Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 414 of 540

Facebook to stop targeting ads at UK woman after legal fight

Reliance on Facebook Despite Harms

  • Commenters praise the ruling and hope many such cases could undermine surveillance-based advertising.
  • Frustration that community groups, small businesses, municipalities, and even consulates often use Facebook/Instagram as their only communication channel.
  • Several argue that most small organizations could meet user needs with a simple static website rather than tying people to a tracking platform.

Data Collection vs Ad Targeting

  • Many see the core problem as pervasive data collection and profiling (including “shadow profiles”), not just the act of serving targeted ads.
  • Others argue an absolutist ban on data collection is impractical; prefer rules like minimum audience sizes for targeting.
  • A linked court document suggests the legal claim was indeed about data practices, not just ad content.

Pregnancy Ads and Microphone Surveillance Debate

  • The pregnancy-targeting example is seen as creepy and violating.
  • One side suspects covert microphone eavesdropping; others strongly push back, citing lack of evidence, technical and legal hurdles, and easier explanations via metadata and behavioral patterns.
  • Target-style “we know you’re pregnant” stories are debated: some see them as emblematic of powerful models, others as overblown anecdotes or statistical flukes.
  • Some argue that even without microphones, current tracking (location, purchases, browsing) is equally or more invasive.

Algorithmic Feeds, Propaganda, and AI

  • Concern that personalized feeds and “top comments” are themselves targeted, shaping perception beyond ads.
  • Cambridge Analytica–style political microtargeting is raised as precedent; people worry AI will supercharge personalized propaganda and misinformation.

Regulation, Bans, and Business Models

  • Strong support for an EU-wide ban or strict opt-in for targeted ads; many believe most people would refuse tracking if asked clearly.
  • Some want broad restrictions on advertising in public spaces, especially digital billboards.
  • Meta’s paid ad-free tier in the EU is noted; commenters say the service could still be profitable with non-personalized ads.
  • Settlement strategy is discussed: companies often settle when continuing is costlier than conceding, regardless of admitting fault; some think this deal was a tactical move to neutralize a privacy activist’s legal standing.

Psychological and Social Effects of Social Media

  • Multiple people report feeling markedly happier and less resentful after quitting Facebook or heavily restricting Reddit.
  • Techniques include deleting/locking themselves out of accounts, using friction apps, or blocking feed pages via browser filters.
  • Debate over whether ordinary life updates on Facebook are harmless sharing or evidence of a “clown circus” culture; some see social networks as inherently “soul cancer,” others as neutral tools misused at scale.

Ad Quality, Scams, and Offline Spam

  • Complaints about Facebook hosting scammy ads that lead to phishing or fake stores that harvest credit card details.
  • Offline: weekly supermarket leaflets dumped at every doorstep are cited as another form of unwanted, hard-to-escape advertising.

Personal Responsibility and Retrospective Doubts

  • A closing sentiment questions whether it was wise to put “entire chapters” of one’s life onto a platform whose core business is ad brokerage, even if legal victories can later limit how those data are used.

Amazon wants a product safety regulator declared unconstitutional

Amazon’s Challenge to the CPSC & Public Reaction

  • Many comments frame Amazon’s move as “horrifically awful,” seeing it as prioritizing profit over consumer safety and emblematic of a wider slide toward oligarchic or even authoritarian tendencies.
  • Some express generalized loss of trust in Amazon’s products and behavior and argue that large tech companies should be broken up.
  • A few mention potential bias of the article source given ownership ties to Amazon’s founder, but still see the underlying facts as credible.

Is Amazon a Retailer, Platform, or Just a Shipper?

  • Central dispute: Amazon claims it’s like UPS/FedEx for third‑party goods and shouldn’t have recall obligations.
  • Critics note that “Fulfilled by Amazon” products are stored, shipped, refunded, and often branded as if sold by Amazon, so the company clearly has the data and operational control to support recalls.
  • Comparison with Walmart and traditional retailers: those stores routinely handle refunds and recalls; commenters fear if Amazon wins, others will follow its deregulatory path.

Should Marketplaces Like eBay/Facebook Be Responsible?

  • Some argue any platform that intermediates and holds buyer data should at least cooperate on recalls and labeling, especially for business sellers.
  • Others stress the practical burden: generic, low‑info secondhand listings make product identification and recall matching very hard, even with modern AI, and added compliance could kill cheap secondhand markets or push items underground.
  • There is disagreement over whether broad recall reach is a “must” or merely “nice to have.”

Value of the CPSC vs Private Oversight

  • Several praise the CPSC’s work and communication, contrasting it with proposals to shift safety checks to private entities under “government oversight,” which critics link to failed self‑regulation in other industries (e.g., aerospace).
  • One former Amazon engineer explains recalls are technically straightforward (delist, pull from warehouses, notify buyers); the real friction is cost and destruction of cheap, unsafe imports.

Law, Democracy, and Corporate Power

  • Commenters compare Amazon’s desired liability shield to Section 230 debates, seeing a pattern of corporations seeking maximal protection with minimal responsibility.
  • Extended subthreads discuss dysfunction in U.S. democracy, the dominance of corporate donors, Citizens United, and rising populism, arguing regulators are being gutted under an ideology that “government itself is irreparable.”

Amazon’s “Customer Obsession” vs Shareholder Primacy

  • Some note an apparent conflict between Amazon’s public leadership principles and fighting safety regulation.
  • Others counter that many customers mainly want low prices and fast shipping; as long as returns are easy, trust may not depend on robust safety oversight.
  • Several point to Amazon’s treatment of warehouse workers and worsening product quality/search experience as consistent with a shareholder‑first, not consumer‑first, reality.

Landrun: Sandbox any Linux process using Landlock, no root or containers

Comparison to existing sandbox tools (bubblewrap, firejail, nsjail, containers)

  • Landrun wraps Linux Landlock LSM, not namespaces; works unprivileged and doesn’t require containers, cgroups, or SELinux/AppArmor.
  • Several commenters say many Landrun use cases can be done with bubblewrap or firejail (mount/network namespaces), but note:
    • Namespaces may be disabled or require root on some systems, whereas Landlock is explicitly designed for unprivileged use.
    • Namespaces can expose a larger kernel attack surface; LSM-based controls are seen as safer for untrusted apps.
  • Firejail already integrates Landlock; nsjail relies on namespaces for FS isolation.
  • Landrun is viewed as closer in spirit to OpenBSD’s pledge/unveil than to full containers.

Landrun behavior, flags, and UX questions

  • Early confusion over --exec: users discovered many simple invocations failed without it; the author quickly refactored toward more granular --exec-path semantics.
  • Example from README initially failed (touch denied on /tmp), then was shown to need --exec and specific directory permissions.
  • Some argue “no rules” should mean “deny everything”; Landrun was updated to tighten this.
  • The default --best-effort mode (fall back to weaker sandbox) is widely criticized as unsafe; several suggest this should be opt‑in.
  • Option naming (--ro, --rw, --rox) is seen as confusing; some want clearer long/short flags.

