants; warnings that “it won’t stop there” are common.

System Design and Structural Limits

  • Discussion of the founding framework: one branch controls the military; no system can fully “design around” a mad or authoritarian executive.
  • Some argue the aged US constitutional order hasn’t been updated like other countries’ and is now colliding with modern realities (instant communication, mass surveillance).

Zoom outage caused by accidental 'shutting down' of the zoom.us domain

What actually happened (as inferred by commenters)

  • Official explanation: a “communication error” between Zoom’s registrar (MarkMonitor) and the .us registry operator (GoDaddy Registry) led to zoom.us being “shut down.”
  • DNS symptom: the domain was in serverHold status, which removes NS records so the domain stops resolving.
  • Several participants say serverHold is usually legal/nexus-related, not a typical “oops,” so the vague “communication error” sounds incomplete.
  • Speculated mechanisms:
    • Mistyped domain in an enforcement/takedown request (e.g., anti‑abuse tooling hitting zoom.us instead of a similar domain).
    • Wrong EPP status code applied (e.g., intending serverUpdateProhibited but setting serverHold).
    • Less likely: renewal/billing, since the renewal date and status codes don’t match normal expiry behavior.
  • ThousandEyes analysis is referenced for timeline and DNS behavior, but it also doesn’t fully explain why the hold was applied.

Responsibility: GoDaddy vs. MarkMonitor vs. Zoom

  • Many argue GoDaddy Registry bears primary blame for applying a registry‑level hold on a globally critical domain with minimal friction.
  • Others stress that “miscommunication” implies MarkMonitor’s side also failed; Zoom pays them precisely so things like this never happen.
  • Some claim (without clear public evidence) that MarkMonitor requested a safer lock and GoDaddy misapplied it.

Registrar, registry, and DNS choices

  • Clarifications:
    • MarkMonitor = registrar and brand‑protection service.
    • GoDaddy Registry = .us TLD operator; unavoidable if you insist on .us.
    • Zoom’s DNS itself runs on AWS Route 53.
  • Multiple people mock the idea of any critical service being at the mercy of GoDaddy, citing long‑standing reputational and UX issues.
  • Others counter that scale and base rates matter; widely used providers will naturally feature in more outage stories.

Risk of ccTLDs and architectural lessons

  • Incident fuels skepticism about relying on ccTLDs (.us, .io, .ps, etc.) for core brands:
    • Political/jurisdictional risk, arbitrary policy or pricing changes, weaker privacy (.us bans WHOIS privacy).
  • Counterexamples: some ccTLD operators (.de, .ca, .ch) are praised as stable and well‑run.
  • Architectural takeaways suggested:
    • Use alternative or backup domains on different TLDs/registrars for clients and status pages.
    • Avoid single‑TLD single‑registrar dependency for mission‑critical services.

Jellyfin as a Spotify alternative

Jellyfin as a Spotify / music server

  • Many use Jellyfin successfully for music, often alongside video (movies/TV/YouTube) on a single home server.
  • Common complaints: weak handling of some formats (e.g., single‑file FLAC + CUE albums), album splitting by folder rather than metadata, and lack of polished music‑specific features compared to dedicated servers.
  • Some users report quirky metadata bugs and S3/object‑storage resistance from maintainers (POSIX filesystem preferred).

Navidrome and other music‑first options

  • Navidrome is repeatedly recommended as superior for music:
    • Lighter scanner, runs on very small hardware (even a 1GB Raspberry Pi).
    • Subsonic‑compatible API gives access to many mature clients on Android, iOS, desktop, and even TVs.
    • Strong “smart playlist” and tagging features.
  • Typical setups: Jellyfin for video, Navidrome for music; or Navidrome + clients like Symfonium, Feishin, play:Sub, Amperfy, Substreamer, etc.
  • Alternatives mentioned: Plex + Plexamp, Lyrion/Logitech Media Server, Roon, Audiobookshelf for audiobooks, local players (foobar2000, MusicBee, Winamp‑style), Sonos via SMB/DLNA/Owntone.

Discovery vs. ownership

  • A major criticism of Jellyfin/Navidrome as “Spotify alternatives” is loss of:
    • Radio‑style recommendations, auto‑mixes, release notifications, and rich discovery tools.
  • Some argue this recommendation layer should be separate (Last.fm, ListenBrainz, Bandcamp, MusicBrainz, radio, blogs), and see the slower, intentional discovery as a feature, not a bug.
  • Others say these discovery features are the core value of streaming; without them, self‑hosting is a non‑starter for their listening habits.

