Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 420 of 541

Archival Storage

Personal Backup Practices and Effort

  • Many describe DIY setups: multiple HDDs (internal/external), SSDs for “live” data, occasional manual spin-up for copying, and at least one offsite drive (friend/relative) for catastrophe recovery.
  • Others rely on tools like restic/borg/Arq/rclone/Home Assistant automations to reduce mental load: daily/weekly backups, notifications only on failure.
  • Some find the work overwhelming and respond by radically pruning data (e.g., 90% deletion), keeping only configs, projects, and irreplaceable media.

Cloud vs Local (and Ransomware Concerns)

  • Cloud is seen as near-essential for personal/SMB by some; others argue a NAS + second offsite NAS can be comparable if automated.
  • Trade-offs discussed: Backblaze vs S3 Deep Archive/Glacier/B2; for tens of TB, different services dominate on price.
  • Strong emphasis on encrypting everything and sometimes using multiple cloud providers to hedge risk and provider churn.
  • Ransomware: concerns that backup credentials on live systems let attackers delete cloud backups; object lock/WORM and careful permission design are viewed as crucial but easy to misconfigure.

Tape, Optical, and “True” Archival Media

  • LTO tape: praised as designed-for-archive, with low bit error rates and long life if stored correctly, but criticized for high drive cost, IBM-controlled ecosystem, robotic/library complexity, and environmental sensitivity (temperature/humidity).
  • Real-world reports: large VFX and archive operations successfully restore from LTO for decades, but tape workflows need active management and migration to newer generations.
  • M-DISC and Blu-ray: some individuals use them for long-term personal archives; pushback notes limited capacity, doubtful 1000‑year claims, and that only specific M-DISC DVD variants were rigorously rated. Suitable for a few critical folders, not multi‑TB hoards.

Bitrot, Filesystems, and Verification

  • Several participants checksum or scrub data periodically (snapraid, cshatag, ZFS/Btrfs) and report rare but real silent corruptions that redundancy lets them repair.
  • SSD retention when unpowered is debated; consensus is you must actually read data periodically, not just power drives, but firmware behaviors are opaque.
  • 3‑2‑1 (and extended 3‑2‑1‑1‑0) strategies are common reference points, though rarely followed perfectly.

What’s Worth Archiving & the “Digital Dark Age”

  • Strong thread of “living vs archival” data: once media is shelved and forgotten, recovery odds drop socially, not just technically.
  • Several argue most personal digital content is not worth heroic preservation; others worry we’re heading toward a “bit rot era” with little surviving cultural output compared to paper-based history.
  • Multiple comments lament the lack of easy, integrated, consumer-grade archival systems (filesystems with checksums + automatic multi-location backups), blaming market incentives and OS vendors’ reliance on proprietary cloud.

Dataminr tracked Gaza-related protests

Headline and Framing

  • Several commenters call the article headline clickbait, arguing the focus should be on LAPD’s use of a social media tool rather than Dataminr’s brand.
  • Some suggest “social media monitoring tool” in the title, since the name Dataminr is meaningless to most readers.

Constitution, Law, and Changing Context

  • One thread argues modern mass data collection has turned “no expectation of privacy in public” into a route to total surveillance, beyond what earlier legal doctrines contemplated.
  • Jefferson’s idea of a constitution expiring every 19 years is debated: some see it as a safeguard for each generation; others see it as a disaster scenario where rights (speech, press, arms, privacy) would be easily weakened.
  • Attempts to “lock in” only pro-privacy changes are criticized as unenforceable once a constitution expires.

Public Social Media vs. Surveillance

  • One camp views reading public tweets about protests as normal situational awareness, not “surveillance,” analogous to reading flyers or press releases.
  • Others say that when police systematically ingest, store, and analyze public posts—especially via third-party tools—that is surveillance, regardless of openness.
  • The ACLU-style model ordinances are cited as explicitly defining such tools as surveillance, mainly to require public approval, not to ban them.

Technology, Scale, and Privacy Expectations

  • Repeated emphasis that scale changes everything: continuous, automated, searchable tracking of people’s activities is not equivalent to a lone officer briefly watching a street.
  • Carpenter v. United States is mentioned as an example of courts recognizing that cheap, pervasive electronic tracking undermines traditional “reasonable expectation of privacy” logic.
  • Some push back, arguing that the expanded reach of police monitoring merely matches the expanded reach of modern communication.

Why Police Monitor Protests

  • Defenders say monitoring protests is necessary for crowd control, preventing clashes with counter‑protests, and avoiding public safety failures.
  • Critics ask why police are focusing resources on constitutionally protected assembly instead of crime, and warn of chilling effects, watchlists, unknown data retention, and false positives.

Bias, Selective Enforcement, and Dragnet Risks

  • A key concern: preferential surveillance of certain movements (e.g., Gaza protests) can produce unequal punishment for similar levels of petty misbehavior.
  • Examples raised include drug use vs. drug arrests by neighborhood and demographics, predictive policing feedback loops, and how biased datasets make future policing more biased.
  • There is debate over whether “every demographic commits petty crimes at about the same rate,” but many agree selective attention amplifies disparities regardless of exact rates.

Local Policing, Politics, and Incentives

  • Separate subthread: criticism of LAPD/LASD as paramilitary and lawsuit-prone versus defenders blaming “soft” district attorneys for demoralizing police.
  • Others respond that refusing to enforce laws because prosecutors might not act is itself a dereliction, normalizing dysfunction on both sides.

Tech Industry and Surveillance

  • Some argue this is the inevitable trajectory of tech: tools built for open communication and even protest organizing (e.g., early Twitter) now double as surveillance infrastructure.
  • Broader critique: wealthy founders align with state power, and tech firms drift into defense and repression; transhumanist or elitist ideologies are mentioned as part of that mindset.

International and Normative Perspectives

  • Non‑US commenters say it seems normal for police to track protest times/locations and maintain a visible presence, seeing that as part of democratic crowd management.
  • Others counter that the real issue is how such tools are targeted, how data is stored and used afterward, and the potential for repression even when activity is formally legal.

Wall Street’s ‘Private Rooms’

What Private Rooms/Dark Pools Are

  • Seen as off-exchange venues that hide pre-trade information (large resting orders) but still print trades to the consolidated tape at or within the NBBO.
  • Several commenters stress they’re mechanically similar to traditional OTC/block trades; “private rooms” just automate and gate who can interact.

Perceived Legitimate Uses

  • Main use: execute very large institutional orders without moving the displayed price or revealing intentions to HFTs and predatory strategies.
  • Institutions value the ability to control counterparties (e.g., avoid “toxic” flow, trade mainly vs. passive/index or retail-like flow).
  • Some say this reduces volatility on public exchanges and improves execution for pension/401k money, not just “Wall Street”.

Concerns About Fairness, Corruption, and Insider Trading

  • Strong sentiment that opaque venues inherently enable manipulation, insider trading, and wealth transfer from unsophisticated participants (retail, index funds).
  • Others argue insider trading rules apply equally on lit and dark venues; dark pools merely hide order books, not post-trade data.
  • Widespread distrust of enforcement: SEC seen as going after easy targets, fines as “peanuts”, executives rarely held personally liable.
  • Debate over whether executives should be criminally liable for misconduct under them; sharp disagreement on feasibility vs. justice.