Features, gaps, and kernel-level aspects

  • Today: fine-grained filesystem plus TCP port restrictions; UDP and more protocol controls are planned.
  • Landlock supports scoped abstract Unix sockets, but Go bindings currently struggle with them due to multithreading/signal issues; works from single‑threaded C.
  • Landlock is positioned as complementary to seccomp (attack surface reduction) and to namespaces (isolation); only LSMs can reliably block privileged child namespaces.

Configuration formats and ecosystem integration

  • Strong interest in declarative configs (JSON/TOML/YAML or reuse of existing policy formats). A separate landlockconfig project and OCI integration are in progress.
  • People want systemd integration akin to SystemCallFilter=, plus usage inside OCI containers as an extra layer.
  • Underlying Go/Rust/C libraries are MIT-licensed; Landrun’s GPLv2 CLI is acceptable to some, problematic to others.

Broader sandboxing / permissions discussion

  • Multiple commenters want macOS/Android‑style per‑app permissions and interactive prompts; Landlock could be a backend, but Landrun doesn’t provide that UX layer.
  • Alternatives mentioned for per‑app/network control: firejail, network namespaces + nftables, cgroups + firewall marks, Flatpak + xdg‑portals, and tools like OpenSnitch.

Unofficial Windows 7 Service Pack 2

Project status and technical details

  • Several commenters tried to understand how the Windows 8 “Reader” PDF app is being used on Windows 7.
    • Conclusion: the executable was extracted from the appx, not run as a UWP package.
    • Some doubt it can work cleanly on 7, suspecting dependencies on early Metro/UWP or browser engines.
  • People note there is no actual ISO or installer release yet despite the README implying one; it’s clearly marked as work-in-progress.
  • The repo’s license is criticized as “rich” given it is largely Microsoft binaries.
  • Questions are raised about whether high‑DPI improvements could reach per‑monitor v2 quality; others counter that many serious improvements since 7 (memory compression, security, WDDM) would still be missing.

Security and trust concerns

  • Running a very old PDF reader is widely viewed as risky; one person jokes the only worse idea would be an ancient TIFF reader.
  • Unofficial Win7 update packs (e.g., repackaged ESUs from Ukraine) are mentioned; some worry about hidden malware.
    • Debate follows about whether country of origin meaningfully affects risk; no consensus is reached.

Why people still want Windows 7 (and earlier)

  • Many see Windows 7 as the peak of usability, aesthetics, and speed; some argue Windows 2000 or Server 2003 were even better.
  • Users keep dedicated Win7 machines (sometimes heavily repaired over time) for Office 2003, specific plugins, CAD/PLC, or niche tooling.
  • Older Office with classic menus and pre‑Manifest‑V3 browsers are praised; the ribbon UI draws both strong dislike and strong defenses.
  • Several note how fast XP/2000/7 feel compared to modern Windows on far more powerful hardware, especially for launching Office.

Critiques of modern Windows (10/11)

  • UI/UX is a major sore point:
    • Loss of vertical taskbar and classic Quick Launch, inconsistent dual settings/control‑panel UIs, rounded corners with awkward resize areas.
    • Some appreciate 11’s visual consistency; others insist 7’s Aero era was superior.
  • There’s frustration with Windows 11’s onboarding (Microsoft account requirement) and general bulk.
  • Features like the file‑copy speed graph are debated as either useful diagnostics or needless distraction.

Retrocomputing, drivers, and ecosystem

  • There’s an active ecosystem around running 7/XP on modern hardware: driver torrents, driver integrators, custom ISOs with NVMe/ACPI support, and tools like NTLite.
  • Similar interest exists in lightweight 8/8.1 via Server variants with extended support.
  • Some hope this project might eventually enable a minimal, reasonably secure modern browser on Windows 7.

Alternatives and lookalikes

  • Suggestions include ReactOS and Linux distros/DEs mimicking Windows 7 (e.g., XFCE mods).
  • Skepticism remains: visual clones often feel “off,” and for many the real draw is Windows’ software/hardware ecosystem, not just the UI.

When you deleted /lib on Linux while still connected via SSH (2022)

Directory hard links and Solaris specifics

  • Early subthread digs into whether you can hard-link directories to recover a moved /lib.
  • Consensus: POSIX forbids directory hard links, but some Solaris/illumos UFS implementations historically allowed root to do it, while ZFS and modern docs explicitly disallow it.
  • GNU ln even has a “try directories” flag for root, though it usually fails; underlying link() may or may not permit it depending on filesystem.

Static binaries, busybox, and modern recovery options

  • Older Unix/Linux systems often shipped statically linked tools in /sbin (or a static sln/busybox) to survive library loss.
  • Many distros have removed statically linked system binaries; recovery is now expected via initramfs, rescue media, or snapshots.
  • Several people describe recovering by:
    • Copying binaries from another identical machine (scp/rsync/uuencode+cat).
    • Reconstructing a static busybox or small helper program by echoing hex bytes over an existing executable path.
    • Using exec -a to satisfy busybox’s applet-name expectations.

Unlinked libraries and /proc tricks

  • Deleted libraries in use stay as “unlinked” (anonymous) inodes until last user exits.
  • In principle you can find inode numbers via /proc/$PID/maps and use filesystem tools (debugfs, zdb) to extract them.
  • Practically, this is hard because most tools you’d use are dynamically linked themselves; you may need to rely on shell builtins and then drop in a static tool over the network.

Human error stories and operational lessons

  • Many anecdotes: rm -rf /bin vs ./bin, rm -rf /, wiping /etc, removing all execute bits with chmod -R, even umount / on AIX.
  • Patterns of advice:
    • Don’t reboot immediately when things act weird; investigate first.
    • Avoid having humans type long destructive sequences; script and test them.
    • Keep two root shells when editing sudoers or critical SSH tunnels.
    • Pause and double-check before rm -rf or dd; some use echo, du -sh, or a # prefix as a safety step.

Safer deletion, trash vs snapshots, and tooling gaps

  • Suggestions: rm --preserve-root exists; people wish for a --preserve-home or top-level “are you sure?” prompts.
  • Opinions split between:
    • Using trash/recycle tooling (trash-cli, safe-rm) for day-to-day safety.
    • Relying instead on proper backups and/or filesystem snapshots (btrfs/ZFS), sometimes only for selected directories.
  • Some skepticism about trash tools’ reliability and snapshot bloat; others argue CoW snapshots are cheap and transformative.

Broader themes

  • Root’s lack of guardrails is highlighted as the root cause; immutable or restricted systems might reduce these incidents.
  • The situation is framed as a bootstrapping problem: as long as you have one running shell, one executable, and a way to overwrite it, you can theoretically rebuild a minimal system.
  • Techniques used here closely resemble “living off the land” methods from exploit writeups, but applied to self-rescue instead of offense.

George Foreman has died

Boxing Legacy and Personal Impact

  • Many call him a legend and one of the all‑time great heavyweights.
  • His late‑career title win in his mid‑40s/late‑40s inspires people who feel “too old” for physical challenges.
  • Commenters praise his ring IQ, power, and ability to reinvent himself after setbacks, with multiple recommendations of the documentary When We Were Kings.
  • Some share personal or secondhand anecdotes of him as kind, humble, and generous with fans.