Music acquisition and ethics

  • Sources vary: Bandcamp, iTunes/Amazon/7digital, physical media (CD/vinyl rips), torrents/private trackers, YouTube/yt‑dlp, Spotify/Tidal syncing via tools like Lidarr.
  • Debate over streaming economics: some leave Spotify over poor artist payouts or disappearing catalogs; others see $10–15/month as fair for enormous legal libraries.
  • Several suggest hybrid models: use streaming for discovery, then buy from Bandcamp or similar to support artists and feed the self‑hosted library.

Self‑hosting trade‑offs

  • Motivations: control, avoiding enshittified UIs and lock‑in, privacy, subscription cost reduction, and technical enjoyment.
  • Costs/complexity: hardware, electricity, backups, VPN/remote access (Tailscale, Meshnet, WireGuard), container orchestration, metadata cleanup (Picard, beets, Beets/MusicBee).
  • Consensus: great for technically inclined users willing to tinker; unlikely to replace mainstream services for most people.

Astronomers Detect a Possible Signature of Life on a Distant Planet

Possible Biosignature and Detection Method

  • Thread centers on reported detection of dimethyl sulfide (DMS) in the atmosphere of exoplanet K2‑18b, a proposed “Hycean” world.
  • Commenters are impressed that JWST can infer specific molecules via astronomical spectroscopy: measuring absorption at characteristic wavelengths as the planet transits its star.
  • Some emphasize this requires heavy calibration and sophisticated modeling, not just “look with fancy sunglasses.”

How Strong is DMS as Evidence for Life?

  • On Earth, DMS is only known to arise naturally from biology, so many see it as an exciting candidate biosignature.
  • Others stress that “exciting” ≠ “conclusive”: lab/industrial pathways are straightforward, and plausible abiotic geochemical routes on other worlds cannot be ruled out yet.
  • One argument notes that despite abundant precursors, Neptune does not show detectable DMS, suggesting non‑biological production is not trivial but also not impossible.
  • Debate over whether journalists overstated certainty; defenders note the article repeatedly labels the signal as “possible” and emphasizes follow‑up work.

Status of the Paper and Scientific Process

  • Several commenters track down the preprint and the final journal article, noting initial DOI issues and possible embargo timing.
  • There is mention of another recent paper that did not find significant DMS/CO₂, highlighting evolving and partly conflicting analyses.
  • Future work: more JWST observations, lab simulations of Hycean conditions, and modeling of non‑biological DMS production.

Hycean Planets and Oceanic Civilizations

  • Some want less Fermi-paradox talk and more on Hycean worlds: deep global oceans, possibly no solid surface, with implications for habitability.
  • Extended speculation about whether ocean‑only life could ever reach spaceflight:
    • Barriers proposed: no easy fire, delayed chemistry/metallurgy, difficulty building rockets in water.
    • Counterarguments: underwater labs (caves, trapped gas), alternative energy sources (vents, nuclear), non‑fire metallurgy, rich manipulation via tentacles/claws, many ways to store information (e.g., knot-like systems).
    • Several note our assumptions are land‑biased; an aquatic species could find its own technological pathways and might even have advantages in radiation shielding in space.

Great Filter, Fermi Paradox, and Nearby Life

  • One camp: if we find life only ~120 ly away, that suggests life is common; yet we see no galaxy‑spanning civilizations, so a “Great Filter” likely exists, possibly ahead of us.
  • Others push back:
    • The scary Bayesian argument depends on arbitrary probabilities (e.g., “1 in a million” for intelligence); small changes make the conclusion evaporate.
    • The classic Fermi setup hides assumptions: universal expansionism, long-lived unified civilizations, easy interstellar communication, detectability of advanced civs, etc.
    • Some argue simple or complex life might be rare enough that we’re one of very few or the only spacefaring species in the galaxy—no filter needed beyond that rarity.
    • Alternative views: colonization may stall due to communication delays, genetic/speciation drift, or “positive filters” where civilizations retreat into miniaturized or non-spatial modes (e.g., ultra-dense computation, exotic physics) rather than building Dyson-like megastructures.
    • Others suggest that very advanced civilizations might be effectively invisible to us, just as an insect can’t recognize a house as artificial—though this is challenged by arguments about inescapable waste heat and mass/energy signatures (e.g., Dyson swarms being IR-bright and thus detectable).