Information Asymmetry & Data Latency

  • One commenter using ML finds dark-pool prints predictive of short‑term price moves; wishes for real-time access but notes reporting delays.
  • Another corrects: regulatory trade reporting for off-exchange trades is supposed to be within seconds; any 15‑minute delay is likely vendor/product, not law.
  • Discussion of costly “professional” data feeds vs cheaper retail feeds and whether dark-pool prints are truly delayed.

HFT, Market Structure, and Reform Ideas

  • Some see dark pools/private rooms as a defensive response to HFT and hyper-fragmented, millisecond markets.
  • Others defend HFT/market makers as liquidity providers skimming tiny spreads without long-term risk.
  • Proposed fixes: ban HFT, enforce holding periods, batch auctions (per-minute crosses), or slower markets; critics say this creates new arbitrage, reduces liquidity, and may benefit large firms.

Transparency vs. Privacy in Markets

  • Philosophical split: markets as a public good needing maximal transparency vs. acceptance that large private trades, like wholesale deals, are normal business.
  • Concern that growing private volume could hollow out public markets, increasing volatility and eroding price discovery.

“Diversity Pools” and Counterparty Selection

  • Example of a “diversity pool” restricted to minority-owned brokerages sparks debate.
  • Some see it as practical counterparty vetting and niche ecosystem-building; others think the identity framing distracts from the broader power imbalance and exclusivity of such venues.

Alphabet spins out Taara – Internet over lasers

Weather, Fog, and Reliability

  • Many expect links to fail “at the first sign of rain,” based on bad microwave backhaul experiences; others counter that rain fade in microwave is largely engineered around today.
  • Several point out that for optical links, fog and turbulence (scintillation), not just rain, are major unresolved problems; bandwidth and link quality may fluctuate heavily with conditions.
  • Taara’s marketing about “adaptive rate and hybrid architecture” in poor weather is viewed skeptically until long‑term uptime data is published.

Use Cases vs Fiber, Starlink, and Microwave

  • Broad agreement that buried fiber is superior on capacity, reliability, and long‑term economics wherever it’s feasible.
  • Taara is seen as a niche tool: point‑to‑point backhaul between towers/rooftops, temporary events, disaster recovery, mining camps, arid or weather‑stable regions—not general last‑mile.
  • Some compare it to Starlink; others argue it’s more like a backhaul supplier to terrestrial ISPs rather than a direct competitor.

Performance, Distance, Cost, and Interference

  • Commenters say Taara claims roughly 10× the distance of earlier free‑space optical (FSO) kits and up to ~20 Gbps, with solid‑state beam steering as the key innovation.
  • Cost estimates around $30k per link draw criticism versus ~$3–6k high‑capacity microwave PTP radios. Counterpoint: you can’t simply stack many RF links side‑by‑side due to spectrum and interference limits, while optics avoid licensing and spectrum congestion.

Line‑of‑Sight and Operational Issues

  • Line‑of‑sight is both a strength (narrow beams, hard to intercept, no licensing) and weakness (blocked by buildings, birds, humans, smoke, fog). Anecdotes include people physically standing in the beam and dropping a link.
  • Military and HFT uses are discussed: optical links are attractive for jam‑resistant, high‑bandwidth, directional comms, but vulnerable to obscurants (smoke, dust, clouds).

History and Terminology

  • Several recall 1980s–2000s commercial infrared/laser links (and projects like RONJA) that worked over short distances but struggled in bad weather and economics. Taara is mostly seen as a scaled‑up, more refined FSO, not a brand‑new concept.
  • Side debate on “invisible light”: thread consensus is that infrared and ultraviolet are still “light” in physics terms, even if not visible to humans.

Branding and Miscellany

  • Multiple commenters are initially confused by “X” vs social‑network “X”; some mock modern tech naming.
  • Regulatory angle: optical LOS links generally don’t require spectrum licenses, which is seen as a significant practical advantage over microwave.

Deep Learning Is Not So Mysterious or Different

Competing Explanations for Generalization

  • One thread argues PAC-Bayes / VC-style hypothesis-space bounds (as in the linked paper) can already explain deep learning’s “benign overfitting” with flexible hypothesis spaces plus a simplicity bias.
  • A dissenting view claims this is insufficient after results like Zhang et al. showing the same network can fit both real and random labels; hence focusing only on hypothesis space is too coarse.
  • That camp pushes algorithmic stability and optimization dynamics (especially SGD) as the key: you must explain why training lands in a good subspace among many zero-loss but bad-generalization solutions.
  • Others mention statistical mechanics and loss landscapes as useful lenses; there is disagreement on whether optimizer details are central or historically overstated.

Simplicity Bias and Regularization in Deep Learning

  • Several comments map the paper’s “soft preference for simpler solutions” to standard regularization:
    • L1/L2 penalties, dropout (roughly like layerwise L2), AdamW weight decay.
    • Architectural and initialization choices as “soft inductive bias” (e.g., special ViT initialization).
  • Some note equivalences: L2 ↔ dimensionality reduction/smoothness; dropout ↔ L2; L1 ↔ thresholding/RELU-like behavior.

Depth, Architectures, and Inductive Bias

  • Example cited from recent RNN work: shallow minimal RNNs cannot capture long-range ordered dependencies, but deeper (≥3-layer) versions can, highlighting cases where “deep” structure is genuinely necessary.

N‑gram Models vs Modern LLMs

  • A proposed word-distance counting scheme is likened to classic n‑gram/Markov models.
  • Multiple replies: such models scale poorly (combinatorial explosion, sparsity) and produce much weaker, often incoherent outputs compared to transformers.
  • Attention and learned embeddings are emphasized as key differences enabling generalization beyond seen n‑grams; some point to scaled-up n‑gram research as a partial bridge.

Is Deep Learning Really a “Black Box”?

  • One thread insists nothing is truly mysterious: every transistor state is determinate.
  • Others counter that “black box” here means “too complex for any human to fully understand in detail,” not “fundamentally unknowable.”
  • Weights are highlighted as opaque artifacts of training: not hand-designed and hard to interpret neuron-by-neuron.
  • Several comments say the real mystery is how information is encoded in parameters and why performance scales so smoothly (e.g., via near-orthogonal representations and superposition).

Learning Resources and Intuitions

  • Strong enthusiasm for approachable resources: StatQuest (book and videos), Stanford CS109, Caltech “Learning from Data,” and 3Blue1Brown.
  • Some note that understanding the universal approximation theorem and viewing neurons as (generalized) linear models plus nonlinearities helps demystify networks, though emergent behavior is far more complex than that slogan.

Generalization, Data Scale, and Benign Overfitting

  • One view: DNNs are not inherently superior at generalization; on small tabular datasets, classical methods (e.g., SVMs) often outperform, while deep nets overfit.
  • Same commenter attributes LLM “magic” to enormous effective sample sizes in next-token prediction, enabling huge models without classical overfitting, plus reusability of learned representations across tasks.
  • Others respond with work showing networks that can memorize random labels still generalize well on real data, reinforcing that something nontrivial about training dynamics or inductive bias is at play.
  • Whether the simplicity bias comes mainly from explicit regularization, SGD’s implicit bias, architecture, or loss landscape remains contested and described as not yet fully understood.

Open and Unanswered Questions

  • A question about where the regulatory line for “AI” should be drawn receives no substantive answer.
  • One commenter explicitly calls for a clean ablation study that “turns off” benign overfitting in deep nets to isolate the necessary and sufficient conditions; they note this has not yet been convincingly achieved.

