Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 430 of 541

PayPal Honey extension has again "featured" flag in Chrome web store

Chrome, Manifest V3, and Browser Control

  • Several comments tie Honey’s re-featured status to Google’s broader move away from Manifest V2 and toward limiting powerful ad-blockers, interpreting it as prioritizing ad/affiliate revenue over user control.
  • Some frame Chrome’s rise (and Google’s decision to build its own browser) as fundamentally about owning the data and ad surface, not just speed or fighting IE.
  • Others push back slightly, noting Chrome was initially much faster than Firefox and primarily a response to IE, though the ad-driven incentives are acknowledged.

How the Chrome Web Store “Featured” Badge Likely Returned

  • Multiple commenters explain that “Featured” is usually not paid placement but a nomination process: developers fill out a form; a team reviews listing quality and best-practices; approval takes a few weeks and can be re-applied for every six months.
  • Theory: Honey likely lost the badge after mass reporting during the scandal, then reapplied later and passed a fairly low-friction review, with reviewers either unaware of or indifferent to past controversy.
  • Contrast is drawn with Firefox, which removed Honey’s highlight quickly and appears more responsive.

Honey’s Alleged Misconduct and User Impact

  • Summarized accusations from prior investigations:
    • Hijacking or replacing others’ affiliate referrals at checkout.
    • Claiming to “find the best coupon” while letting merchants restrict which codes are shown, sometimes omitting better discounts or claiming no coupon exists.
  • Some see this as effectively malware-like “referral theft”; others argue it’s just a sleazy but predictable coupon/affiliate model and primarily harms creators, not users.
  • There is mention of ongoing or planned lawsuits; outcomes are still unclear.

Ratings, Availability, and Store Moderation

  • People are surprised Honey still has ~4.6 stars on Chrome while ratings cratered on Firefox.
  • Explanations proposed: median/Bayesian averaging, huge pre-scandal review base, weak fake-review moderation, and in-app “happy path” review prompting.
  • Some users report the extension is now unavailable in certain regions and speculate about geoblocking to dampen 1‑star spam; this remains unclear.

Influencers, Affiliate Links, and Trust

  • Honey’s success is attributed heavily to influencer promotion; most users don’t analyze business models and just follow trusted personalities or the easiest link.
  • Debate over whether users should deliberately avoid affiliate links versus using them to support creators when prices are equal.
  • Many note that Honey’s behavior directly undercuts influencers’ own referral income, which helped drive the backlash.

Why People Still Use Chrome / Alternatives

  • Some commenters are baffled that technically literate users still run Chrome, citing Manifest V3 and Google’s incentives.
  • Counterpoints:
    • Chrome’s sync (especially tab sync) is described as “worry-free” compared with Firefox’s spottier experience on Android.
    • Some keep Chrome strictly as a “work browser” without adblockers, using Firefox or Vivaldi for personal browsing.
    • Vivaldi is praised for configurability and good sync, with caveats (no bookmarklets, historically flaky sync; recently reworked).

Outrage Cycles and “Manufactured” Anger

  • Several comments zoom out to the meta-level: the Honey scandal is cited as an example of intense but very short-lived online outrage, especially on YouTube and social platforms.
  • Discussion centers on how algorithms amplify “outrage porn,” driving cortisol and engagement for 48–72 hours before attention shifts elsewhere.
  • There’s disagreement over whether the Honey backlash was “manufactured” or just organic swarm behavior around a real grievance.
  • Broader concerns are raised about how this pattern erodes thoughtful, sustained responses (e.g., legal action, regulatory pressure) in favor of dopamine/cortisol cycles.

Privacy and Extension Risk

  • Some commenters are uneasy that an extension monitoring all browsing activity for coupons could become a multi‑billion‑dollar acquisition at all.
  • Honey and similar tools are described as high-privilege trackers; people contrast that with the relatively greater perceived value of platforms like Google/Facebook that at least provide core communication utilities.
  • There’s a general sense that Chrome’s extension ecosystem has too little oversight given the power extensions wield, and suggestions that holding Google partially liable for abusive behavior could improve standards.

Falkon: A KDE Web Browser

What Falkon Is (and Isn’t)

  • Built on QtWebEngine, which itself wraps the Chromium engine; several people argue this makes it more of a “KDE skin over Chromium” than a distinct browser.
  • Others note the irony in the lineage: Chromium → from WebKit → from KHTML (originally a KDE engine).

Security & Update Cadence

  • Concern that Qt doesn’t update QtWebEngine frequently enough, possibly leaving Falkon with unpatched vulnerabilities.
  • Question raised whether QtWebEngine has explicit, timely security support; no clear answer in the thread.

KDE Integration & User Experience

  • Long‑time users praise Falkon’s tight KDE integration: native dialogs, widgets, themeing, taskbar media/download integration, and KDE Connect support.
  • Some say Firefox/Chromium already integrate reasonably via portals and KDE browser-integration, while others argue portals are being misused and may regress.
  • Complaints: smoother scrolling and adblocking are weaker than major browsers; extension API is under-documented; download manager and advanced features are questioned.
  • User-agent quirks: some Google services and even KDE’s own forum warn Falkon users to “upgrade” their browser.

Extensions & Web Standards

  • Lack of Chrome/Firefox extension support is a downside for some; others say built‑in adblock and userscripts cover many needs.
  • Commenters note WebExtensions is an open spec and could be implemented, but Falkon hasn’t done so.

Gecko vs Chromium & Embeddability

  • Desire expressed for a KDE-native Gecko browser, but embedding support was largely removed from desktop Gecko, forcing some projects to switch to WebKit.
  • Mobile GeckoView exists but is Android-focused; adapting it to desktop is described as possible but unclear.
  • Debate over whether dropping embedding was wise: one side says it saved engineering resources and enabled better performance; another says it cost Gecko mindshare in embedded/webview and Electron-like use cases.

Mozilla, Electron, and Strategy

  • Discussion of abandoned Gecko-based app runtimes (XULRunner, Positron) and missed opportunity to counter Electron.
  • Disagreement over Mozilla’s resource allocation: some defend diversification (VPN, Pocket) to reduce dependence on search deals; others criticize executive pay, layoffs, and lack of focus on the browser.

KDE & Desktop History

  • Nostalgia for Konqueror as unified browser+file manager; mixed views on whether splitting into Dolphin + separate browsers was “enshittification” or necessary evolution.
  • Broader lament about Linux desktop fragmentation (toolkits, distros, portals), making “native” integration and app distribution hard.

Browser Monoculture & Alternatives

  • Several participants feel trapped between Chromium dominance and dissatisfaction with Firefox management, though many report Firefox itself is technically solid and improving.
  • Some note Firefox is held to higher “purity” standards while Chromium’s behavior is more readily tolerated.

Other Topics

  • Mention of Angelfish, another Qt/KDE browser, perhaps easier to contribute to.
  • One user wants a browser with minimal security restrictions (no CORS, Node.js in-page); others point out severe security and even legal risks.
  • Brief thread on container/tab isolation: Firefox’s containers are praised but criticized for weak sync and awkward UI, with suggestions that this is an area where alternative browsers could differentiate.