Technosignatures and Industry

  • Some suggest looking for industrial “pollutants” (Teflon-like compounds, plastics, steel byproducts) as stronger signs of intelligent life than generic biosignatures.
  • Others note industrial phases might be extremely brief on cosmic timescales; life could be widespread while “industry as we know it” is vanishingly rare or short-lived.

Next Steps and Instrumentation

  • Consensus: confirmation will come from more JWST time and upcoming life-dedicated telescopes, not from rushing to build new instruments immediately.
  • One tangent debates the safety and maturity of current heavy-lift systems (Starship) and whether their development philosophy is too “rushed,” but this is orthogonal to the exoplanet result.

Overall Attitude in the Thread

  • Mix of awe at the technical achievement, cautious enthusiasm about a plausible biosignature, and strong insistence on non-biological explanations being fully explored.
  • Philosophical and probabilistic debates about the Great Filter and extraterrestrial civilizations remain unresolved, with multiple incompatible but carefully argued positions.

Healthy soil is the hidden ingredient

Article content and AI framing

  • Several commenters note the article feels thin and paywalled at the point where it might say something substantial.
  • The “AI for soil” angle is seen by some as hand‑wavy marketing; a few argue it’s the latest buzzword in a long line (after “IoT/Big Data”), used partly to secure grants.
  • Others are curious what concrete AI tooling (e.g. code assistants, data access agents) is actually being used in soil and erosion studies.

What constitutes healthy soil

  • One synthetic list of components (organic matter, microbes, fauna, nutrients, structure, water management) draws criticism as incomplete and AI‑like, mainly for omitting pH, lab testing, and local soil surveys.
  • Multiple comments stress that soil is an ecosystem, not just NPK plus structure; plants depend on fungal networks, bacteria, fauna, and complex interactions.

Pesticides, imbalances, and unintended consequences

  • A detailed slug/soybean anecdote: insecticidal seed treatments killed beetles that normally eat slugs, causing slug outbreaks and costly replanting. Lesson: treated seed can create new problems.
  • The broader point: many “problems” are ecosystem imbalances; adding more targeted chemicals (e.g. molluscicides, copper) can damage fungi and other beneficial life.

Soil vs hydroponics and “magical thinking”

  • One camp: hydroponics/aeroponics prove plants only “need” water, light, NPK, and minerals; soil health is mainly about self‑sustaining systems, not plant physiology.
  • Counter‑camp: hydroponics and conventional “hydroponics in dirt” miss flavor, resilience, and secondary compounds linked to rich soil microbiomes; hydro produce is often described as bland.
  • Several emphasize that providing all nutrients in solution shifts labor and risk onto humans; living soil outsources that work to microbes and fungi.

Practical soil‑building experiences

  • Many detailed, experiential reports:
    • No‑dig, heavy compost/mulch, cover crops, and worm activity transforming poor clay or sand into dark, moist, worm‑rich soil over 2–3 years.
    • Contrasts between great in‑ground soil vs disappointing bagged soil in pots, and vice versa; container gardening requires very specific mixes, large volumes, and careful watering.
    • Use of leaves, rock dust, rainwater harvesting, aquaponics water, mushroom blocks, and cardboard sheet mulching.
  • Disagreements over gadgets like electric countertop composters: some value space and pest control; others argue life‑cycle impacts negate any environmental benefit.

Safety, history, and larger context

  • One commenter notes the article ignores heavy metal contamination (lead, cadmium, arsenic) in long‑industrial regions; soil testing and washing produce (e.g. with vinegar) are mentioned.
  • Discussion touches on ancient engineered soils like Terra Preta, their sophistication, and how “soil” as a living resource is distinct from raw mineral extraction for modern tech.

Man who built ISP instead of paying Comcast expands to hundreds of homes (2022)

Article context & meta

  • Commenters note the story is from 2022 and link to prior HN coverage; the title is updated to include the year.
  • Some see the narrative as movie-worthy and predict that if the project succeeds, incumbents may eventually buy it and raise prices.