Chaos in the Cloudflare Lisbon Office

Role of the chaos wall in Cloudflare’s security

  • Multiple commenters say the wave wall (like the lava lamps and pendulums in other offices) is a real entropy source but not mission‑critical.
  • Cloudflare staff state it’s one of many entropy inputs; if it fails or is corrupted, global entropy generation is unaffected.
  • Consensus: it’s additive “nice-to-have” entropy layered on top of conventional RNGs, not a single point of failure.

Randomness sources and technical debate

  • Several point out that Linux’s RNG and hardware TRNGs (e.g., thermal noise, Zener diodes) are already sufficient.
  • Some argue the main entropy comes from camera sensor noise; the chaotic visual scene is largely a visual metaphor. A lens cap or dark scene would still yield randomness.
  • Others mention the risk of combining entropy sources: a malicious or adversarial source might bias a combined RNG; links are shared to arguments about this threat model.
  • Simple combinations like XOR with a static value preserve randomness if at least one source is good, but concatenation/XOR strategies must be implemented carefully.

Reliability, attack scenarios, and modeling

  • Hypothetical “terrorist cuts power to the wall” is dismissed as irrelevant due to redundancy across sites and other entropy sources.
  • Questions about whether environmental regularities (lighting, temperature) could reduce randomness lead to a fluid‑dynamics discussion: turbulent flow is chaotic and practically impossible to predict with useful precision.

PR, marketing, and recruiting angle

  • Many label the wall “1000x PR/show”: negligible security gain, minimal risk, lots of blog and branding value.
  • Some see it as “blog-driven engineering” aimed at recruiting and employer branding; likely very high ROI compared to typical marketing spend.
  • A few caution that less‑equipped teams shouldn’t copy this as a primary RNG design.

Cloudflare trust, support, and privacy concerns

  • One indie developer relates a billing error and slow support, seeing this as hostile to small customers; others argue leadership jumping into HN to fix issues is positive but not a scalable solution.
  • Old incidents like Cloudbleed are mentioned as lingering trust concerns.
  • A side thread accuses Cloudflare of logging usernames/passwords; other commenters and Cloudflare rebut this, emphasizing privacy‑preserving credential checking rather than password logging.
  • Some frame the chaos wall and similar posts as distraction from broader issues (MITM role, logging debates).

Lisbon office and local context

  • Many admire the Lisbon office and view; discussion veers into Lisbon vs San Francisco, tourism, expats, real‑estate pressure, and relatively low local salaries.
  • Cloudflare’s European hiring (especially Portugal) is discussed as both cost‑driven and innovation‑driven; rumors of “offshoring to India” are explicitly denied.

Historical and cultural references

  • SGI’s 1990s Lavarand system is cited as a clear precedent; its patent has expired and Cloudflare’s work is seen as a spiritual successor.
  • Commenters riff on sci‑fi scenarios about “entropy terrorists,” references to TV shows, art installations, and long‑standing fascination with physical randomness.

Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table

Ignorance of Conventional Wisdom & Innovation

  • The quoted line about the student not knowing the conjecture sparks debate about whether ignorance of prior work can enable breakthroughs by avoiding mental constraints.
  • Others argue this is romanticized: most real advances come from people deeply trained in the field, with this case being an exception rather than a model.

Juniors, LLMs, and Software Practice

  • Some claim high-performing teams should always include juniors to ask naïve questions and attempt big, open-ended tasks.
  • Others note that in practice, juniors mostly get “talked back into” conventional approaches, not breakthroughs.
  • LLMs raise concern that juniors may think even less, just pasting prompts and code, worse than the “StackOverflow era.”
  • Counterpoint: blindly committing LLM output is unlikely to succeed; review and debugging still require understanding.

Modern Physics, Orthodoxy, and Breakthroughs

  • One thread questions whether modern physics is “stuck” due to orthodoxy and lack of recent dramatic breakthroughs.
  • Responses list significant advances (Higgs, gravitational waves, neutrino physics, quantum computing theory) and stress that limits are mostly experimental/technological, not ideological.
  • Some see physics near “completion” at current experimental scales; others emphasize we know our foundations are incomplete but can’t yet test alternatives.

Cranks, Credentials, and Gatekeeping

  • There’s tension between tolerating self-taught “cranks” versus the time cost and noise they impose (spam manuscripts, low SNR).
  • Credentials are framed as a heuristic for triaging attention, not as a fundamental refutation of ideas.
  • Over-aggressive ridicule of bad ideas is criticized as discouraging curiosity and questions.

Defying Experts & the Theranos Example

  • A side discussion uses Theranos to ask if ignoring experts can ever yield “impossible” technologies (e.g., tiny-sample blood tests).
  • Several commenters object: Theranos is a case where experts were simply right; using it as a positive example of challenging consensus is misleading.
  • Broader point: challenging orthodoxy is sometimes valuable, but most “experts are wrong” stories end in failure, not revolution.

Conjectures, Romantic Narratives, and Scientific Progress

  • Multiple comments stress that a conjecture is meant to be falsified; this is not an “overthrow of a theory.”
  • The outsider-genius narrative is seen as emotionally appealing (underdog vs institutions) but statistically rare.
  • References to ideas like “science progresses one funeral at a time” appear, with some skepticism about over-idealizing such stories.

Desire for Algorithmic Detail

  • Several readers are disappointed that the Quanta/Wired piece barely explains the hash-table algorithm.
  • The original paper is linked for those wanting technical details; some note a B-tree-like flavor and speculate there might be a simpler underlying idea.

Practicality, Performance, and Memory Tradeoffs

  • Concerns:
    • Resizing may be very complex and could invalidate pointers except under chaining.
    • Multiple hash computations per key may be too costly, making it slower than modern open-addressing tables in practice.
  • Some suggest it could still be useful where hashes can be memoized (e.g., string interning) or where maximum table size is known.
  • Skeptics challenge others to implement it and compare against top-tier existing implementations; they suspect this is mainly a theoretical result.
  • Memory usage is questioned; small GitHub implementations suggest higher overhead, though the paper’s design (log‑sized arrays 1,2,4,8,…) is cited to ask what exactly drives that overhead.
  • A specific confusion is raised about why the data structure forms a “funnel” (unequal array sizes) instead of equal-sized arrays—suspected to be a memory vs. performance tradeoff, but not clearly explained in the article.

Authorship Norms and Credit

  • Some feel the discoverer should be first author but note the paper is alphabetical.
  • Others explain that in theoretical CS and adjacent areas, alphabetical ordering is common, unlike many other CS subfields where first/last authorship indicates contribution or advisor roles.

Meta: Repeated HN Discussions & Culture

  • Commenters note this story and even specific arguments have appeared on HN before, leading to self-aware jokes about repetition, “eternal September,” and whether the site is full of bots or just “old farts” rehashing the same debates.

Rippling sues Deel over spying

Allegations and Evidence Discussed

  • Commenters highlight the complaint’s detail as unusually rich: Slack audit logs, search terms, and timing are seen as strongly suggestive that an internal Rippling employee in Ireland was acting under Deel leadership’s direction.
  • Key points raised: use of internal HR data (unlisted phone numbers) seemingly to help a Deel executive contact Rippling staff; Slack searches that line up with a sanctions-related press inquiry; email links between the alleged spy and Deel leadership; and the “honeypot” fake Slack channel (“d-defectors”) that was accessed shortly after only Deel’s senior legal/board recipients were told of its existence.
  • The alleged spy’s attempt to evade phone seizure in Ireland (locking himself in a bathroom and possibly trying to destroy his phone) is widely noted as both incriminating and farcical.