Feds Link Cyberheist to 2022 LastPass Hacks

Local vs. cloud password storage

  • Many commenters prefer offline tools (KeePass/KeePassXC, GPG‑encrypted files) with keyfiles and redundant encrypted backups. Data integrity is handled via replication, error‑correcting backups, and “worst‑case” manual account recovery.
  • Syncing across devices is the main pain point: Syncthing, shared folders, and USB “sneakernet” are common, but iOS’s hostility to generic file access makes cross‑platform sync hard for families.
  • Some deliberately avoid putting main vaults on phones, accepting occasional inconvenience for a smaller attack surface.

LastPass breach and loss of trust

  • Strong consensus that LastPass’s handling of the 2022 incidents was poor: delayed disclosure (Christmas week), minimal admission of risk, and current statements that there is “no conclusive evidence” of linkage are viewed as evasive.
  • Technically, LastPass relied solely on master‑password‑derived keys with weak PBKDF2 iteration counts (sometimes as low as 1 or 5,000), and left metadata (including URLs, sometimes 2FA seeds) unencrypted, letting attackers prioritize high‑value crypto targets.
  • Several people moved away after earlier breaches and express surprise any company still standardizes on LastPass. Class‑action litigation is noted.

Comparing password manager designs

  • 1Password is praised for its additional high‑entropy “secret key” combined with the master password, making offline cracking far harder, and for generally strong UX. Concern: if all devices and the printed “emergency kit” are lost, recovery is impossible by design.
  • Bitwarden/Vaultwarden are valued for being fully open source and self‑hostable; some find the UX and filling behavior rougher than 1Password but acceptable, especially given transparency and control.
  • Other tools mentioned: KeePass variants, Password Store (pass), Strongbox (KeePass DBs on Apple platforms), Proton Pass, and new “local‑first” or self‑hosted secret managers. Debate over Bitwarden’s limited offline‑edit support.

Centralization, SPoF, and usability

  • Many see cloud vaults as an obvious high‑value target and single point of failure; others argue well‑implemented E2EE (e.g., 1Password’s model) makes cloud storage acceptable and far safer than password reuse.
  • Skeptics advocate “secret heuristics” (site‑dependent algorithms) instead of vaults; critics respond that patterns can be inferred from breaches, site rules differ, and manual entry is error‑prone—essentially “rolling your own crypto.”

Crypto, account recovery, and long‑term concerns

  • Discussion stresses that crypto systems aren’t “hacked”; instead, poor key management (like storing seed phrases in LastPass) leads to irreversible loss because transfers can’t be undone.
  • Several note that modern security practices (2FA, unrecoverable accounts) are unforgiving for non‑experts, unlike real‑world institutions that always have some recovery path.
  • There is side debate on digital longevity: some trust open formats (GPG, CSV, PDF/ZIP/JPEG) over proprietary vaults for data that may need to be opened decades later.

NASA to launch space observatory that will map 450M galaxies

Units, Size, and Public Perception

  • Early comments riff on “suitcase-sized satellites” and U.S. customary units, contrasting NASA’s inch/foot descriptions with metric equivalents.
  • Some lament the persistence of imperial units in U.S. industry and education, arguing metric would make reasoning about size and calculation easier.

Mission Design: Orbit, Cooling, and Survey Strategy

  • Clarifications from technical sources: SPHEREx is a Medium-class Explorer in low Earth, sun-synchronous polar orbit along the terminator, not geosynchronous.
  • It is passively cooled via nested “V-groove” radiators; no expendable cryogen is used, unlike many far‑IR missions.
  • The sky is mapped four times over two years; multiple passes are mainly for noise reduction and completeness, not to track galaxy evolution on 6‑month timescales.
  • Discussion notes that galaxy evolution happens over millions of years; time-domain astronomy for fast phenomena is a separate subfield with different survey cadences.

Science Goals and Limits

  • Extragalactic science: improve redshift measurements, classify galaxies, and probe signatures of cosmic inflation using large‑scale structure and “intensity mapping.”
  • Galactic science: map ice and dust in the Milky Way; SPHEREx’s coarse angular resolution means it cannot resolve exoplanets, only large‑scale structures.
  • Some curiosity about detecting water near planets; others note SPHEREx is optimized for large-scale mapping, not targeted exoplanet spectroscopy.

Budget, Politics, and Program Risk

  • Multiple commenters worry that operations fall under NASA’s science budget, which is threatened by proposed cuts; some mention possible impoundment even after congressional appropriation.
  • Others stress that current figures are proposals, not final, and that Congress ultimately controls funding.
  • Creation of the U.S. Space Force is debated: some see it as long in the making with one administration merely finalizing it; others question its relevance to NASA science funding.

Launch Vehicle, Competition, and Trust

  • SPHEREx launches on a Falcon 9; some speculate this might help spare it from cuts, though launch revenue is one‑off and doesn’t protect long‑term operations.
  • Extended back‑and‑forth on Falcon 9 pricing, margins, and competitors (Japanese H3, India, China). One side argues H3 could undercut F9; the other calls that unrealistic given low production rates and SpaceX’s ability to drop prices.
  • Reliability stats and market share are cited to argue SpaceX dominates commercial launches; critics raise concerns about political risk, perceived arbitrariness in cancellations, and “zero‑trust” toward leadership.

Redundancy and Historical Practice

  • A question about backup spacecraft leads to a historical note: NASA used to fly twin probes (e.g., Voyager 1/2), but as launch reliability increased, it became more valuable to fund different missions than duplicate ones.
  • Operations and ground support are highlighted as a major cost; duplicating hardware is no longer the default.

Emotional and Philosophical Reactions

  • Many express awe at mapping 450M galaxies and at current “golden age” astronomy: digital detectors, huge ground telescopes, space telescopes, gravitational waves, VLBI, neutrinos, and upcoming LISA.
  • Others dwell on the psychological impact: feeling tiny in a vast universe, hoping humanity survives long enough to benefit from such knowledge, and fearing political or dystopian futures that might derail progress.
  • The thread closes with NASA links confirming signal acquisition and that SPHEREx has begun its science mission, prompting celebratory comments.

Rust inadequate for text compression codecs?

Rust vs C/C++ for codecs

  • Several commenters with codec/image decompressor experience felt Rust brings little benefit in the tight inner loops; C or C++ often ends up simpler for “gritty fast algorithmic code.”
  • Others argue Rust can match C/C++ performance for codecs if you use idiomatic patterns (iterators, careful unsafe) and that it shines for the API surface and caller safety.
  • Niche, performance‑critical codecs might be better served by specialized languages like Wuffs, or by hand‑written assembly irrespective of host language.