Foreman Grill and Everyday Utility

  • Numerous commenters say the grill was genuinely useful, especially for students and apartment dwellers who couldn’t have outdoor grills or good ventilation.
  • Praised for: heating quickly, cooking both sides at once, being easy to clean, and working on standard circuits.
  • Debate over its treatment of meat: some see it as abusing steak by squeezing out juices; others argue it’s fine for burgers, chicken, and “non-connoisseur” cooking.
  • Long sub‑thread on cooking science: searing vs “sealing” juices, moisture management, reverse sear, tenderizing, and the tradeoff between ideal technique and convenience.

Money, Branding, and Endorsement Stories

  • People cite large reported earnings from the grill endorsement, noting he made more from it than from boxing.
  • A popular (and contested) story has another celebrity allegedly turning down the grill endorsement for a lesser appliance. Some call this person an unreliable narrator.
  • Several remark that Foreman’s affable, down‑to‑earth, “backyard dad” image made him an ideal pitchman, and for some he’s more famous for the grill than for boxing.

Faith and Personal Life

  • One comment praises him as a “great Christian,” prompting debate about what that means given his five marriages.
  • Some see multiple marriages as inconsistent with Christian values; others stress that Christianity centers on repentance and that imperfect people are exactly its target.
  • There’s broader critique that American Christianity often functions more as identity/brand than as lived discipleship.

Health, Aging, and Ethics of Combat Sports

  • Admiration for his mental sharpness late in life sits alongside concern about brain damage in boxing and American football.
  • Commenters share stories of fighters and players suffering cognitive decline, question the ethics of being a fan, and discuss how early, poorly compensated careers front‑load the risk.

Miscellaneous and Tangents

  • Lighthearted mentions: his TV work, naming all his sons George, and childhood confusion over whether he “invented” the grill.
  • A long off‑topic branch debates a separate scandal involving another celebrity, media ethics, and modern politics.

The Wright brothers invented the airplane, right? Not if you're in Brazil

Competing “first flight” claims

  • Commenters list many national claimants: Wright brothers (US), Santos-Dumont (Brazil), Lilienthal and Grade (Germany), Ader and Blériot (France), Pearse (New Zealand), Mozhaysky (Russia), Whitehead and others.
  • Several note they were taught different “inventors” in school depending on country, mirroring similar disputes for radio, television, computers, X‑rays, etc.

What counts as an airplane / first flight?

  • Key disputed criteria:
    • Powered vs. glider
    • Heavier-than-air
    • Controlled (3‑axis) vs. mere hop
    • Sustained vs. very short distance
    • Takeoff from level ground under own power vs. rail, hill, catapult, headwind.
  • Some argue that if catapults or rails “don’t count,” then many early flights (including Santos-Dumont’s and others) must also be reconsidered.
  • Others insist the Wrights’ 1903 flights did not use catapults and met reasonable powered-flight criteria.

Arguments for Wright priority

  • Supporters emphasize: development of 3‑axis control, understanding of roll and adverse yaw, wind‑tunnel work to fix bad lift data, efficient propeller theory, and a lightweight engine.
  • They stress the Wrights’ exhaustive documentation, witnesses, photographs, and flight distances (kilometers by 1905) versus rivals’ shorter, less-documented hops.
  • Replicas of the Flyer reportedly reproduce the documented performance, which many see as strong evidence.

Arguments for Santos-Dumont and others

  • Brazil-centered view: Santos-Dumont’s public, unaided takeoffs from wheels in 1906–07, prize-winning distances, and “open source” approach.
  • Skeptics question claims that he secretly used Wright-style propellers when Europe allegedly didn’t yet know their work.

Nationalism, education, and narrative

  • Many see these disputes as products of national pride and school curricula: countries prefer “their” inventor.
  • Several argue the “who invented X?” question is often ill-posed: inventions arise from overlapping, incremental work; crediting a single person oversimplifies.

Patents, secrecy, and impact

  • Wrights’ control patents and litigation are said to have slowed later innovation; their secrecy delayed broader recognition, especially in Europe.
  • Broader analogies are drawn to the space race, SpaceX, and the steam engine: timing, funding, politics, and narrative can matter as much as strict priority.

Monster Cables picked the wrong guy to threaten (2008)

Outcome of the Monster vs Blue Jeans incident

  • Linked follow-up shows Monster ultimately went silent after receiving Blue Jeans’ detailed response; no lawsuit or penalties followed.
  • Some commenters say this undercuts the “picked the wrong guy” framing: Monster backed off, then likely continued similar tactics against easier targets.
  • Others argue the public nature of the exchange inflicted reputational harm, reducing the intimidation value of Monster’s threats.

Legal bullying vs. smart enforcement

  • Thread compares Monster to other heavy‑handed firms (Monster Energy, Caterpillar vs Cat & Cloud, Monster vs Monster Mini Golf).
  • Multiple anecdotes: HOAs, small businesses, and individuals receiving aggressive demand letters over domains, logos, or trivial “infringements.”
  • Contrast is drawn with “gold standard” polite cease‑and‑desists (Jack Daniel’s, Netflix’s “Stranger Things” bar letter), which explain the legal need to act, propose reasonable fixes, and avoid threats.

Trademark realities and countersuits

  • Several people stress that trademark owners are indeed pressured to police infringement or risk dilution, which partly explains (but doesn’t excuse) overreach.
  • Question raised: can you hit back just for a baseless threat? Answer: rarely worthwhile; “barratry” laws exist but are hard to use for one C&D.
  • Declaratory judgments are mentioned as a tool: if someone threatens to sue, you can proactively sue to have their claims declared groundless.

Reactions to Blue Jeans’ letter and legal mindset

  • Commenters admire how the author channels adrenaline into methodical legal analysis rather than panic; the discovery requests and antitrust hints are seen as a calculated threat back.
  • Some note that this “I enjoy litigation and will go the distance” posture is standard litigator psychology, not just theatrics.

Monster, cables, and audiophile skepticism

  • Many recall Monster’s high‑margin upsells and dubious performance claims, especially around digital video and “better picture.”
  • Several point out that cable quality does matter at long runs/bandwidth (e.g., 4K HDMI, long projector runs), but not in the magical way Monster advertises.
  • Audiophile marketing hyperbole around cables is widely mocked; people note that once a digital or analog spec is met, expensive “snake oil” doesn’t add value.

Blue Jeans Cable’s reputation

  • Multiple commenters say this episode introduced them to Blue Jeans and led them to purchase; BJC is praised as an honest, technically solid, anti‑snake‑oil vendor.
  • The story reinforces BJC’s brand as competent, no‑nonsense, and willing to push back against legal bullying.

Not OK Cupid – A story of poor email address validation

Broken basics & “enshittification”

  • Several commenters generalize the blog’s issue to a broader sense that basic web functions are routinely broken: unsubscribes fail, logins don’t work, payment pages are dead, and sites give no way to contact support.
  • One example: severe input lag and jumbled typing in Google Search on Android unless you wait ~30 seconds, seen as unacceptable for a core, cash-rich product.
  • Some frame this as part of a general “enshittification” of tech, where things feel constantly broken and nobody is accountable.