Legal and Criminal Framing

  • Several comments stress that theft of trade secrets is a serious crime, not “all’s fair in war.”
  • The suit is civil under the Defend Trade Secrets Act; some speculate it may lead to criminal Economic Espionage charges, though others caution against over-interpreting a one-sided complaint that has strong incentives to exaggerate.
  • There’s mention of alleged Russia sanctions issues around Deel, with debate about whether enforcement appetite differs by US administration.

Workplace Surveillance, Security, and Honeypots

  • Many are surprised at how granular Slack enterprise logging is (channel views, searches, document access). Others respond that “enterprise anything” is heavily audited.
  • Some predict more “corporate espionage detection” products; others reply this already exists as Data Loss Prevention and that adding more third parties increases risk.
  • There’s ambivalence over counterintelligence practices: some argue they create unpleasant, paranoid workplaces; others note honeypots and compartmentalization are longstanding, low-cost techniques.

Corporate Ethics and Competitive Behavior

  • A subset of commenters are indifferent or even hostile to corporations complaining about being spied on, given pervasive employee and consumer surveillance.
  • Others argue this behavior, if true, crosses a clear line and sets toxic incentives for sales-driven, low-differentiation SaaS businesses.
  • Some see Rippling as overly litigious and question motives; others think the honeypot evidence, if accurately presented, goes well beyond “boy who cried wolf.”

YC, Investors, and Ecosystem Questions

  • People note both firms are YC companies, prompting questions about YC backing close competitors and its ability to screen founders’ character.
  • A long investor list in Deel is shared; another commenter questions its relevance.

Product Experiences and Perceptions of Deel/Rippling

  • Multiple users share hands-on experience:
    • Deel is described as widely used for international hiring, often effective but rigid, buggy, and poor at edge cases.
    • Some contractors like Deel’s multi-account, fast transfer features but dislike recent changes such as forced use of a “Deel Wallet” with arbitration-heavy terms.
    • One employer complains Deel used its EOR relationship for direct marketing to employees, eroding trust.
    • Rippling is described as a PEO/HR stack that can give small firms “big company” benefits; some users are satisfied, others neutral.
    • Several call Deel the worst PEO they’ve used; others say both products are “boring but functional,” with limited room for differentiation.

Geopolitics and National-Origin Concerns

  • Some comments claim Israeli-linked companies (including Deel) are structurally untrustworthy due to intelligence backgrounds, while others push back, pointing out Deel’s US base and mixed founder backgrounds.
  • Further discussion links this to Palestine (e.g., which EORs support hiring there), with strong ethical judgments about provider choices.

Meta: HN Coverage and Cultural Framing

  • One user wonders if the story is being quietly moderated off HN’s front page.
  • Others compare the saga to spy novels and cyberpunk, leading to a side debate about glamorizing dystopian corporate power versus treating such fiction as a warning.

Stupid Smart Pointers in C

Overall reaction to the “smart pointer” hack

  • Many see the return-address–smashing trick as a clever, entertaining experiment, but not something to use in production.
  • Concerns include undefined behavior, extreme fragility across compilers/ABIs, and interaction with stack-protection and future CPU mitigations.
  • Some view it as emblematic of “C hacks” that are fun, but whose magic is not worth the risk outside toy code.

Portability, optimization, and safety issues

  • The approach relies on exact stack layout and presence of a frame pointer; inlining, LTO, stack alignment, shadow stacks, or different ABIs can all break it.
  • It likely harms branch prediction (like thread switching), fighting against return-address prediction hardware.
  • Stack canaries/StackGuard and microcode security updates may invalidate such tricks unexpectedly.
  • Several commenters argue that such stack tricks belong only in hand-written assembly, if anywhere.

Preferred alternatives for resource/memory management in C

  • GCC/Clang __attribute__((cleanup)) is widely used to implement scoped cleanup (including locks), but:
    • It’s non-standard and unsupported by some compilers (notably MSVC, many embedded compilers).
    • It doesn’t automatically handle values you want to return; workarounds exist via macros or manually nulling pointers.
  • Proposed and upcoming defer for C (block-scoped, unlike Go’s function-scoped defer) is discussed as a more principled solution.
  • Many advocate arena/pool allocators (talloc, APR, obstacks, custom arenas):
    • Group objects by lifetime “bucket” and free whole arenas at once.
    • Often simpler and faster than tracking thousands of individual object lifetimes.
  • Other patterns:
    • “Never free” or custom allocators for small or short-lived programs.
    • Simple manual patterns: initialize pointers to NULL, allocate, then free all non-NULL (or all) at a single cleanup point.
    • Per-thread resource/error state that records all allocations and frees them en masse on exit.

Standard C vs extensions and toolchains

  • Disagreement over relying on GCC/Clang extensions: some prioritize long-term portability (including MSVC/embedded), others pragmatically target the major compilers and expect extensions to be standardized later.
  • Notes that real-world C already uses platform- and compiler-specific code; fully “pure” standard C is rare.
  • C23 changes already broke some existing code, showing that even standards evolution can affect portability.

Reference counting and performance

  • Reference counting is called out as bug-prone and sometimes badly matched to modern CPUs.
  • Under contention, atomic refcount updates can cause cache-line ping-pong and high latency; even adjacent refcounts sharing a cache line can suffer.
  • A GCC plugin exists to automate reference counting; feedback is invited.

Comparisons with C++, Go, Rust, Zig

  • Several argue that C++’s real advantage is RAII/destructors, not “smart pointers” per se; with RAII-like constructs in C (cleanup/defer), smart pointers become one tool among many.
  • Opinions vary:
    • Some say “just use C++ and std::unique_ptr” instead of C hacks.
    • Others avoid C++ for complexity or control reasons, recreating OO patterns in C (X macros, header-based inheritance, virtual-function-like switches).
  • Go’s function-scoped defer is criticized as inferior to scope-based RAII for preventing deadlocks and making lock lifetimes clear.
  • Rust’s Drop trait is praised conceptually but also noted to have limits (no error returns, no extra parameters).
  • Zig is cited as a language that bakes arena/allocator-style lifetime management into its standard approach.

Tooling and verification

  • Some suggest that, for serious code, static/bounded model checkers (e.g., CBMC) are a better route to memory-safety assurance than deep stack hacks.

'Dark oxygen': a deep-sea discovery that has split scientists

Deep-sea Mining, Ecosystems, and Risk

  • Many commenters argue deep-sea mining is reckless given poor understanding of deep-ocean ecosystems, ongoing mass extinction, and ocean dependence for planetary stability.
  • Others counter that humanity never has full understanding before acting; the real question is how much caution and what level of quantified risk is needed.
  • There is pushback on “unknown consequences → ban it” arguments, but also on “benefits everyone” claims for mining, which some see as classic rent-seeking and a Tragedy of the Commons case.

How Important Are Polymetallic Nodules?