Assembly, compilers, and language tooling

  • Rust’s inline assembly is seen as more ergonomic and consistent than C/C++’s, largely because Rust defines it in the language and mostly has one compiler.
  • Debate over whether multiple front‑ends (e.g., gccrs) are a benefit (portability, ecosystem diversity) or a liability (dialects, user‑hostility).
  • Some fear Rust adopting C++‑style fragmentation if multiple front‑ends diverge; others note that a precise spec, not ISO standardization, is what really prevents dialects.

Dispatch, bounds checks, and performance

  • One commenter claims the article mischaracterizes C++’s static vs dynamic dispatch; CRTP plus virtuals can mix them, but others argue this is fragile and overly clever.
  • The measured ~13% slowdown from bounds‑checked access (.at() vs []) makes some readers wary of using checked indexing in hot paths.
  • Others say across an application the cost is usually single‑digit percent and worth it for safety, except in very tight parsers/codec loops.
  • Rust is said to be good at eliding bounds checks when using iterators; pointer‑style code can defeat these optimizations.

Panics, unwrap/expect, and error handling

  • Many push back on the article’s framing that panics “hide” in unwrap/expect; in Rust these functions are explicitly defined to panic and are treated as assertions.
  • Strong disagreement over whether libraries should “never abort”:
    • One camp: libraries must never terminate the process; all failures, including invariant violations, should be exposed as recoverable errors.
    • Opposing camp: for broken internal invariants, aborting/panicking is appropriate; trying to continue with corrupted state risks worse bugs and vulnerabilities.
  • Long subthread compares C libraries (often UB or rare “INTERNAL” error codes) with Rust’s preference for panics, framing it as trading RCE‑class issues for DoS.

“No‑panic Rust” and library design

  • A linked “no‑panic Rust” approach proposes never panicking in libraries, turning all failures into Result and avoiding process termination.
  • Critics question scalability, ergonomics, and user experience: APIs would become cluttered with error channels for situations that “should never happen,” and real code examples are requested.
  • General consensus: panics are appropriate for impossible states/bugs; for normal, expected errors libraries should use Result.

Meta‑assessments of the article

  • Several readers think the author is relatively inexperienced with Rust idioms (e.g., treatment of unwrap, bounds‑check elision, low‑level patterns).
  • Others nonetheless find the exploration of static vs dynamic protections and the assembly‑level tuning of codecs interesting and in the tradition of classic systems‑programming articles.

How did places like Bell Labs know how to ask the right questions? (2023)

Bell Labs’ success: luck, timing, and monopoly structure

  • Several commenters argue that Bell Labs’ achievements are partly “right place, right time”: post‑WWII tech boom, major advances in physics and computing, massive telecom build‑out, and urgent wartime/Cold War needs.
  • Others push back on pure luck, noting Bell hired thousands of researchers and systematically channeled them into important, practical problems.
  • The AT&T regulated‑monopoly model is highlighted: guaranteed returns on costs allegedly made innovation the only sustainable way to increase profits, though some argue cost‑plus rates also incentivize waste.

Funding, taxes, and incentives

  • One camp claims high corporate tax rates once pushed firms toward tax‑deductible investments like R&D, training, and factories; today, money flows to buybacks and financial engineering instead.
  • Another camp counters that “golden years” innovation often coincided with lower corporate tax rates, so the simple “high tax → more research” story is questionable.
  • Government labs are seen as valuable but often hampered by bureaucracy, committees, and publish‑or‑perish dynamics, in contrast to clearer missions in industrial labs.

Culture, labor markets, and problem selection

  • Bell Labs is portrayed as engineering‑driven: scientists created new theory but always tied to real communication problems, with a strong norm of never refusing requests for help from applied teams.
  • Long-term employment, low churn, loose cost accounting, and strong internal support (shops, technicians) are cited as crucial; modern “switch jobs or stagnate” norms and heavy grant bureaucracy are viewed as harmful.
  • Commenters emphasize that Bell and PARC also pursued many dead ends; their strength was portfolio management and a “fast reality filter,” not perfect foresight.

Comparisons to modern labs and AI

  • Google, Microsoft Research, FAIR, DeepMind, etc. are seen by some as partial modern analogs: monopoly backing and long horizons.
  • Others doubt today’s AI and ad‑funded labs will be remembered like Bell or PARC, citing narrower engineering impact, scaling‑obsessed research, and tighter managerial control.

Meta: the article itself

  • Multiple readers say the piece usefully corrects myths about total researcher freedom.
  • Many also complain about its verbose, heavily qualified writing style, finding it hard to read compared to clear technical prose.

AI tools are spotting errors in research papers

Perceived Benefits and Intended Use

  • Many see AI as a useful screening layer: flagging possible math, statistical, formatting, or consistency issues so humans can review more efficiently.
  • Authors already use LLMs privately to “act as a harsh reviewer” before submission, catching clarity problems, missing citations, and occasional real mistakes.
  • Compared to spellcheck or static analyzers, AI is viewed as a natural extension: helpful if it finds even a few nontrivial issues and remains advisory.

False Positives, Workload, and Moral Hazard

  • A central worry is high false-positive rates (numbers like 30–35% are cited from the article), especially when most “errors” are trivial typos or harmless inconsistencies.
  • Commenters fear an “AI Gish gallop”: mass, low-cost accusations that shift the burden of proof onto authors, reviewers, and editors who already lack time and incentives.
  • Experiences from AI vulnerability reports and code-review bots show that noisy tools quickly get ignored or resented, especially when they’re unaccountable.

Limits of Current AI Capabilities

  • LLMs are seen as good at pattern- and consistency-checking, poor at deep methodological critique or detecting fabricated data without raw data access.
  • Several note that the main problems in many fields (e.g., study design, p-hacking) are nuanced and qualitative, not easily caught by text-based models.
  • Concern that AI mostly enforces conformity with existing literature rather than enabling genuinely novel, heterodox ideas.

Fraud, Error, and Incentive Structures

  • Debate over how common fraud and questionable practices really are; some think rates are low, others point to p-hacking, paper mills, and retraction case studies.
  • Many argue tools won’t fix the core incentives: publish-or-perish culture, lack of rewards for replication, and weak consequences for misconduct.
  • There’s also an adversarial dynamic: fraudsters can use the same tools to harden their papers; defenders counter that static publications can later be reanalyzed by stronger AI.

Governance, Crypto, and Abuse Risks

  • Strong skepticism toward YesNoError’s crypto-based governance: token-holders steering which papers get attacked is seen as easily gameable and politicizable.
  • Concerns about public “shit lists” of flagged authors/institutions, witch-hunt dynamics, and AI becoming a de facto gatekeeper for what gets published.
  • Some frame this as part of a broader struggle over narrative control in science and media.

Overall Sentiment

  • Thread is split: cautious optimism for AI as a private, author- and reviewer-side aid with strong human oversight, and deep skepticism about noisy, public, or financially/ideologically driven deployments.