Email validation failures & misdirected accounts

  • Many report accounts or notifications created with their email at banks, credit bureaus, retailers, Amazon, Apple, PayPal, Venmo, credit card companies, universities, and more.
  • Consequences range from nuisance spam to serious exposure: job offers missed, factory IT/SCADA credentials sent to the wrong person, detective crime-scene videos, utility bills, and personal identifiers (e.g., national ID numbers) revealed.
  • People with common or short Gmail usernames are especially affected.

Dating apps, OkCupid, and misaligned incentives

  • OkCupid is widely described as having declined sharply: more bots and scams, less trustworthy, worse user experience, especially post-acquisition by Match Group.
  • Others counter with positive past experiences, including long-term relationships and marriage, but agree the service has changed since roughly 2010–2015.
  • Broader critique: dating apps’ business model is to maximize engagement and recurring fees, not successful matches (which cause churn).
  • Ideas floated include nonprofit matchmaking or escrow-based “pay on successful match/marriage” models, but commenters doubt consumer willingness to pay and note practical and incentive problems.

Coping with spam & legal angles

  • Common strategies: marking as spam, creating filters to auto-delete, or using aliases to kill a compromised address. Some threaten CAN-SPAM complaints; links to the FTC’s fraud/spam reporting portal are shared.
  • There is skepticism that complaints or blog “shaming” will materially change behavior; filters are seen as the only reliable defense.

Email as identity, security questions & aliases

  • Using email as a login ID is criticized as insecure (password reuse, massive exposure of addresses) and impractical for users who change providers.
  • Some advocate owning a personal domain for a “lifetime” email identity.
  • Security questions are seen as weak; advice is to answer with password-manager-generated phrases, though this may clash with phone-based support workflows.
  • Fastmail-style masked emails, custom-domain catch-alls, and vendor-specific aliases are praised as powerful tools to manage spam and identify leaks, though managing hundreds of aliases requires supporting tools and clients.

Security & ethics around misdirected accounts

  • Some users “take over” misdirected accounts (resetting passwords, changing details) to stop spam; others argue this is unethical and possibly illegal (e.g., CFAA), even if companies and mis-typers are careless.
  • An additional OkCupid-specific issue is noted: emailed match links that auto-log into accounts; a report of this was allegedly marked WONTFIX.

France rejects backdoor mandate

French political context and motives

  • Commenters stress this was the National Assembly blocking a government-backed measure, not “France” as a whole. Interior ministry and security services still want backdoors.
  • Some see the vote as “cheap” politics: it hurts a powerful minister, plays well in media (“spying WhatsApp”), and there’s no recent major attack to create urgency.
  • Several expect many of the same MPs would vote the opposite way after a terrorist incident or under stronger party discipline.

Technical debate on backdoors

  • Long subthread on whether backdoored encryption is inherently impossible vs merely high-risk:
    • One side: any systemic backdoor inevitably leaks to hostile states, criminals, and insiders; it’s a security disaster at modern scale, not a policy option.
    • Other side: cryptography can technically support multiple decryption keys; the real question is risk tolerance and governance, not basic literacy.
  • Threat models clash: some people emphasize foreign adversaries and hackers; others emphasize domestic law enforcement and accept increased technical risk.
  • Many note practical problems: keeping a “master secret” for millions of users secure, billions in incentives to steal it, and the difficulty of limiting which agencies/ regimes can use it.

Government intent vs ignorance

  • Disagreement whether politicians are mostly:
    • Ignorant of technical realities and scale effects; or
    • Fully aware, but prioritizing state power and surveillance over citizen security.
  • Several argue policy rhetoric (“for children”, “for drugs/terrorism”) masks a persistent desire for generalized surveillance; others caution that calling opponents stupid is counterproductive.

Crime, drugs, and effectiveness

  • Skepticism that backdoors would meaningfully hurt organized crime: serious actors can move to open-source, decentralized, or manual cryptography.
  • Many frame “war on drugs” and “war on crime” as pretexts: legalization/decriminalization (e.g., cannabis) is presented as a more effective way to undercut cartels.
  • Some argue surveillance can and has reduced gang violence (e.g., Danish example), but concede that targeting general E2EE mainly impacts ordinary users.

Public opinion, democracy, and French privacy culture

  • Debate over whether voters would accept surveillance if framed as fighting crime or protecting children; experiences differ by country.
  • French political culture is described as historically skeptical of state power, with institutions like CNIL and strong data‑protection precedents, though some feel these have weakened.
  • Others emphasize that civil liberties are not “won” once but require constant active defense by citizens.

EU and international angle

  • Several warn that EU-level “chat control” / on-device scanning proposals remain alive; France’s national rejection doesn’t stop a future EU mandate.
  • Concerns about reliance on US platforms and intelligence sharing: some describe the US as increasingly hostile or unreliable; others call that exaggerated and stress ongoing alliances.
  • There is worry that European states try to stay “clean” while other powers already use secret backdoors and zero‑day exploits.

Alternatives, providers, and future risks

  • Some argue law enforcement will (and already does) rely on device exploits (Pegasus-style), metadata, and targeted hacking instead of formal backdoors.
  • Others highlight that providers themselves benefit from strong E2EE to limit breach impact; some would rather exit markets than weaken security.
  • Longer-term fears include AI-driven mass surveillance on top of any mandated access, turning exceptional powers into pervasive monitoring.

Tech terms I was pronouncing wrong

Range of disputed pronunciations

  • Mathematical and personal names:

    • “Euler” ≈ “oiler” (oil), “von Mises” vs “Mises Pieces” joke; widespread admission that German/Dutch names (Gödel, Schrödinger, Dijkstra, Huygens, Einstein) are often mangled in English.
    • Fresnel, Poisson: many pronounced phonetically until corrected; some playfully “refuse” French nasalization.
  • Core tech terms:

    • GIF: ongoing hard-G vs soft-G battle; some appeal to the creator, others ignore it.
    • regex: many options—“reg-ex”, “rej-ex”, “rezh-ex”, “ray-gex/jex”—with some arguing it should follow “regular expression”, others treating it like its own word.
    • LaTeX/TeX: debate over “LAH-tek”, “LAY-tek”, stress placement, and whether to honor the Greek χ sound; some reject pedantry for the sake of communication with non-technical people.
    • Linux and Linus: “lih-nux”, “lee-nooks”, “lie-nix”; audio clips from Linus exist, but people still vary.
    • Azure: multiple regional forms (ah-zure vs ay-zure etc.), with confusion especially outside Anglophone countries.
    • cache: cash, “cach-ay”, “caysh”; Australia/NZ note local variants.
  • Other terms mentioned: tuple (too-pul/tupple), idempotent, homogeneous, Redis, nginx, Xfce, PNG, JWT (“jot”), GNU (noo, g-noo, “gee en you”), SQL/SQLite/PostgreSQL, JSON, NumPy/SciPy, vi/vim, SIEM, repo, pypi, etc., with examples of every variant someone has actually heard.


Regional and linguistic influences

  • Several comments tie pronunciation to native language phonetics (e.g., German speakers on “ch”, languages where “gn” is natural).
  • English-specific rules (silent g in “gn”, silent k in “kn”) explain why many drop consonants in GNU-like words.
  • Country/dialect differences (US vs Australia vs NZ vs Germany) are cited for vowels (Azure, mobile, repo, cache).