Starlink, WISPs, and last‑mile tech

  • Many wonder how Starlink changes the landscape: it is praised as disruptive to small wireless ISPs (WISPs), especially for temporary/remote use, but criticized for latency variation and oversubscription.
  • Several argue nothing beats local fiber for reliability and future capacity, but outline major barriers: easements/right-of-way, pole-attachment bureaucracy, trenching/boring, restoration, and high labor/equipment costs.
  • Some small operators advocate fixed wireless (11/24/60/70 GHz) as dramatically cheaper than $30k/house fiber drops, reporting real multi‑gigabit links with mesh backhaul and fallbacks to 5 GHz.

Economics and feasibility of small/community ISPs

  • Multiple small-ISP operators describe self-funded efforts: hundreds of thousands of dollars of capital, years of unpaid work, and per‑home install costs around $800–$1,200, with ongoing delivery costs near $80/month per subscriber.
  • Subsidies can make rural fiber viable, though commenters debate whether $30k per connected home is a sensible public spend; some frame broadband as core infrastructure like power or water.
  • One “reformed ISP owner” warns against starting an ISP at all, implying unprofitable or high‑pain customers, but offers no details.

Regulation, incumbents, and municipal/community networks

  • Many report incumbents lobbying for state laws that hinder or effectively ban municipal broadband, often via astroturfed “grassroots” campaigns and misleading messaging about costs.
  • Others note these laws usually target government-owned networks, not private community ISPs, though they still tilt the economics against public projects.
  • Examples are given of co‑ops and local initiatives that succeeded despite resistance, and of large telcos taking subsidies without delivering promised build‑outs.

Service quality, pricing, and privacy

  • Small ISPs (including the one in the article and others like Sonic) are praised for technical competence, honest single-line pricing, symmetric gigabit, and excellent support.
  • Global price comparisons highlight how expensive and asymmetric many US offerings are versus Europe, Russia, Japan, and New Zealand.
  • One small operator emphasizes strict privacy, minimal logging, and refusal to monetize user data, contrasted with large ISPs’ tracking and “unlimited” plans with hidden limits.

Website and user experience

  • The article subject’s and another small ISP’s websites are discussed: one is extremely minimal (seen as reassuring), the other uses heavy video and Blazor, causing slow loads and crashes under HN traffic.
  • This sparks a side debate about bandwidth‑heavy marketing sites versus lean, fast pages—especially ironic for companies selling better connectivity.

Ask HN: How do you talk about past jobs you regret in interviews?

Reframing Bad Jobs as Learning

  • Many comments stress that even terrible roles yield benefits: exposure to how an industry really works, experience with difficult people, handling chaos, clarifying one’s own values.
  • Advice: list 3–5 concrete lessons or growth experiences, and center your story on those (“I learned X,” “I got hands‑on with Y,” “It pushed me out of my comfort zone”).

Managing Emotions Before Interviewing

  • Several argue you must process the anger first (with friends, a therapist, or journaling) so it doesn’t leak in interviews.
  • Techniques suggested: write down everything that annoyed you, then later revisit each item to extract at least one positive takeaway.

What Interviewers Say They Look For

  • Behavioral questions are used to assess initiative, influence, growth mindset, diplomacy, and ability to work within constraints, not to audit every detail of your past job.
  • Negative talk about prior employers is widely seen as a red flag: it raises suspicion that you might be the problem or will badmouth the new company later.
  • Strong answers show reflection (“what I’d do differently”), constructive handling of conflict, and an ability to stay positive or neutral under stress.

How to Talk About Negative Experiences

  • Focus on situations and constraints, not on “bad people.” Describe challenges neutrally and then what you did (STAR format).
  • Rephrase harsh judgments into neutral or “corporate” language (e.g., unstable strategy → “goals changed frequently”; terrible manager → “different approaches we worked to reconcile”).
  • Keep it brief, specific, and end on growth: skills gained, results achieved, or why the new role fits better.

NDAs, Short Tenures, and Obvious Red Flags

  • For NDAs: say so explicitly, stay high‑level, and emphasize what you learned rather than confidential details.
  • For short or clearly bad stints: use a “selective truth” about misaligned expectations, stage of project, strategy differences, or broader instability.

Debate: Honesty vs Spin and Corporate “Performance”

  • One camp: interviews are sales; you must “spin” everything positively, even if it feels fake. Some openly embrace this as politics and a survival skill.
  • Another camp: radical or at least substantial honesty; they’d rather filter out companies that can’t handle candid talk about politics, burnout, or bad management.
  • A middle position: don’t lie, but practice “mental reservation” and tact—compliment what you can, omit the worst, and remember the goal is to show you can be constructive, not to deliver a post‑mortem.