Europe's most wanted man plotted my murder and that of my colleague

Depicting War, Crime, and Fascism in Film

  • Long argument over Truffaut’s idea that “there are no anti‑war films.”
  • Some say any portrayal of war or violence, even brutal, inevitably contains heroism, sacrifice, or adventure that some viewers will latch onto and thus “glorifies” it.
  • Others argue films like Come and See, Grave of the Fireflies, Johnny Got His Gun, The Pianist, Schindler’s List, Threads and Born on the Fourth of July are genuinely anti‑war: they leave most viewers repulsed, not enticed.
  • Debate over Saving Private Ryan, Lord of War, Starship Troopers, Full Metal Jacket, Warhammer 40k, and games like Helldivers 2:
    • Intent vs reception diverge; satire or critique can be consumed as straight power fantasy.
    • Violence is inherently stimulating; some people will still be attracted regardless of message.
  • One commenter cites harrowing first‑person war accounts (Bosnia) to argue that even “realistic” war films still romanticize compared to the actual, dehumanizing tedium and horror.

Wirecard, Marsalek, and “Spy Movie” Framing

  • Several note Marsalek’s story reads like a Guy Ritchie or Bond script: Russian intelligence links, planned hits on journalists, covert escapes, fake plates and sunk boats.
  • Concern that a film risks glamorizing him; others note there are already Wirecard-inspired shows and docs.
  • Disagreement over calling him a “technological genius”; some say the article itself undercuts that label.
  • Clarification that Wirecard’s missing billions largely never existed, rather than being “siphoned off.”

German and Austrian Failures, Bellingcat, and Corruption

  • Strong criticism of German authorities for initially targeting FT reporters instead of Wirecard, seen as dysfunction, gullibility, or outright corruption.
  • Discussion of Germany’s high‑trust political culture, Russia policy (Nord Stream), and hesitancy to see Moscow as a threat.
  • Austria described as saturated with Russian spies and pro‑Kremlin politicians, including parties that allegedly assisted Marsalek’s escape.
  • Some skepticism about Bellingcat due to partial NED funding; others defend their track record and note their diversified funding.

Russia, Assassinations, and Despair

  • Poisoning and killing of Navalny and other defectors framed as deterrent “messages” to future opponents, not just practical eliminations.
  • Emphasis on Putin’s personal vindictiveness and the performative nature of public, deniable killings.
  • Deep emotional responses from people with Russian/Eastern European backgrounds:
    • Expressions of despair and even genocidal fantasies against Russia-as-state.
    • Countervoices urging support for Ukraine, patience with history, and hope for post‑Putin change.

European Security and Nuclear Deterrence

  • Some optimism that recent European moves (defense integration, relaxing German debt rules for rearmament, talk of extended nuclear umbrellas) show elites finally treating Russia seriously.
  • Speculation about future nuclear proliferation: Japan and South Korea seen as most technically ready; Germany, Poland, and others constrained by delivery systems, treaties, and political culture.

Coffee reduces risk of Type 2 Diabetes; okay to add cream, but not sweetener

Sugary drinks, coffee, and health

  • Many comments focus on how “drinking sugar” (soda, frappes, shakes, frozen coffees) is “really” bad, especially given extreme sugar loads (e.g., >150 g in a single drink).
  • Several distinguish liquid sugar from sugar in solid food, suggesting the body may handle them differently, though others note this is not rigorously demonstrated.
  • A few argue that even small additions (e.g., 1 tsp sugar in coffee) seem too minor to explain large diabetes risk without other lifestyle differences.

Public health, policy, and “sin taxes”

  • Some call sugary drinks “pancreatic terrorism” and question why there are anti-smoking PSAs but not anti-sugar ones.
  • One camp supports education and possibly sugar taxes, especially in single‑payer systems where societal costs are shared.
  • Another camp rejects government restrictions as “tyranny,” preferring personal responsibility and “your body, your choice.”
  • Counter-arguments stress externalities (healthcare costs, reduced workforce fitness, car-centric infrastructure driven by obesity).

Addiction, freedom, and culture

  • Multiple comments describe sugar and ultra-processed food as addictive, likening the situation to smoking before it was widely recognized as an addiction.
  • Some argue US culture idolizes the “freedom” to make self-destructive choices while neglecting those harmed by them.

Personal strategies and habits

  • Several people report deciding not to “drink calories” (no soda, juice, sweet coffee; often no alcohol), claiming good weight and glucose outcomes.
  • Others say they only add a bit of cream or fat (for taste or medication needs) but avoid sweeteners.

Coffee preparation, taste, and what counts as “coffee”

  • Debate over “real coffee” vs coffee-flavored desserts (Starbucks-style drinks); some see the latter as essentially soft drinks with caffeine.
  • Coffee purists advocate black, lightly roasted, carefully brewed coffee; others note some people will simply never like coffee without additions.
  • Side discussion: cultural differences in using cream/whipped cream vs milk in coffee across Europe and North America.

Study validity, association vs causation

  • Multiple comments stress the study is observational and only shows association, not proof that coffee or cream “reduces risk.”
  • Skeptics highlight confounders: people who avoid sweeteners may also exercise more, eat differently, or have different genetics.
  • Others defend the study’s authors and institutions, arguing that dismissing “most dietary studies” as poor is anti-scientific.

Proposed mechanisms and related physiology

  • Several note that people who add sugar or artificial sweeteners may have overall lifestyles that increase T2D risk; artificial sweeteners also weaken the apparent benefit.
  • There is discussion of T2D as highly heritable but still strongly influenced by chronic high sugar/simple carb intake and insulin resistance.
  • One commenter explains how chronic high insulin and unresponsive fat cells lead to T2D; recommendation: minimize sugar and large glucose spikes.
  • Some speculate the effect might be due to caffeine, metabolism, or appetite suppression, comparing to stimulants like meth or ADHD medications, but acknowledge unknowns and lack of data on diabetes outcomes in those groups.
  • Another thread addresses cafestol in unfiltered coffee (espresso, French press) potentially raising LDL cholesterol, with paper filters reducing it.

Salt, sugar, and “naturalness”

  • A reported medical-professor claim that sugar and salt are “man-made” and not evolutionarily normal is challenged; commenters point out natural sources and the need for salt, while agreeing excess processed sugar is likely harmful.

Overall skepticism and usefulness

  • Some argue that fine-grained findings (coffee vs tea, cream vs sugar) are of limited practical value when obesity and high-carb diets are already well-known major drivers of rising T2D rates.
  • Others find the incremental insight useful, especially the suggestion that sweeteners (including artificial) may largely erase coffee’s apparent protective association, whereas cream does not.

Moscow-based global news network has infected Western AI tools

Skepticism about the article and its framing

  • Several commenters argue this kind of influence campaign is as old as mass media; the only novelty is attaching “AI” and Russia–US framing.
  • Some see the piece itself as propaganda or a “psyop” meant to pre-emptively discredit any Russia-aligned viewpoints produced by LLMs.
  • Critics say the report makes “extraordinary claims” with thin documentation: vague about which narratives were tested, which models allegedly mirrored specific articles, and how they inferred training-data sources from overlapping language.
  • A few users tested example prompts from the article (e.g. Zelensky banning Truth Social) and got correct, non-propagandistic answers, fueling doubt.