  • One detailed comment cites: rich animal life where nodules exist, long recovery times where nodules were removed, nodules forming over millions of years, and lab evidence of electrochemical oxygen production as reasons mining would be “a crime against the planet.”
  • Others assert there is “very little life” at the abyssal seafloor and that disturbance is local and reversible over decades, analogous to land development.
  • This is challenged with reminders that only a small fraction of the deep ocean has been directly explored and that life is often found where once thought impossible.

Scientific Validity of “Dark Oxygen”

  • Several commenters are highly skeptical of the paper:
    • Question where the long-term energy source for electrolysis would come from, given nodules’ age.
    • Suggest microbial activity is a simpler explanation and was dismissed too quickly.
    • Note that even the authors admit key mechanistic unknowns (energy source, stability, conditions).
  • A marine geophysicist criticizes the journal’s track record and suspects weak peer review, though acknowledges such speculative work can still be valuable.

Media Framing and Origins-of-Life

  • Multiple comments attack the article’s claim that life was “made possible” by photosynthetic oxygen, calling it logically circular and scientifically wrong or oversimplified.
  • The consensus in the thread: at most this touches aerobic/complex life, not the origin of life itself, and the press-release-style framing is misleading.

uv downloads overtake Poetry for Wagtail users

Why uv is attracting so much attention

  • Viewed by many as the first time Python packaging feels “coherent”: one tool for dependency resolution, lockfiles, venvs, and Python version management.
  • Speed is repeatedly called out as transformative (10–100x faster than pip/Poetry in some reports), especially in CI, Docker builds, and on constrained hardware like Raspberry Pi.
  • Being a standalone Rust binary avoids bootstrapping issues (no “have Python to manage Python” problem) and lets it replace pip, venv, pyenv, and pipx for many users.
  • Strong support for standards (PEP-based configs, lockfiles, build backends) is seen as future-proof and makes migration away possible if ever needed.

Workflow and tooling integration

  • Users like uv init / uv add / uv run for quick one-off scripts and projects; inline script dependencies are appreciated.
  • Common pattern: keep using .venv activation directly, or automate it with fish/direnv; some prefer uv run, others find it too verbose.
  • Works with tox/nox (via plugins), PyCharm, Docker/devcontainers, Wagtail, and can act as a drop‑in pip frontend (uv pip ...).
  • Integrates with broader ecosystem tools: pyenv, mise, pixi, pdm (as a resolver backend).

Limitations and remaining hard problems

  • Does not solve non-Python/system dependency issues (CUDA, GEOS, C/C++ toolchains, system libs); people recommend pixi/conda, Spack, Nix/Guix, or Docker for full-stack environments.
  • Still relies on build backends for compiling native extensions; packages can fail to build just as with pip.
  • Not a fit for Python 2; commenters say Python 2 support is effectively over.
  • A few concrete rough edges mentioned (e.g., a uv pip install targeting the wrong venv, annoyance around extras for PyTorch/CUDA).

Ecosystem, governance, and fragmentation concerns

  • Some worry about over‑reliance on a single, corporate-backed tool (bus factor, long‑term incentives, impact on packaging standardization). Others note Astral’s active engagement with PEPs and standards as a mitigating factor.
  • There’s nostalgia and respect for pipenv, Poetry, and PDM, but several users say uv’s speed, simplicity, and flexibility make previous tools feel obsolete.
  • A minority argue pip+venv (or Poetry/PDM) “just work” for them and that retraining teams may not justify the gains, especially where pip speed isn’t a major pain point.

Wagtail‑specific observations

  • Many Wagtail projects historically used Poetry; users report it generally works but is slow and confusing for common tasks.
  • Data from Wagtail downloads show uv overtaking Poetry and PDM usage collapsing, raising concerns about betting on less‑adopted tools.

The Alexa feature "do not send voice recordings" you enabled no longer available

Perceived Bait-and-Switch & Consumer Rights

  • Many see removal of “do not send voice recordings” as a classic bait‑and‑switch: a product was bought under one privacy expectation, later unilaterally weakened.
  • Commenters argue this should trigger refunds or even be treated as breach of contract; others note the standard “we can change anything” clauses make enforcement hard.
  • Some say “just return it” is insufficient; people want rules that prevent unilateral downgrades without consumers constantly monitoring ToS changes.

ToS, Legality, and Enforcement

  • Debate over how enforceable ToS actually are: courts require conspicuous notice and explicit assent; silent background changes are often not binding.
  • ToS cannot legalize otherwise illegal conduct (e.g., unfair contracts, deceptive practices), but whether this specific change breaks any law is seen as unclear.
  • Class actions are discussed as theoretically strong but practically expensive; US agencies like the FTC are portrayed as politically weakened.

US vs EU: Regulation and Outcomes

  • EU commenters highlight GDPR and stronger unfair-contract laws, expecting regulators to ask: “it worked yesterday; why not today?” and possibly force changes or compensation.
  • Others reply that GDPR enforcement is slow, fines often small relative to profits, and big firms treat them as a cost of doing business.
  • A long subthread disputes whether higher US GDP per capita (e.g., Mississippi vs many European countries) actually maps to better quality of life, citing healthcare, life expectancy, inequality, and education.

Privacy, Surveillance, and Trust in Corporations

  • Strong distrust that any cloud assistant will remain privacy‑respecting over time; “never give data based on current policy, because it will change.”
  • Concerns: leaks, law‑enforcement warrants, warrantless access (citing Ring), training AI on voices, and psychological harms of constant surveillance at home.
  • Others push back on the “always streaming” fear, arguing that continuous upload and processing would be expensive and likely detectable via traffic analysis; but buffering and delayed upload are acknowledged as possible and hard to disprove.

LLMs and the “Cloud-Only” Justification

  • Some argue Alexa is being pushed cloud‑only to support LLM-based “new Alexa,” with on‑device hardware too weak for large models.
  • Critics call this a business choice, not a technical inevitability: transcription already happens locally; smaller or hybrid models could be used; “too big for the device” is seen as a convenient excuse to centralize data.

Alternatives, Resistance, and Hacking

  • A sizable group advocates avoiding voice assistants entirely: “winning move is not to play.”
  • Others promote Home Assistant and Open Home Foundation devices with fully local speech processing and optional local LLMs, noting setup is still “enthusiast”‑level but rapidly improving.
  • People discuss physically disabling microphones, isolating devices on the network, or repurposing Echo hardware via rooting or alternative firmware; current options are limited and technically involved.
  • Several families state they are unplugging or selling all Alexa devices after this announcement, even if they previously tolerated them.

Are Smart Speakers Worth It?

  • Many say assistants are mostly used for: timers, simple music playback, weather, unit conversion, and basic smart‑home control; these could be done via phones or local systems.
  • Some still find voice control genuinely valuable, especially for cooking with messy hands, driving, or for elderly and non‑technical users who struggle with phones and apps.
  • Others find voice UX inherently awkward or cognitively unusable compared to visual interfaces, especially for tasks like “what’s the weather like” where spoken summaries feel insufficient.

Responsibility, Sympathy, and Politics

  • Split between those who feel little sympathy (“you were warned putting a wiretap in your home”) and those arguing consumer advocates must still defend victims of corporate overreach.
  • Broader US political frustration threads through: deregulation, propaganda, wealth concentration, and perceived erosion of democratic checks are seen as the environment enabling such moves.
  • Several note that the deeper structural problem is that we “rent” cloud‑dependent devices and services rather than own stable products, making post‑purchase degradation increasingly normal.