Authority vs common usage

  • Some defer strongly to creators’ pronunciations (GIF, regex originator, Knuth on TeX, SQLite creator, GNU/JWT videos).
  • Others argue that once a term spreads, normal spelling and local phonology should govern, not original intent.

Attitudes toward mispronunciation

  • Range from joking disgust (“nails on a chalkboard”) to strong sympathy: mispronunciation often means someone learned by reading.
  • Several people prefer writing about programming to avoid awkwardness.
  • Many share nostalgic or humorous stories (BBS “sis-op”, “hotmail files”, “pup” for PHP, “squeal” for SQL) as harmless quirks.

Meta

  • Multiple commenters note the thread was flagged and question why, given it’s on-topic and culturally revealing.

Scientists break down plastic using a simple, inexpensive catalyst and air

Technical process and capabilities

  • Catalyst is activated carbon/molybdenum dioxide operating around 265 °C in air with ambient moisture, converting PET to terephthalic acid (TPA) and acetaldehyde.
  • Paper reports ~94% of possible TPA recovered in 4 hours at 1 atm, including from “real-world” inputs like bottles, textiles, colored and mixed plastics.
  • Several commenters note these temperatures are comparable to PET melting and existing recycling/molding processes, so not extreme by industrial standards.
  • Compared with pyrolysis that yields mixed petrochemicals, this gives relatively pure monomers that can be re‑polymerized into PET.

Economics, energy, and scalability

  • Article headlines “simple, inexpensive catalyst,” but gives no explicit process cost; commenters criticize this and note that cheap virgin feedstocks (~$0.50/lb for BTX-type chemicals) are the real benchmark.
  • Energy input for heating and the 4‑hour residence time raise questions about throughput and capital cost; continuous processes can help but Little’s Law still applies.
  • Upstream logistics (collection, sorting, cleaning) are seen as the dominant cost for any PET recycling, often outweighing reaction/separation costs.
  • Mechanical PET recycling remains cheaper when possible because it avoids depolymerization and re‑polymerization steps.
  • Heat recovery and general energy integration are assumed standard in industrial practice, so not a unique advantage here.

Mixed plastics, sorting, and other polymers

  • A key appeal is extracting PET from mixed streams without perfect sorting; paper explicitly discusses this use case.
  • Commenters stress that “plastic” is many materials with different properties; PET (#1) and HDPE (#2) are relatively easy, but most others are not, and sorting remains a major hurdle.
  • There is discussion of mechanical closed‑loop PET bottle recycling, including existing 100% recycled bottles and textile fibers, but also concern that fabrics are major microplastic sources.

Microplastics and health concerns

  • Multiple comments focus on microplastics from clothing, tires and bottles, and on emerging evidence of plastics in human organs and infants.
  • Some argue landfilled “mountains” of plastic are less problematic than diffuse microplastic pollution; others see plastic pollution overall as an environmental catastrophe.

Policy, externalities, and alternatives

  • Strong thread on pricing externalities: proposals for lifecycle plastics taxes, tariffs on virgin plastic, and extended producer responsibility.
  • Counter‑arguments emphasize the difficulty and bureaucracy of fully internalizing cleanup costs in practice.
  • Debate over bans vs price signals: targeted phase‑outs of easily replaceable items (e.g., confetti, straws) vs blanket rules that would make essentials unaffordable.
  • Biodegradable/“eco” plastics are criticized as often underperforming, requiring industrial composting, and contaminating recycling streams; some see them as greenwashing.

Overall sentiment

  • Many are cautiously impressed by the chemistry and especially the ability to recover monomers from mixed PET streams.
  • At the same time, there is fatigue with recurring “breakthrough” stories that omit timelines, costs, and realistic paths to large‑scale impact amid ever‑growing plastic production.

Use Long Options in Scripts

Benefits of long options and formatting style

  • Long options are seen as more self-explanatory, easier to grep in man pages, and less prone to typos.
  • Many recommend:
    • Prefer long options in scripts.
    • Put each option on its own line for readability and easier git blame.
    • Use -- to separate options from dynamic arguments for safety.
  • Some also advocate clearer command names and multi-line invocations to reduce “cryptic one-liners”.

Portability vs GNU-isms

  • Major caveat: POSIX does not specify long options; many BSDs and BusyBox utilities only support short options, and GNU tools often have extra, non-portable options.
  • Examples:
    • BSD/macOS sed, rm lack GNU-style long options.
    • Some cases (e.g., base64 --decode) are actually more portable with long options across GNU/BSD.
  • For truly portable scripts or when targeting BusyBox/embedded systems, several commenters insist short options are the only reliable choice.
  • Others solve this by pinning toolchains via Nix or similar reproducible dev environments so they can safely use long options and newer features.

Shell execution and injection safety

  • Strong warning against mixing string interpolation with shell commands (e.g., system("cmd {user_input}")), calling it “SQL injection on steroids”.
  • Recommended patterns:
    • Use array/list-based exec APIs so arguments go directly to execve without going through a shell.
    • If you must use sh -c, treat the script as fixed and pass user data via positional parameters ("$1", $@) rather than string concatenation.
  • Some propose language features/macros that handle escaping for POSIX shells, though others note this is shell-specific and incomplete.
  • There is back-and-forth on when this really matters: some say “never send untrusted input to the shell”, others argue requirements change and trusted inputs can become untrusted.

ARG_MAX and huge argument lists

  • A few mention the ARG_MAX limit: expanding globs over millions of files can exceed it.
  • Suggested approaches: avoid giant argument lists (use stdin/list files, xargs-style patterns) rather than bolting on fragile length checks and eval.

Readability vs density; learning vs memorization

  • One camp: optimize scripts for novice readers and maintainers; long options and clarity beat terseness.
  • Opposing camp: long options are verbose GNU-isms; people should learn the short flags, and over-optimizing for “obviousness” leads to mediocre software.
  • Some note that long options can turn compact one-liners into multi-line blocks, reducing how much logic fits on screen at once.

I want a good parallel computer

Workloads that might benefit from more parallelism

  • Suggested candidates: video encoding, large-scale compilation/linking (e.g., Chromium), optimization problems (scheduling, routing), theorem proving, and complex 2D/3D rendering.
  • Video encoding is split into:
    • Real-time (video calls, broadcast): fixed‑function hardware for latency/power, but weaker compression.
    • “At rest” (YouTube, Blu‑ray): CPU software for best compression, but slow.
  • Some argue a GPU-based general encoder could combine software‑grade compression with GPU throughput; others reply that new codecs are rare, and fixed‑function is “good enough.”

GPU strengths, limits, and developer experience

  • GPUs excel at simple, massively data‑parallel workloads (graphics, linear algebra, ML).
  • Many proposed workloads are “thinking” tasks with heavy branching and irregular control flow, where GPUs and SIMT/SIMD are a poor fit.
  • Several comments call GPU programming “weird” and painful:
    • Separate compilation and runtime shader builds.
    • Distinct memory spaces and data shuffling.
    • Synchronization friction and vendor‑specific, complex APIs.
  • Some believe these issues are largely abstractable at the language/runtime level; others think the underlying execution model is inherently constraining.