Russian influence, AI grooming, and data poisoning

  • Many accept that actors with resources will try to “taint” models, analogizing to SEO, SEM, and “Google bombing.”
  • The notion of “LLM grooming” is viewed as both plausible and concerning: if pro-Russia narratives become common online, models will statistically reproduce them more.
  • Others note this is symmetrical: any side can flood the web; the real issue is human disinformation, not an “AI problem” per se.
  • Some point to networks of “Pravda” sites ranking well in search as classic garbage-in/garbage-out.

LLMs’ understanding, bias, and knowledge cutoffs

  • Example logs show ChatGPT confidently answering post–cutoff questions while insisting on an earlier cutoff, suggesting “cutoff dates” are part of a role rather than reliable introspection.
  • Debate over whether LLMs actually “understand” propaganda: they can describe Pravda as biased, but don’t track which weights came from which sources, so may not downweight them when answering.
  • Ambiguity over whether models are secretly using web search or just trained on later data.

Disinformation, propaganda, and truth

  • Some define disinformation as deliberate, weaponized lying to mislead, distinct from honest disagreement; others argue the term often just labels opposing views.
  • Long subthread on objective truth and history:
    • One side emphasizes empirical methods, multiple sources, and degrees of accuracy.
    • Another stresses how power, censorship, and propaganda (in both Russia and the US) shape what becomes “history.”

What LLMs are good for

  • Strong consensus that LLMs are poor for niche factual incidents (“Did Azov fighters burn an effigy of X?”) and easily steered by prompt framing.
  • Recommended uses: coding help, how-to questions, terminology explanations—things that are easy for the user to verify.

Microsoft is plotting a future without OpenAI

Model Swapping, Lock-in, and Risk

  • Several commenters argue that swapping LLM backends is technically easy due to simple, stable APIs – especially at cloud-provider scale.
  • Others counter that for production workflows, the true cost is revalidation, regression testing, and dealing with subtle behavior differences; swapping is “easy” only for ad‑hoc use or v1 prototypes.
  • For enterprises, model risk, compliance, and fine-tuning on proprietary data are seen as key differentiators, making “just swap it” less trivial in practice.

Commoditization, Moats, and Cloud Strategy

  • Strong consensus that frontier models are rapidly commoditizing; the durable moats lie in:
    • Hyperscale infra (Azure, AWS, CoreWeave)
    • Compute platforms (Nvidia/CUDA; debate over whether AMD can realistically catch up)
    • Integrated product distribution and ecosystems (Office, GitHub, etc.).
  • Brand and habit (like Coke or Google Search) are framed as real but possibly insufficient moats for a trillion‑dollar valuation.
  • Commenters see Microsoft aiming to be model-agnostic, using its own models where possible and treating OpenAI as one provider among many.

Microsoft–OpenAI Relationship & Corporate Culture

  • Many think both parties ultimately want independence: OpenAI to move “up” into apps, Microsoft to control its stack, costs, and roadmap.
  • OpenAI is frequently described as “toxic” (governance drama, broken “open” promise, AGI hype).
  • Microsoft is portrayed as a conservative, IBM‑like enterprise machine: great at distribution and contracts, weaker at clean consumer products and branding.
  • Historical pattern noted: Microsoft partners, learns, then builds or replaces (OS/2→NT, Sybase→SQL Server, Java→.NET, etc.), with some predicting the same arc for OpenAI.

AGI Hype, Definitions, and Timelines

  • Heavy skepticism toward “AGI is imminent and dangerous” messaging; many see it as marketing.
  • Definitions vary wildly: superhuman autonomous agent, human‑like learner, profit threshold, or simply “whatever computers can’t yet do.”
  • Key open problems highlighted: continual learning, agency, robust reasoning in the real world; comparisons to stalled self‑driving hype are frequent.
  • Others argue there’s no clear fundamental barrier and that remaining capabilities are falling steadily.

OpenAI Economics and Agent Pricing

  • The reported $2k–$20k/month “agent” tiers provoke strong backlash; many compare this unfavorably to hiring actual PhDs, developers, or knowledge workers.
  • Several note that such prices implicitly admit current low‑cost tiers are nowhere near economic viability at scale.
  • Commenters say they’ll believe “PhD‑level” claims when OpenAI meaningfully replaces its own staff or entrusts key internal functions to agents.

Alternatives: DeepSeek, xAI, Claude, and Apple

  • Many users report switching or supplementing with Claude, DeepSeek, Grok, or local models; perception is that frontier capabilities are now “close enough” that no one is far ahead.
  • Some suggest Microsoft could just lean more on DeepSeek or others; others say that would be strategically or geopolitically risky.
  • One thread raises a “poisoned model” threat: an open‑weights model could hide backdoored behaviors triggered by rare prompts, and this would be hard to detect.
  • Apple’s approach (default to in‑house models, escalate to OpenAI when needed) is praised as strategically sound even if execution is currently weak.

AI Hype Cycle and Practical Usefulness

  • Opinions split on current LLM usefulness: some call them “fun toys” that can’t do reliable unsupervised work; others cite substantial daily productivity gains (coding, formatting, drafting).
  • Several believe we’ve passed peak OpenAI hype and entered a phase where models are good enough for years of horizontal application-building without needing big leaps.
  • There’s discussion that AGI, if ever realized, might not be a sellable, tame product at all – and that current LLMs lack the agency required.

Organizational Incentives and “Resume-Driven Development”

  • Long subthread on internal politics: people pushing in‑house tech (like Microsoft AI) for promotion, scope, and prestige rather than product quality.
  • “Resume‑driven development” and ladder‑climbing are described as widespread in big tech; incentives (scope/impact over maintenance quality) are blamed more than individuals.
  • Some speculate this dynamic partially explains the energy behind building Microsoft’s own models instead of remaining dependent on a third party.

Microsoft’s Product and Branding Problems

  • Multiple comments slam Microsoft’s AI product story as confused: “Copilot” branding is opaque, names and SKUs change constantly, and many offerings feel rushed or half‑baked.
  • This is framed as a continuation of longstanding issues: over‑complex SKU strategies, renames, and inconsistent consumer execution despite strong enterprise lock‑in.
  • Concern exists that in its rush to inject “Copilot” everywhere, Microsoft risks degrading otherwise solid products like Office.

Age Verification Laws: A Backdoor to Surveillance

Motives and Political Context

  • Several comments claim “protect the children” bills are industry-driven, funded by age‑verification vendors seeking mandates and contracts.
  • Others tie them to broader surveillance agendas (e.g., using porn as a pretext for Project‑2025‑style ID‑based tracking).
  • Some see the bills as a textbook example of a real slippery slope: from porn to skin cream, diet pills, dating apps, then potentially to political or historical content.