Next generation LEDs are cheap and sustainable

Terminology and marketing claims

  • Several comments argue “sustainable” is a mistranslation of the Swedish “miljövänliga” (“environmentally friendly”), and that both are fuzzy marketing terms.
  • Others push back on knee‑jerk cynicism, noting the work is explicitly about lifecycle‑aware device design, not just buzzwords.

Environmental and material considerations

  • The article’s “environmental gain” is framed mainly as replacing gold with cheaper metals (copper, aluminum, nickel), while keeping a small amount of lead.
  • Some are uneasy with this framing: it downplays lead, which commenters see as a serious pollutant, especially when products are mass‑produced and discarded.
  • There’s debate over how much risk encapsulated LEDs actually pose to the environment.

Reliability, design, and disposability of LEDs

  • Many report LED bulbs and fixtures failing more often than advertised, often due to bad drivers and heat, not the LED chips themselves.
  • Enclosed or unvented fixtures, old dimmers/relays, and dirty mains power are cited as common LED killers.
  • Integrated LED fixtures and sealed-battery products are criticized as promoting disposability; replacing entire fixtures or devices for minor failures is seen as wasteful.
  • Some note that better‑quality or commercial‑grade products last much longer, but are expensive; others say even brand‑name bulbs can fail early.

Light quality, flicker, and dimming

  • Users complain about poor color rendering and the inability of most LEDs to match halogen’s “full spectrum” feel. High‑CRI LEDs exist but are costly and still not equivalent.
  • Others prefer daylight‑temperature LEDs and don’t understand the spectrum criticism.
  • PWM dimming is discussed at length: it’s standard, efficient, and decades‑old practice, but can introduce flicker that causes headaches for some.
  • Some want simple, non‑flickering, dimmable LEDs; suggestions include using 0–10V dimming drivers or higher‑frequency PWM.

Perovskite LEDs and longevity

  • Commenters note perovskite LEDs are not a brand‑new concept and that lifetime is the main hurdle before their lower material costs matter.
  • Some question whether perovskites’ reputed fragility and short lifetimes (e.g., in solar cells) undermine their promise for general lighting.

Open, modular, and system‑level ideas

  • There’s a desire for open, modular electronics (shared LED drivers, appliance controllers) to reduce waste.
  • Others argue this conflicts with economics, certification costs, IP issues, and the long‑running trend toward higher integration, not modularity.
  • A DC lighting circuit for homes is proposed but dismissed as uneconomical due to voltage drop; centralized drivers plus LED fixtures are suggested instead.

Launching RDAP; sunsetting WHOIS

Perceived Decline in WHOIS Usefulness

  • Many commenters say they haven’t meaningfully used domain WHOIS in years; GDPR, privacy proxies, and spam harvesting of contact data are seen as having largely “killed” it.
  • Others still rely on it regularly for:
    • Checking if a domain is registered, with which registrar, and since when (useful for scam/fraud detection).
    • Finding abuse contacts and registrar info in security/ops work.
    • IP WHOIS (e.g., ARIN) for netblock ownership and abuse reporting, which is widely viewed as still valuable.

RDAP vs WHOIS (Protocol and Tooling)

  • RDAP is described as “WHOIS over HTTPS/JSON”: same underlying data but structured, authenticated, and machine-parseable.
  • Supporters emphasize:
    • WHOIS is an unstructured text blob with virtually no standardization; programmatic parsing is a nightmare.
    • RDAP has detailed RFCs, a consistent JSON model, and is much easier to integrate into tools and automate.
  • Skeptics are wary of increased complexity vs the bare-bones simplicity of WHOIS, and some fear change “for political reasons.”
  • Deployment is incomplete: many TLDs (especially ccTLDs) still lack RDAP or heavily rate-limit it, so a mixed WHOIS/RDAP world is expected for some time.
  • Most users are expected to keep using “whois lookup” web tools or CLI wrappers, with the protocol swap mostly invisible.

Privacy, Identity, and Accountability

  • Strong criticism of the historic model where registrants had to pay extra for privacy or expose name, address, phone, and email to the world; WHOIS is described as a spam and scam magnet.
  • Examples of TLDs (.us, .in, .edu, some ccTLDs) that forbid privacy, leading to real harassment/spam stories.
  • Debate over real vs fake registration data:
    • One side: use real info to retain legal control and recover stolen domains; domains should have accountable owners like land records.
    • Other side: anonymity is important for safety or sensitive/political content; public personal data is dangerous and unnecessary when law enforcement can subpoena registrars anyway.
  • RDAP’s “differentiated access” is viewed by some as enabling better privacy (“not everyone sees everything”) and by others as a vector for monetization and law-enforcement overreach.

Broader Web Changes and Nostalgia

  • Several reflect that WHOIS once helped contact site owners on a more personal, decentralized web; now most content lives on big platforms, and individuals less often own visible domains.
  • Mixed feelings: today’s web is more accessible to non-technical people, but also more centralized, “gated,” and less personal.

Study finds 46 percent of U.S. counties have pharmacy deserts

Causes of pharmacy decline

  • Multiple commenters cite corporate consolidation: big chains and superstores (CVS/Walgreens/Walmart/Amazon/Target) undercut or buy out small pharmacies, then close or hollow them out.
  • Pharmacy Benefit Managers (PBMs) and insurer-owned mail-order pharmacies are seen as squeezing brick-and-mortar margins via contracts and reimbursement terms.
  • Some report “pricing regulations” and PBM-linked rules that require retail pharmacies to accept the same reimbursement as mail-order, making in-person service uneconomic.
  • E‑commerce is blamed for killing the general-store role pharmacies once had, leaving them dependent on low-margin prescriptions and OTCs.
  • Retail theft and the cost of securing inventory are mentioned as another pressure in some cities.

Rural access and lived experience

  • Several people live in counties with zero or very few pharmacies, requiring 1–2 hour drives or cross-state trips; clinics may be nurse-run with limited stock.
  • Others describe long waits, empty shelves, and reduced hours at remaining chains.
  • Strong pushback against the idea that rural residents “chose” this; many are trapped by poverty, debt, lack of jobs, high housing costs elsewhere, and family ties.
  • Some note that rural services of all kinds (grocery, hardware, basic medicine) have collapsed due to supplier consolidation and weak antitrust.

Mail order vs. local pharmacies

  • One camp argues mail-order and same-day delivery should largely replace rural pharmacies; critics respond that:
    • Same-day/one-day delivery is unreliable or nonexistent in many rural areas.
    • Mail is unsuitable for urgent prescriptions, controlled substances, and situations where treatments must be tried sequentially.
    • USPS is being degraded; private carriers don’t have universal-service obligations.
  • Debate over whether phone-based counseling and centralized call centers can substitute for in-person pharmacists, with skepticism about quality.

Policy, economics, and politics

  • Suggestions include: subsidies/price supports for small pharmacies, relaxing pharmacist training requirements, mandatory rural service for medical graduates, and single-payer to stabilize demand.
  • Others see pharmacy deserts as a predictable outcome of “small government + corporate power,” with arguments over which political choices led here and whether rural voters “brought it on themselves.”
  • Housing and zoning in cities are cited as barriers preventing rural poor from moving to better-served areas.

Definition and scale of “pharmacy deserts”

  • Several note the study’s definition (≥10 miles from nearest pharmacy) and that only ~4–5% of the US population lives in such areas, despite 46% of counties having at least one desert.
  • Some argue the “desert” framing is misleading in sparsely populated regions where 10–20 mile drives are normal, while others stress that distance still matters for poor, sick, or elderly people.