Alternative manycore and parallel architectures

  • Past and niche efforts discussed: Connection Machine, Transputer, Cray MTA, Xeon Phi/Larrabee, GreenArrays, Epiphany, SGI NUMA, AIE arrays, etc.
  • Repeated theme: “hundreds of tiny CPUs on a chip” usually fail because of odd programming models and poor tooling, not raw hardware.
  • Cache coherence and shared-memory scaling are called out as core blockers for “a CPU with thousands of worker cores.”
  • Some advocate graph/DAG or dataflow-style IRs and graph reduction as a better fit than von Neumann-style threads.

Unified memory, APUs, and using GPUs as generic workers

  • Interest in APUs and unified memory (Apple Silicon, AMD Strix Halo, some Qualcomm/AMD parts) as a friendlier model that avoids PCIe copies.
  • Debate over AMD marketing claims that Strix Halo can beat an RTX 4090 on large LLMs: critics note these are memory‑bound benchmarks and cherry-picked.
  • Desire to treat iGPUs as transparent “efficiency cores” scheduled by the OS, but commenters note tool, API, and hardware constraints.

Rendering and dynamic workloads

  • Some see massively parallel 2D GPU renderers as overkill; others point to complex vector art, maps, text, and fluid 2D UIs that do need serious GPU help.
  • 3D rendering and lighting are highlighted as especially hard: general‑purpose renderers tend to scale poorly with scene complexity, and engines rely on deep integration with scene graphs and precomputation.
  • The original post’s complaint: GPUs struggle with dynamic, coarse‑grain scheduling and temporary buffer management, and current hardware increasingly accretes special‑case blocks (RT cores, video blocks) instead of general primitives.

Safety, memory models, and historical lessons

  • Strong pushback against ideas like “flattening address spaces”: people recall unstable, pre‑protection systems and architectures like Cell as cautionary tales.
  • Counterpoint: many of those designs were limited by their era; modern language and tooling advances (safe languages, IRs like SPIR‑V, JVM/WASM‑style runtimes) could revisit similar ideas more safely.
  • Some suggest moving more of protection/isolation into software runtimes to simplify hardware and potentially make parallel cores cheaper.

Why a “good parallel computer” is elusive

  • Ecosystem and economics matter: new architectures struggle without a critical mass of software and experts, even if technically elegant.
  • Several argue that much day‑to‑day software is bottlenecked by design, I/O, or concurrency, not raw parallel compute; optimizing code or UX often beats moving to GPUs.
  • Distinction emphasized between parallelism (throughput on homogeneous data) and concurrency (independent, interacting tasks) — most everyday apps are said to need the latter more than the former.

EU pushes ahead with Big Tech antitrust enforcement

Motivations: Sovereignty, Dependence, and US Politics

  • Many see EU antitrust as driven less by “fair competition” in the abstract and more by data and strategic sovereignty, especially after recent US political shifts.
  • There’s a strong current of opinion that Europe must reduce dependence on US-controlled digital infrastructure and, increasingly, US-made weapons.
  • Some argue the US has already acted as a hostile or unreliable partner (tariffs, Ukraine policy, erratic Trump-era behavior), making a harder EU line both rational and overdue.
  • Others warn that explicitly targeting US dominance will invite symmetrical retaliation and broader trade war dynamics.

Proposed Tools: From Chinese-Style Models to Financial Levers

  • One camp advocates a “China playbook”: require licenses, EU-majority joint ventures, and technology transfer as conditions for market access.
  • Critics call forced tech transfer “legalized theft” and note this model is used mainly by China/Iran; supporters answer that foreign firms can simply choose not to operate in the EU.
  • Debate centers on enforcement:
    • Some argue you don’t need a Great Firewall; you just block ad money, payment flows, or seize in-jurisdiction assets of non‑compliant firms.
    • Others counter that as long as users can freely access services like Google from Europe and offshore advertisers can pay them, meaningful enforcement requires some form of blocking.

Trade, Retaliation, and Apple’s Tax Case

  • The Apple–Ireland €13B state-aid case is a flashpoint:
    • One side sees it as retroactive, politically motivated taxation and tantamount to trade warfare.
    • The other side stresses that illegal state aid has long been banned, the tax was always owed, and back collection is necessary to avoid rewarding cheaters.
  • There is concern that US tech firms will align more openly with Trump-style politics if promised protection from EU enforcement via tariffs and diplomatic pressure.

Impact on Markets and Users

  • Several US-based commenters explicitly welcome EU action, arguing American regulators have failed; EU rules like USB‑C or app store opening are seen as consumer wins.
  • Some note that non‑giant US tech firms can benefit from dismantling Apple/Google gatekeeping, even when changes are EU-only.
  • A minority fears that an escalating EU–US economic conflict will mainly benefit China.
  • One overlooked issue raised: megaplatforms face no meaningful obligation to provide human support or timely bug resolution despite their systemic importance; commenters suggest this should be part of the regulatory agenda.

New USPTO Memo Makes Fighting Patent Trolls Even Harder

Defensive mechanisms and patent pools

  • Some propose a “patent pool for non‑trolls” or defensive patent organizations; others note these already exist (e.g., Unified Patents, LOT Network, RPX).
  • A key limitation: defensive portfolios don’t deter trolls because trolls don’t ship products and thus don’t infringe, so countersuits aren’t available.

LLMs as tools for prior art and obviousness

  • One idea: timestamp and notarize LLM models, then later show that a pre‑patent LLM can independently generate the claimed invention → evidence of obviousness or hidden prior art.
  • Former examiner perspective: attorneys routinely argue “hindsight bias”; any LLM test would need a careful, clean-room style protocol and statistical threshold to be credible.
  • Skepticism: patents often don’t map clearly to real implementations, so it may be hard to tell whether an LLM “reproduced” what the patent actually claims.

IPR, USPTO policy, and who benefits

  • One side: Inter Partes Review (IPR) weakens all patents and thus helps big infringers escape “rightful” patents; limiting IPR strengthens legitimate patentees as well as trolls.
  • Another: IPRs are much better than jury trials for judging patentability; the new USPTO stance on limiting IPR is seen as a step backward that disproportionately aids trolls.
  • Debate over beneficiaries: some argue big business is pushing rules that entrench their power; others note that large operating companies are frequent troll targets too, and industries differ in how much they rely on patents.

Patent trolls’ model and potential defenses

  • Detailed anecdote: small LLC owning a single software/UI patent mass‑mails demand letters, threatening million‑dollar suits but offering quick ~$25k settlements; discovery revealed ~1,000 identical letters.
  • Core asymmetry: defendants face huge, non‑recoverable legal costs; troll entities hold no assets beyond the patent, insulating them from fee awards.
  • Explanations: troll firms are run by lawyers, so marginal cost is low; they drop expensive fights and profit from a spam‑like volume model.
  • Suggested defenses:
    • Litigation insurance / IP insurance, though premiums and due‑diligence issues for small firms are noted.
    • Complex corporate structuring to isolate assets, mirroring trolls’ use of thin LLCs.
    • “Name and shame” to damage lawyers’ reputations, though some doubt reputational pressure matters to pure trolls.