Where Enforcement Belongs: Browser/Client vs Website/Server

  • One camp argues age controls should live on the user’s device/browser: parents set a password‑protected mode; sites simply label content (“this might contain X”).
  • Critics push back: who defines the taxonomy; how to categorize mixed sites (Reddit, social media); how to handle foreign sites that mislabel.
  • Others suggest mandatory headers like RTA/censor.txt and child-mode browsers that block unlabeled sites, but opponents note this quickly turns into government‑mandated browser code and is trivially bypassed by alternative builds, proxies, or VPNs.

Practicality and Circumvention

  • Many argue determined kids will always find workarounds: open‑source browsers, VPNs, proxies, sibling/parent devices, or shared credentials.
  • Some even frame this “arms race” as accidentally educational (kids learn to hack/compile), but others stress the real goal is not perfection, just making access harder.

Privacy and Technical Schemes

  • Strong skepticism toward uploading government IDs or face scans to porn, skincare, or pill sites; seen as creating durable, abusable logs of intimate behavior.
  • Thread discusses digital IDs and crypto schemes: government eIDs, Apple Wallet IDs, zero‑knowledge proofs, verifiable credentials, Privacy Pass, blind signatures.
  • Pushback: any system with reliable enforcement requires some authority that can link credentials back to people; that authority (often the state) then has surveillance power. Truly unlinkable tokens are easily shareable and thus ineffective.
  • Some note existing non‑intrusive bills only require checkboxes or in‑person ID at delivery, but others see those as “first wedge” steps to justify later, stricter tech.

Analogy to the Physical World and Role of Parents

  • Repeated comparisons to bars, porn shops, and rating systems: in meatspace, explicit content is segregated and ID‑gated.
  • Counter‑argument: online we do have per‑device policy (browsers, OS), so we can gate kids without universal identity systems.
  • Large faction: the Internet should remain uncensored for adults; protection should come from parenting, device‑level controls, and education, not centralized surveillance.
  • Others insist the harms of modern porn/social media to minors are real, and doing “nothing” is politically untenable, but they also don’t want to sacrifice privacy.

Alternative Policy Ideas

  • Regulate risky products (supplements, harsh skincare) via safety and labeling (FDA‑style) instead of age gates.
  • Require age‑restricted online sales to use payment‑address checks or credit cards, shifting detection to parents’ statements.
  • Implement standard content‑rating headers and improved child accounts on OSs/browsers; let parents opt into stricter filters.
  • Some point out today’s pervasive tracking (analytics, data brokers) already creates a “backdoor to surveillance,” making age‑verification databases especially dangerous add‑ons.

Athena spacecraft declared dead after toppling over on moon

Lander design and stability

  • Many commenters focus on the “tall, thin” geometry of Intuitive Machines’ landers, arguing they are inherently tip‑prone versus squat, wide designs like Firefly’s Blue Ghost or the Apollo LM.
  • Several note that Falcon 9 fairing size does not force this aspect ratio; IM’s landers could have been shorter and wider and still fit.
  • Some propose designing for a horizontal (crab/truck-like) landing orientation or even assuming the craft will tip and making it functional on its side.

Comparison of commercial moon landers

  • Both IM landers (Odysseus and Athena) ended up tipped, while Firefly’s Blue Ghost recently landed upright, prompting criticism of IM’s design choices and questions about NASA awarding them further contracts.
  • Others push back: this is early‑stage commercial lunar work on small budgets; multiple failures are expected, and “space is hard” is repeatedly emphasized.

Causes of failure and role of sensors

  • For IM‑1, a laser rangefinder was reportedly disabled from the ground; on IM‑2 it was on but “didn’t work very well,” suggesting recurring sensor/landing‑system issues rather than pure geometry alone.
  • Some worry that reliance on laser ranging in a dusty, plume‑filled lunar environment may be fragile.

Guidance accuracy and media error

  • Thread clarifies The Guardian misreported a 250‑mile targeting error; IM’s own release says 250 meters, which many regard as very good for a first commercial precision landing.
  • Historical context: Apollo and 1960s–70s probes often missed by hundreds of meters to kilometers; recent “precision landing” missions have pushed that down to tens of meters.

Funding, risk, and NASA contracting

  • Repeated contrasts between Apollo’s enormous budget and risk tolerance versus today’s comparatively tiny commercial contracts; some argue we shouldn’t expect Apollo‑level performance.
  • Others counter that two near‑identical tip‑overs justify demanding a clear root‑cause analysis and design changes before further NASA work.
  • Side discussion touches on US budget priorities, austerity, and billionaire tax burdens, but remains tangential.

Alternative concepts and self-righting ideas

  • Numerous armchair designs are floated: airbags/“hamster balls” (as used on early Mars rovers), inflatable “donut” bases, deployable outriggers, wheeled or spherical bodies, or “designing for tipping” plus self‑righting mechanisms.
  • Some point out these add mass, complexity, and new failure modes; given that legged lunar landers have worked many times historically, improving current designs may be simpler.

Power sources and mission longevity

  • One subthread argues for wider use of RTGs (Pu‑238 or Am‑241) to avoid solar‑orientation failures and extend life, while others note RTGs’ mass, safety, regulatory overhead, and thermal‑management challenges, especially on the Moon.

Historical comparisons and automation

  • Commenters recall Luna, Surveyor, Apollo landings and note that human piloting helped avoid hazards; automated landing capability exists but has “gone rusty” after decades of underuse.
  • Kerbal Space Program is repeatedly cited as a crude but educational illustration of why tall, narrow landers tend to fall over.

Language and media tangents

  • Brief digression analyzes phrase order like “robotic private spacecraft” vs “private robotic spacecraft,” using English adjective‑ordering rules as an example of how odd the article’s wording sounds to some readers.

What if America turned off Britain's weapons?

Sovereignty, De Gaulle, and Strategic Autonomy

  • Multiple commenters see the UK’s reliance on US-controlled systems as proof that it lacks full sovereignty; de Gaulle’s push for French strategic autonomy is praised as vindicated.
  • Sovereignty is framed as a spectrum: even mid-sized powers can’t stand alone against true superpowers, but deep dependence still reduces autonomy.
  • Some argue the dependence was a deliberate Cold War tradeoff that governments won’t admit plainly to their publics.

Trident, “Off Switches,” and Technical Leverage

  • Debate over whether the US could or would “turn off” Britain’s Trident capability:
    • One side: backdoors/withholding parts are risky (could be found, exploited), and the effect would be gradual, not instant; UK could likely improvise over time.
    • Others quote officials saying that, over a few years without US support, the deterrent would face “great difficulty” and “scrambling” for spares.
  • Similar concerns raised about F-35s: mission software, mission data files, and update channels are heavily US-controlled, creating effective veto power.
  • Broader worry that any complex system needing code, maintenance, or parts from the US is a control vector.

GPS and Other Infrastructure Dependencies

  • Some see GPS degradation or selective availability as a more realistic lever than nukes, especially for aviation and shipping.
  • Others note SA was removed from newer satellites and was never a geo-specific “off switch,” plus the US also needs precise GPS and would hurt itself.