Role of pharmacists and prescription culture

  • Some see pharmacists as easily replaced by machines plus interaction-checking software; others emphasize their role in catching drug interactions, answering questions, and administering vaccines.
  • There is side discussion about high US prescription rates; some view them as excessive, others point to large mortality reductions from routine cardiovascular drugs.

Tesla drives into Wile E. Coyote fake road wall in camera vs. Lidar test

Cameras vs. Lidar (and Radar)

  • Many argue camera-only + neural nets are inherently insufficient for safe autonomy; lidar (and at least proximity radar) is seen as an obvious, relatively cheap extra safety layer.
  • Others counter that vision-only must be possible in principle since humans drive with vision, and hardware/ML will keep improving; saying “never” is called absurd.
  • Critics respond that humans have richer perception (stereo, motion cues, vestibular, tactile feedback, theory-of-mind) and vastly more capable “neural hardware,” so extra sensors are a practical necessity, especially for safety-critical edge cases.

Human vs Machine Performance

  • Several note that humans would likely slow in heavy rain/fog and in “weird” situations, whereas the Tesla in the video barrels through limited visibility.
  • Some think many humans might also hit a photorealistic fake-road wall; others insist driver-assist systems exist precisely to exceed human limitations in such scenarios.

Autopilot vs FSD and Marketing

  • A big subthread disputes that the video “tests FSD”: it used basic Autopilot/AEB, not the latest FSD on new hardware. Supporters say this is a misrepresentation; critics respond that emergency braking should work regardless of paid software tier.
  • There’s lengthy debate about the names “Autopilot” and “Full Self Driving”:
    • One side: terminology mirrors aviation/nautical autopilots that still require human oversight.
    • Other side: for typical drivers, “autopilot” and “full” self driving reasonably imply autonomous capability and reduce vigilance; this is seen as intentionally confusing marketing.

Fairness and Design of the Test

  • Some see the Wile E. Coyote wall and extreme conditions as contrived, optimized to showcase lidar and generate clicks.
  • Others say poor visibility and visually deceptive obstacles are exactly where redundant sensing should shine.
  • Dispute over whether Autopilot was manually disengaged before impact; later raw footage suggests it auto-disengaged shortly before the crash. Exact behavior remains contentious/unclear.
  • Several wish the test had included multiple production vehicles (with radar-based AEB or production lidar cars like Volvo/Polestar) for a more balanced comparison.

Safety Data and Real-World Crashes

  • Commenters cite Tesla failures with white tractor trailers and lawsuits/accident maps as evidence that vision-only has serious blind spots.
  • Others point to studies showing AEB in general cuts crashes significantly and claim Teslas are statistically safer, while acknowledging Tesla’s own safety reports are marketing and methodologically debatable.

Lidar Adoption and Future Directions

  • Lidar-equipped consumer cars are still rare and often ship with sensors inactive or in data-collection mode; most mainstream systems use camera + radar.
  • Some expect improved depth-from-vision models may eventually reach “human parity,” but many argue that until then, adding lidar/radar is the prudent engineering tradeoff.

Military grade sonic weapon is used against protesters in Serbia

What kind of weapon and how it felt

  • Commenters debate whether the device was:
    • A classic LRAD (high‑power acoustic device),
    • An Active Denial System (microwave “heat ray”),
    • Or a “vortex cannon” / vortex ring gun (focused pressure wave).
  • Eyewitness reports: sound like a large vehicle or aircraft rushing past; strong body vibration, fear and disorientation rather than just “loudness.”
  • Some note absence (so far) of public reports of permanent deafness, leading to speculation it might not be a standard LRAD siren tone.

Health impact and physics

  • LRADs can reach ~160 dB at close range; commenters stress this is easily in the range of instant, permanent hearing damage.
  • Even with earplugs, bone conduction can transmit enough energy to damage hearing.
  • Comparisons made to jet‑noise exposure on aircraft carriers, where conventional protection is inadequate.

Countermeasures

  • Hearing protection alone is seen as inadequate at such levels.
  • Proposed physical defenses:
    • Thick helmets and soft, dense materials around the head/neck,
    • Rigid shields or metal plates to reflect sound back,
    • Large foam/mattress barriers to absorb energy.
  • Active noise cancellation or “anti‑LRAD” emitters are judged impractical at these intensities: you’d need output as loud as the weapon and near‑perfect phase matching.
  • More extreme ideas: shooting or bombing the emitter; most agree this crosses into open warfare.

Legality, ethics, and precedent

  • Strong view that governments shouldn’t have a “make protesters go away” button, especially against silent, peaceful crowds.
  • Others note LRADs are already used in the US, Europe, Australia, and elsewhere—sometimes as loudspeakers, sometimes offensively against protests.
  • Tear gas and other “less lethal” tools are contrasted: they’re banned in war but widely used domestically, highlighting a gap between humanitarian law and policing.
  • Some argue LRADs are inherently maiming weapons; others counter they’re intended as non‑lethal but poorly studied.

Violence, resistance, and escalation

  • Large sub‑thread on whether violent resistance against such repression is justified or effective:
    • One side: once the state uses violent tools on you, “politics is over” and organized armed response is morally required.
    • The other: violence is always an extension of politics; armed escalation usually strengthens regimes, discredits movements, and ends only with political settlement.
  • Historical analogies invoked (Soviet repression, Maidan, Belarus, civil rights, colonial struggles) to argue both for and against violent uprising.
  • Tactical concern: heavy‑handed tools may radicalize people and push protests toward sabotage, guerrilla tactics, or civil war.

Responsibility of engineers and suppliers

  • Debate over moral culpability:
    • Some say blame lies primarily with those who deploy the weapons.
    • Others argue engineers and defense firms share responsibility when they knowingly design tools whose only purpose is to harm or control people.
  • Cynical takes: many work on such systems for “cool tech,” money, or career reasons, downplaying ethical questions.
  • Criticism of US and Western companies for exporting crowd‑control tech to semi‑authoritarian governments instead of restricting such sales.

Serbia-specific and geopolitical context

  • Several commenters clarify Serbia’s situation:
    • Protests are framed as anti‑corruption and connected to a deadly infrastructure collapse, not primarily about Russia.
    • The government is described as increasingly authoritarian and insulated by balancing ties with EU, US, Russia, China, and others.
  • Disagreement over labeling Serbia “Russian‑controlled”; some provide evidence of Serbian arms going to Ukraine and a more opportunistic foreign policy.
  • Scale noted: hundreds of thousands to over a million people protesting in a country of ~6–7 million is seen as a serious legitimacy crisis.

Technology, surveillance, and the future of protest

  • Broader anxiety that sonic weapons are part of a wider anti‑dissent toolkit: pervasive cameras, AI identification, drones, and targeted disinformation.
  • Fear that:
    • Attending protests could become career‑ or life‑ruining once automated identification and retaliation are cheap and routine.
    • Asymmetry grows between state capabilities and citizen tools, making mass protest less effective and authoritarian steps harder to reverse.
  • Some hold out hope in encryption, anonymity tools, and decentralized communication; others argue these are fragile, often compromised, and mainly help a technically savvy minority.