Power, inequality, and access to courts

  • Broader lament: policy increasingly favors those already ahead; without active redistribution and checks on power, systems trend toward feudal-style concentration.
  • Dispute over data on wealth mobility; some cite longitudinal studies showing non‑trivial movement between quintiles, others distrust the underlying data and call the area speculative.
  • Discussion of legal access: proposals to require proof of funds before suing are rejected as effectively barring poor plaintiffs; yet commenters emphasize that in practice, litigation already heavily favors the wealthy and well‑resourced.
  • Personal account of a strong negligence case that failed to find representation underscores that even egregious harms can be practically non‑actionable when cases are complex or unprofitable.

Non‑practicing entities vs. “trolls” and abolitionism

  • One position: many reflexively label any non‑operating patent holder a “troll,” but there are also small inventors who historically needed patents to prevent big firms from simply copying their work. Data on how many NPE suits are abusive vs. legitimate is seen as lacking.
  • Counter: the defining feature of a troll is not merely non‑practicing status, but using patents solely as an instrument of mass extortionary threats, often on low‑quality or irrelevant claims.
  • Legal vs moral framing: legally, both a major manufacturer and a one‑patent LLC have the same right to enforce; normatively, many see a clear difference between enforcing patents integral to shipped products and running a shell entity whose only business is enforcement.
  • A minority argues the patent system as a whole should be scrapped, describing it as monopoly‑granting, innovation‑slowing, and citing historical claims that key technologies (e.g., early auto engines) were delayed by patents.

Deciphering language processing in the human brain through LLM representations

Excitement about understanding and “hacking” the brain

  • Several commenters are enthusiastic, hoping this work leads to deeper models of the brain and eventually “hackable” cognition: better motivation, faster learning, pain control, etc.
  • Others warn that if you can edit your own brain, others can too; existing “hacks” via drugs, behavior modification, and stimulation are noted.
  • Some recommend nootropics or meditation as current, low-tech brain tuning.

Are LLMs more than “stochastic parrots”?

  • Supportive view: alignment between LLM representations and neural activity in speech/language areas is taken as evidence that models capture world structure similarly to humans, beyond mere parroting.
  • Critics argue the correlations are modest (0.25–0.5) and based on strong assumptions, so they don’t demonstrate equivalence to brains.
  • One line of thought: this may show instead that humans are themselves closer to “stochastic parrots” than we like to admit.

Thinking vs language processing

  • Disagreement over whether language processing and “thinking” are separable faculties.
  • One side cites cases from neuroscience and linguistics (e.g., savants, synthetic language learning) to argue language is a distinct capacity interfacing with more general cognition.
  • Others argue in practice they are deeply intertwined and not cleanly separable in brain activity.

Grammar, rules, and probabilistic language

  • Long debate over whether human language is fundamentally rule/grammar-based (Chomskyan view) or best seen as probabilistic/statistical.
  • Some argue grammars are “useful fictions” or lossy models; real language is messy and probabilistic, closer to how LLMs operate.
  • Others counter that languages obey non-arbitrary structural constraints (e.g., structure dependence) that imply an underlying rule system, even if not fully characterized.
  • Evidence about processing difficulty for rare or unexpected constructions is interpreted by one side as proof of probabilistic processing; the other says this reflects prediction and surprise layered on top of a deterministic parser.

Methodology, statistics, and embeddings

  • Concerns about small subject numbers, brief stimuli (e.g., a single podcast), and highly contrived geometric interpretations of neural data (“brain embeddings”).
  • Skepticism that modest correlations justify strong claims; some suggest correlation is a poor dependence measure here and that entropy-based metrics might be better.
  • A technical worry is that high-dimensional LLM activations, especially if “few-hot,” may be linearly fit to many signals (including random or unrelated ones), risking sophisticated p-hacking. Prior work showing even random LLMs can be fit to brain data is cited.
  • Others respond that if no shared structure existed, such alignment methods simply wouldn’t work at all.

Brain uploading and identity

  • A side thread speculates whether this line of work moves us toward uploading minds and “killing death.”
  • Disagreement over whether an upload is “you” or merely a copy; analogies to sleep vs rebooting.
  • Some argue you also need to simulate bodily states and hormones to preserve motivations; others reply those motivations can, in principle, be copied or modified.
  • Gradual vs discontinuous upload is discussed, with the claim that if the end brain state is identical, the process may not matter for identity.

Novelty and prior work

  • Commenters note similar transformer–brain correlation papers already exist, so this is seen as incremental rather than groundbreaking.
  • Several emphasize that correlation does not equal causation: at best, these results suggest overlapping computational principles or useful decoding tools, not that LLMs and brains are “the same thing.”

Bigscreen Beyond 2

Display, Refresh Rate & Resolution

  • Many ask about 120Hz support; current specs list “up to 90Hz,” with comments that 75/90Hz may require reduced resolution or upscaling.
  • Several posters criticize marketing that calls it “5K” without clearly stating that’s combined (effectively 2560×2560 per eye).
  • Some argue that low weight and very short front-heavy leverage significantly reduce physical lag, so 75–90Hz on an ultra-light OLED headset can feel better than expected versus heavier LCD headsets.

Optics & Aberrations

  • The “Advanced optics” image on the site is criticized for obvious chromatic aberration; others suggest it’s just a magnifier tool, not the actual VR optics.
  • Commenters note that chromatic/spherical aberrations in VR can be corrected in software via per-channel pre-warping, a standard technique since early VR.

Motion Sickness & Accessibility

  • A study suggesting women are roughly twice as likely to experience VR nausea is discussed; causes (hormonal vs social/experience) are deemed unclear.
  • Some argue the industry doesn’t take motion sickness seriously enough, pointing to FPS-stick locomotion as default.
  • Proposed mitigations: tunneling on turns, teleport locomotion, 90+ FPS, high fidelity headsets; others stress these are helpful but not a complete solution.
  • Experiences vary widely: some users adapt with mixed control schemes (stick for translation, body for rotation).

Market Position & Use Cases

  • Bigscreen Beyond 2 is seen as an ultra-enthusiast PCVR device for heavy users of sims, VRChat, and a few staples like Beat Saber (especially modded PC versions).
  • Concerns: high price, shrinking PCVR-first content, Quest-targeted development, and abandoned or poorly maintained SteamVR titles.
  • Counterpoint: niche VR communities (sims, VRChat) are large and wealthy enough to sustain high-end headsets.
  • Bigscreen is viewed as focused on serving an existing niche (PC peripheral for Bigscreen app, social VR, sims), not expanding the broader VR market.

Productivity & “Virtual Monitor” Use

  • Bigscreen’s density is seen as marginal for coding/reading: text is effectively shown on 3D panes, so only a fraction of panel pixels hit the “monitor.”
  • Common pattern: make text large, use many large virtual screens; this can still cause neck strain and some motion sickness.
  • Multiple users note that all current VR headsets fix focus at ~2m; this is unlike staring at a phone inches away, but 8+ hours still risks digital eyestrain.
  • Dynamic focal-distance prototypes exist but aren’t yet in shipping products.