Nuclear Deterrence and Proliferation

  • Arguments that fewer nuclear powers might be good run into counterexamples: Ukraine’s disarmament is cited as a cautionary tale; Russia’s nuclear shield is seen as enabling aggression.
  • Several predict more states (including European ones) will pursue their own nukes if US guarantees are unreliable, weakening non‑proliferation.

European Military Capability and Industry

  • Split views on whether Europe “has no choice” but dependence vs. could rearm quickly:
    • Skeptics point to decades of underinvestment, fragile economies, and lost industrial baselines (e.g., German nukes, subs).
    • Optimists say money can be printed; what matters is industrial capacity and political will, and European industry (e.g., Germany) is still formidable if mobilized.
  • Discussion that US spending is largely about global power projection; a defensive European posture doesn’t need carriers and global bases.

US Kill Switch Scenarios and Cyber Vulnerability

  • Some imagine extreme scenarios where US tech vendors push “poisoned updates,” cut cloud services, or disrupt communications to cripple Europe.
  • Others see this as exaggerated but acknowledge it highlights digital and supply-chain dependence, not just weapons platforms.

Trump, MAGA, and the Western Alliance

  • Many comments express that Trump’s current actions (e.g., on Ukraine) already constitute “strategic betrayals,” destroying trust built over 80 years.
  • Europeans in the thread perceive US public indifference or hostility toward Europe; some Americans counter that many are “in mourning” but constrained by repression, economic precarity, and protest risks.
  • One camp argues US institutions and the “deep state/military‑industrial complex” will limit any president’s ability to upend superpower strategy; Trump is seen as a short‑term aberration.
  • Others respond that domestic authoritarian drift directly affects foreign policy and that assuming Trump is strictly time‑limited is unsafe.

Economic and Defense-Industrial Consequences

  • Several note that if the US ever visibly “turns off” allied systems, it would devastate trust in US defense exports and tank contractors’ stock prices.
  • Some already see US defense stocks hit by budget moves, with European defense firms rising on expectations of rearmament and indigenization.
  • There’s skepticism that Washington would risk killing its own defense export market; others say recent US sanctions/financial actions (like SWIFT) show willingness to incur big collateral damage.

Shifting European Security Architecture

  • Growing chorus that Europe must “break free” of US defense procurement: develop independent nukes/delivery systems or integrate more with French capabilities.
  • Suggestions include:
    • Typhoon successors and other fighter programs without US components.
    • SAAB reconsidering US engines for Gripen.
    • Closer UK–France or broader EU cooperation on nuclear and conventional systems.
  • Some foresee France, with nukes, energy exports, and a UN veto, becoming the de facto security core of Europe.

Long-Term Outlook and Risk

  • Several commenters stress that relying on “waiting out” one US administration is reckless; once alliances and norms are broken, they are hard to restore.
  • Consensus that more nukes and more fragmented security guarantees raise existential risks, but disagreement on whether this is now inevitable or still avoidable.

Introducing command And commandfor In HTML

Standards, browsers, and process

  • Initial concern that this might be a Chrome‑only/proprietary feature; others point out it’s in the WHATWG spec, has been discussed in OpenUI, and is already in Firefox Nightly and behind flags in Safari.
  • Some see this as “Chrome is the new IE” and worry about Google’s outsized influence; others note that HTML has long evolved via “ship first, spec later” across all browser vendors.
  • There’s mild frustration that popover-specific attributes were introduced recently and are now being “replaced,” raising concerns about web features being deprecated quickly despite the web’s long-term compatibility expectations.

What command / commandfor bring

  • Declarative wiring between a trigger element (typically a button) and a target element, replacing boilerplate JS like addEventListener + showPopover() + ARIA updates.
  • Viewed as a generalization of the popover attributes, and as a way to put more interaction “in HTML instead of JS,” similar in spirit to HTMX.
  • Supporters highlight:
    • Less boilerplate and fewer bugs for popovers, dialogs, and other basic UI.
    • Better baked-in accessibility (e.g., ARIA state handled by the platform).
    • Good fit for “islands”/mixed server-rendered + light JS architectures.
    • Easier interaction for screen readers and potential AI agents.

Limits, coexistence with JS, and complexity

  • Many doubt this removes the need for JS in any non-trivial UI; they see it more as a convenience or incremental enhancement than a full alternative.
  • Some worry HTML is becoming a pseudo-programming language, duplicating JS capabilities and echoing the history of “declarative systems that slowly turn imperative.”
  • Others argue it improves locality of behavior: you can inspect a button and immediately see what it will do.

Security, CSP, and XSS

  • A key motivation mentioned is CSP: onclick is effectively eval and often blocked, whereas command/commandfor are limited, non-arbitrary actions.
  • One commenter fears new XSS vectors via HTML injection; others counter that these attributes don’t execute arbitrary JS, though untrusted content should still be filtered.

Relation to HTMX and older UI patterns

  • Multiple people note the similarity to HTMX-style declarative interaction; some predict the platform will eventually converge on an HTMX-like model.
  • Others see echoes of NeXT/AppKit’s target–action, and more broadly of long-standing UI message/command patterns; opinions differ on whether the web is “catching up” or reinventing a worse version.

Broader concerns about web direction

  • Significant thread arguing the platform is over-engineered and constantly expanding, making independent browsers harder to build and maintain.
  • Counterpoint: richer built-ins (like this) can reduce JS bloat, improve accessibility, and move some complexity out of fragile app code into the browser, even if it adds surface area to HTML.

Ask HN: Do your eyes bug you even though your prescription is "correct"?

Ill-fitting or Incorrectly Made Glasses

  • Several people found their “correct” prescription felt wrong due to simple fit issues (nose pads, temple length, bent frames, wrong pupillary distance or lens center).
  • Others reported lenses that were technically the right numbers but manufactured or mounted poorly, causing blur, distortion, or headaches until remade.

Distance, Age, and Task-Specific Prescriptions

  • Many over ~40 described presbyopia: distance prescriptions fine, but near/intermediate work (screens, reading) causing strain.
  • Strong theme: separate “computer/occupational/intermediate” glasses focused at ~2–3 feet dramatically reduced headaches and fatigue.
  • Some use multiple pairs (distance, intermediate, reading); others rely on bifocals, trifocals, or progressives. Experiences are mixed:
    • Some say top-tier progressives are seamless.
    • Others find progressives unusable for screens, with narrow clear zones and constant head tilting, and prefer dedicated single-vision computer lenses.

Optometrists, Testing, and DIY Tuning

  • Many distrust basic retail optometry: repeated “20/20” prescriptions that still feel wrong, minimal discussion of working distance, and resistance to nonstandard requests (e.g., slight undercorrection).
  • Several people improved comfort by:
    • Going to ophthalmologists or academic / specialty centers.
    • Using trial lens sets or cheap online glasses to step through small variations (sphere, add, prism).
    • Intentionally undercorrecting distance or using weaker lenses for computer work.