Zlib-rs is faster than C

Performance and Benchmarks

  • Many point out the Rust implementation is only slightly faster than zlib-ng and argue “as fast as” is more accurate, though still impressive given zlib-ng’s extensive optimization history.
  • Others emphasize that even a few percent near theoretical limits is meaningful, especially for ubiquitous libraries.
  • There is concern the comparison is incomplete: zlib-ng is already heavily hand‑tuned (including assembly), libdeflate and other C libraries may be faster, and compilation/CPU-feature configuration for zlib-ng is not fully specified.
  • Several commenters warn against over-interpreting microbenchmarks and stress that greenfield rewrites in any language often outperform mature code simply due to redesign.

Language vs Implementation

  • A recurring theme: this result is “implementation X faster than implementation Y,” not “Rust faster than C.”
  • Some argue it still “says something” about Rust if developers can more readily achieve high performance while also getting safety guarantees and better maintainability.
  • Others insist the performance gap largely reflects engineering effort and design choices, not inherent language speed.

Unsafe Rust and Safety Guarantees

  • The codebase uses a lot of unsafe, plus raw pointers, manual allocation, and SIMD intrinsics, leading some to say it “looks like C in Rust syntax” and is not representative of idiomatic safe Rust.
  • Defenders respond:
    • Unsafe Rust still benefits from Rust’s type system, borrow checker, and tooling (e.g., Miri, sanitizers); most of the program remains in safe Rust.
    • Unsafe blocks localize potential UB: you audit those areas (and their invariants) instead of the entire codebase.
    • Even within unsafe, using references and slices encodes invariants that do not exist in C.
  • Skeptics counter that large amounts of unsafe erode these benefits, that unsafe Rust is hard to get right, and that at scale you still rely heavily on tooling and discipline.

SIMD, Compilers, and Aliasing

  • Performance gains largely come from SIMD and careful layout; Rust uses LLVM like Clang, so backend optimizations are similar.
  • Rust’s default non-aliasing references and stronger semantics can enable better auto-vectorization than C’s baseline, unless C uses restrict and similar annotations correctly.
  • SIMD in Rust currently often requires unsafe intrinsics; there is ongoing work toward safe, portable SIMD APIs.

Broader Context

  • Some note that zlib itself is old and deliberately portable rather than fastest; modern alternatives like zstd or LZ4 can be both faster and better-compressing where protocols allow.
  • Overall sentiment: zlib-rs is a technically impressive proof that a mostly safe Rust implementation can match or slightly beat a heavily optimized C zlib, but it is not definitive evidence that “Rust the language is generically faster than C.”

‘Bloody Saturday’ at Voice of America and other U.S.-funded networks

Soft power, propaganda, and why it matters

  • Many see the VoA/USAID cuts as the U.S. deliberately dismantling decades of “soft power” that was cheap compared to military force and highly effective abroad.
  • Others question whether “soft power” is just a euphemism for propaganda and interference, asking why its loss is inherently bad.
  • Several define soft power as non‑coercive influence (aid, culture, language teaching, exchanges) that can prevent costlier military conflict.
  • There’s disagreement over VoA itself: some frame it as truth‑oriented journalism and language education hated by dictators; others call it Cold War propaganda with documented politicized episodes.

Neocolonialism, culture wars, and human rights

  • A major subthread debates whether “neocolonialism” (spreading democracy, capitalism, human rights) is necessary defensive “soft power” against China/Russia.
  • Critics argue U.S. “soft power” has morphed into aggressive cultural imposition, especially on social issues, alienating societies that might otherwise be aligned.
  • One contributor goes much further, explicitly advocating extreme, near‑genocidal “civilizing” campaigns in places like Afghanistan; others strongly push back as immoral, impractical, and historically ignorant.

Foreign policy, hypocrisy, and shifting coalitions

  • Several note an “inversion”: people who once opposed U.S. empire, coups, and outlets like VoA now defend them as bulwarks against the current administration.
  • Others argue liberals were never truly antiwar, just skeptical of badly justified wars; supporting Ukraine is framed by them as defensive, unlike Iraq.
  • There’s sharp criticism of U.S. policy toward Palestinians under both recent administrations, with some saying nothing meaningful has changed.
  • Some see the cuts as dismantling “neocon” tools; others view them as part of a broader slide toward more naked, hard‑power coercion.

Domestic politics, legality, and institutional erosion

  • Non‑Americans are struck by how easily large numbers of staff can be put on leave or fired; replies explain probationary status, “administrative leave,” and the tactic of flooding courts and norms so they can’t respond.
  • Several see this as part of a broader, intentional demolition of U.S. institutions, soft and hard power alike, enabled by congressional inaction and legal ambiguity.

Is VoA obsolete?

  • Some argue VoA is an outdated Cold War tool in a TikTok/Twitter era; others stress that in many “old world” contexts (e.g., restricted media environments, radio‑centric audiences) it still matters.

AI Is Making Developers Dumb

Enjoyment of Coding vs Tool-Driven “Building”

  • Several commenters distinguish between people who love writing code itself versus those who mainly care about getting products built.
  • Some say LLMs amplify their creativity: they design architecture and use AI as a “typing assistant” or to fill in stubs/boilerplate.
  • Others see AI codegen as removing the fun, likening coding to crafts like knitting or painting that they want to do by hand.
  • There’s pushback on the idea that “if you don’t enjoy writing code, the field isn’t for you”; economic realities mean many tolerate coding as a means to an end.

Code Quality, Maintainability, and Testing

  • Many report AI is decent at boilerplate and small chunks, weak at nontrivial design, refactoring, and C++/Python correctness.
  • Some like LLM-written unit tests; others say the tests are slow, tautological and mirror poor human suites, and that bugs in tests are high‑stakes too.
  • Multiple anecdotes: LLM output is subtly wrong, overly complex, or effectively a worse copy of existing libraries; reviewing/fixing it can be more painful than writing code directly.
  • Concern that “vibe coding” and LLM-heavy workflows will produce huge, unmaintainable codebases with few who really understand them.

Education and Learning Effects

  • Instructors observe students using LLMs stop asking questions, focus on syntax, and fail to grasp fundamentals; even strong students struggle to explain recent material.
  • A small study with business students suggests they can complete a data-science task via ChatGPT yet retain almost no understanding.
  • Comparisons to calculators: widely agreed they should be restricted early in learning; debate centers on whether and how to teach responsible LLM use rather than banning it.

Abstraction, Atrophy, and Historical Parallels

  • Some see AI as just another leaky abstraction layer (like high-level languages, GC, frameworks); others argue LLMs are qualitatively different because they’re nondeterministic and “hallucinate.”
  • Recurrent fear: over-reliance on LLMs atrophies problem‑solving and deep understanding, normalizes mediocrity, and may eventually justify replacing AI‑dependent devs with AI alone.
  • Others counter that externalizing rote skills (syntax, memorization) is fine, as long as humans still handle architecture, systems thinking, and reviewing.

Productivity, Workflow, and UX

  • Experiences vary: some say coding with AI is now dramatically faster; others feel “Copilot lag,” rage, and exhaustion from correcting repeated AI mistakes.
  • LLMs are praised for explaining unfamiliar codebases, generating repetitive code (e.g., SQL migrations, Pillow image compositing) and tests, and acting as an always‑available tutor.
  • Many advocate a “middle ground”: never commit AI code you can’t explain, use it for boilerplate and exploration, and keep sharpening low‑level and conceptual skills.