Virtual Monitors, AR Glasses & Alternatives

  • For a “giant monitor on a plane” use case, suggestions include: Apple Vision Pro, Quest 3, Pico 4, or AR glasses (Xreal, Viture) that look more socially acceptable but offer less sophisticated spatial behavior.
  • Disabling head tracking is called a bad idea: it doesn’t reduce latency and strongly increases discomfort.
  • Some argue a dedicated non-VR monitor-replacement HMD with much higher PPD could be viable, but current VR market optimizes for wide FOV and gaming.

Meta/Quest PCVR vs Alternatives

  • Several posts complain that Meta’s PCVR (Link) is fragile and second-class vs standalone; third-party tools (Virtual Desktop, Steam Link, ALVR) often give better quality and flexibility.
  • Debates cover whether wired USB or high-end Wi-Fi (Wi-Fi 6E) with better compression (VD) yields superior results; consensus: with good networking, wireless+VD can beat Quest Link.
  • Meta’s OpenXR behavior and broader standards drama are briefly mentioned as another pain point.
  • Bigscreen Beyond 2 is appreciated as a pure PCVR, non-Meta option, though lack of inside-out tracking and reliance on base stations is a downside for some.

Eye Tracking, Foveated Rendering & Meetings

  • Built-in eye tracking is seen as important for future foveated rendering to reconcile high resolution with high framerates. Users want independent reviews of tracking quality.
  • One thread claims “eye contact” in VR (driven by eye tracking) could be the killer app for meetings; others are skeptical, citing high hardware cost, avatar uncanny valley, and user reluctance to wear headsets for work calls.
  • Some report VR meeting tools feel much more “present,” especially for workshops and 3D model reviews; others think investment here is unjustified versus cheaper solutions (teleprompters, better 2D tools).
  • Debate continues over AR smart glasses vs full VR for work: AR passthrough (AVP) vs optical/transparent AR (HoloLens style), with multiple commenters arguing non-passthrough AR is technically and UX-wise worse for many tasks.

Miscellaneous Feedback

  • Many hope for a new Valve headset; some claim a next-gen device is already in developers’ hands, others think Valve is done with hardware.
  • Multiple reports of the Bigscreen site crashing or rendering a black page, especially on iOS or large viewports.
  • Bigscreen (the app) remains a “killer app” for some on older headsets, and there’s enthusiasm that the company is still investing in high-end PCVR.

Google’s two-year frenzy to catch up with OpenAI

Google’s Early “Miss” and Internal Constraints

  • Many argue Google “had it all” first (transformers, Meena, DeepMind/Brain, TPUs, data) but was paralyzed by risk aversion, ethics worries, and internal quota systems for compute that made large training runs hard.
  • This led to talent loss and allowed OpenAI to own public mindshare; some see it as catastrophic mismanagement, others as a deliberate, profit‑maximizing delay of the LLM wave.
  • Former insiders describe early chatbots as uncannily human, deceptive, and ethically fraught—seen as too unstable to ship, especially post‑Tay/Sydney‑style scares.

Current Technical State: Gemini vs ChatGPT vs Others

  • Several commenters think Google has now largely caught up or even pulled ahead technically: praising Gemini 2.5 Pro, Flash, long context windows, speed, cost, and enterprise capabilities (Vertex, compliance).
  • Others report Gemini as fast but noticeably worse on coding, creativity, and reliability than OpenAI or Anthropic; “good for scale,” not for initial prototyping or serious work.
  • DeepSeek is seen by some as overhyped “6–9 months behind at lower cost,” and by others as a genuine threat that revealed the recipe for frontier reasoning models.

Branding, Fragmentation, and UX

  • Broad agreement that ChatGPT has far stronger brand recognition; many non‑tech users use “ChatGPT” as a synonym for “AI.”
  • Some users even misattribute Google’s AI overviews to ChatGPT, suggesting OpenAI already “owns” the category name.
  • Google’s proliferation of overlapping AI products (Gemini app(s), AI Studio, Vertex, NotebookLM, Bard/Assistant legacy) is seen as confusing versus ChatGPT’s single clear entry point.

Moats, Lock‑in, and Business Models

  • One camp: there are minimal network effects; switching between chatbots is easy; the long‑term winners will be whoever is cheapest and best for enterprises and integrations.
  • Another camp: ChatGPT already has a moat from brand, inertia, UX, features (tools, multimodal, ecosystem), and early API adoption.
  • Many argue Google and Microsoft have structural advantages via deep integration with existing suites (Workspace, Office), OSes, search, and user data; others distrust Google’s privacy/ads incentives and avoid its tools.

Leadership, Strategy, and Outlook

  • Strong criticism of Google leadership for bureaucracy, misallocation of compute, layoffs, and poor productization/marketing; some call for CEO and board changes.
  • Defenders point to massive revenue growth, a uniquely complete AI stack, and rapid recent execution; they see Gemini’s trajectory and enterprise positioning as evidence Google can still “win.”
  • Several note that AI value is still mostly incremental; with weak moats and many capable players, it’s unclear what a durable “winning strategy” ultimately looks like.

The Cult of the American Lawn

Types of Lawns & Ecological Impact

  • Distinction between “perfect” monoculture lawns (high water, chemicals, frequent mowing) and low‑input grass areas with clover/dandelions, minimal watering, and infrequent mowing.
  • Several see artificial turf as worse than real lawn: heat island, no habitat, yet often subsidized for water savings.
  • Some commenters emphasize mixed plantings (clover, creeping thyme, perennials) and shrinking grass area over time rather than total lawn elimination.

Utility of Lawns vs Alternatives

  • Strong pro‑lawn sentiment where kids use yards daily; grass is seen as lower‑maintenance than complex plantings and good for play (soccer, frisbee).
  • Others suggest trees, nearby parks, or courtyard designs as better for shade, privacy, and livability, noting US layouts are poorly adapted to hot climates.
  • Some report lawns “just happen” in wetter regions with little input beyond mowing.

Water Use, Incentives & Policy

  • Debate over water pricing: advocates for steeply marginal water prices vs calls to simply ban lawns in arid regions.
  • Criticism of current incentives that reward synthetic turf or high‑water lawns rather than overall low consumption and diversified plantings.

Dandelions, Clover & Yard Culture

  • Multiple people like dandelions aesthetically and ecologically; note they’re edible and once weren’t considered “weeds.”
  • Claims that herbicide marketing helped rebrand clover and dandelions as undesirable.
  • HOAs fining per dandelion are seen as extreme and arbitrary.

HOAs, Contracts & Power

  • Major thread on HOAs: some defend them as voluntary contracts and necessary for maintaining shared infrastructure or preventing true blight.
  • Others argue consent is weak (HOAs are near‑unavoidable in many new developments, covenants are buried in paperwork, sometimes created decades earlier).
  • Concerns that HOAs can change rules, be captured by petty or abusive boards, and effectively police aesthetics (e.g., lawn standards) with little due process.
  • Several link HOAs and zoning to historical and ongoing racial/supremacist exclusion and cooperation with policing.
  • Condo HOAs are distinguished from suburban HOAs, with the former viewed as more functionally necessary.

Blame, Individual vs Systemic

  • One commenter frames anti‑lawn discourse as another example of focusing on individual middle‑class habits rather than systemic drivers (e.g., agriculture, fossil fuels), though modest bans/requirements on lawns in arid areas are still suggested.