Complex Vision Issues Beyond Simple Refraction

  • Reported conditions: astigmatism (sometimes very sensitive to axis), higher-order aberrations/halation, keratoconus, convergence issues/BVD, small vertical prisms, and eye-muscle imbalances.
  • These often required prisms, rigid or scleral contacts, or specialty fitting; standard glasses alone were inadequate.
  • Some younger users already show early presbyopia or fluctuating prescriptions; causes are sometimes unclear.

Screens, Lighting, and Ergonomics

  • Contributors linked symptoms to:
    • Screen distance/height and posture (neck tension headaches).
    • Excessive brightness, PWM flicker (especially OLED/LED), and harsh white LEDs.
    • Long, uninterrupted screen sessions; 20‑20‑20–style breaks and looking far away help many.
  • Workarounds: larger or farther monitors, intermediate-distance setups, color/contrast tweaks, dark/light mode choice, and e‑ink for some use cases.

Dry Eye, General Health, and Other Factors

  • Dry eye from reduced blinking at screens is repeatedly cited; preservative-free drops, newer tear-film agents, and conscious blinking help some.
  • Dehydration, poor sleep, stress, blood pressure issues, and even environmental factors (e.g., radon, AC airflow) are mentioned as headache/eye-strain contributors.

Surgery and Advanced Corrections

  • Experiences with LASIK/PRK and implanted lenses are split:
    • Some describe life-changing clarity, minor night halos, and long-term satisfaction.
    • Others report complications or residual aberrations and are wary of operating on a “critical organ.”
  • Scleral and wavefront-guided lenses are praised where available but are costly and specialist-dependent.

The necessity of Nussbaum

Capabilities Approach and AI

  • One commenter connects Nussbaum’s “capabilities vs. forcing outcomes” distinction to AI safety, suggesting AI work often slips into paternalism instead of enabling constrained capabilities.
  • They wonder what a capabilities list for AI would look like and whether this might outperform current “alignment” framings; nobody in the thread actually develops such a list.

Capabilities, Rights, and Benefits

  • There is sustained debate over whether Nussbaum’s capabilities should be treated as rights or as benefits/policy goals.
  • Critics say calling capabilities “rights” is politically liberal and philosophically sloppy—confusing “things we want governments to provide” with pre-political entitlements.
  • Others stress that in practice, rights talk is about especially strong claims that guide and constrain policy and law.

Nature and Conflicts of Rights

  • Several comments argue rights are social constructs, enforced by people, with no metaphysical status; they function more like propaganda or “wish lists” than timeless truths.
  • Others defend moral/legal rights as one coherent way to articulate values, alongside virtues, duties, and the common good.
  • There is a recurring question whether rights inevitably conflict (e.g., freedom from harm vs. speech/guns vs. property) or whether a small core (life, liberty, property, etc.) can be made non-conflicting if properly specified.

Healthcare, Trials, and Positive Rights

  • One line of argument: a “right to healthcare” would logically entail coercing doctors, so it’s better seen as a benefit of rich states.
  • Counterexamples invoke the right to a fair trial: taken literally, it would seem to “force” judges and jurors, yet societies manage this through limited, non-absolute legal rights and civic duties.
  • Some argue universal healthcare is sound policy (not necessarily a right) due to randomness of health and productivity concerns; others maintain healthcare is outside the state’s core remit except to prevent harm to others.

State Power, Welfare, and Happiness

  • Minimal-state advocates say governments should only protect a narrow set of basic rights and stop there; anything more risks “eternal conflict.”
  • Opponents respond that all prosperous democracies have extensive welfare states and high reported well-being; they see this as empirical evidence against the minimal-state ideal.
  • There’s disagreement over how much weight to give self-reported happiness and whether it can justify expansive welfare.

Defining Basic and Universal Rights

  • One approach grounds rights in a baseline “no one deserves to suffer”; distribution of resources (food, healthcare) should minimize suffering when possible.
  • Another distinguishes universal rights (freedom from molestation/interference) from non-universal “wants” (healthcare, sex, suicide, etc.), while conceding edge cases blur this line and raise issues of consent and social burden.

Interpretations and Critiques of Nussbaum

  • Some see her capabilities list as strongly statist and essentially political, not “pure philosophy.”
  • Others emphasize that capabilities include things like property and choice, not simply free goods, and are about thresholds of opportunity rather than guaranteeing outcomes.
  • Her critique of certain postmodern theorists is praised as clear, normatively grounded, and a corrective to “directionless” subversive politics that, commenters say, leave capitalism untouched.

Emotion, Method, and Evolving Capabilities

  • One commenter worries that basing ethics on emotion risks justifying intrusive, even Orwellian, state interventions in the name of “flourishing.”
  • Another asks whether capabilities themselves must evolve as tools and social conditions change.
  • Nussbaum’s threshold idea is briefly likened to program analysis: reaching minimum capability levels is compared, by analogy, to fixed points in analysis frameworks.

Planes are having their GPS hacked. Could new clocks keep them safe?

Jamming vs. Spoofing and Misleading “Hacking” Framing

  • Commenters distinguish:
    • Jamming = overpowering GNSS signals with noise, causing loss of lock.
    • Spoofing = transmitting plausible but false GNSS signals so receivers report wrong but “high‑confidence” positions.
  • Several note “hacked” in the headline is misleading; the systems are being jammed/spoofed, not infiltrated.
  • Industry term for false signals is “spoofing”; different from simple jamming.

What Better Clocks Actually Help With

  • An accurate onboard atomic/optical clock does not fix jamming: if no signal is received, timing alone doesn’t give position.
  • Uses discussed:
    • Reduce required satellites from four to three and slightly improve time‑to‑first‑fix.
    • Detect spoofing by comparing GNSS‑derived time to an independent, stable local clock.
    • Help distinguish delayed/replayed signals from authentic ones.
  • Several point out chip‑scale and rubidium atomic clocks are already commercially available and accurate enough for typical flight durations; “the clock isn’t the hard part, reckoning is.”

Existing and Legacy Navigation Backups

  • Airliners still have inertial reference systems (laser ring gyros, accelerometers); GPS mainly corrects drift.
  • Ground‑based aids (ILS, VOR, DME, NDB) remain, but many VOR/ILS installations have been decommissioned in favor of GPS‑based RNAV/RNP approaches, reducing resilience.
  • In low visibility, loss of GNSS during an RNP approach often forces a go‑around or diversion, even if older aids might exist.
  • General aviation often relies on simpler systems or pilot dead reckoning; some small aircraft lack full INS.

Alternative and Emerging Navigation Technologies

  • Quantum inertial navigation (quantum gyros/accelerometers) is seen as the real promise: long‑duration dead‑reckoning with far less drift, potentially removing dependence on external signals.
  • Magnetic anomaly navigation (MagNav) uses detailed geomagnetic maps; fielded in military experiments and could become a high‑accuracy backup to GNSS.
  • CRPA (controlled‑reception pattern antennas) and phased arrays can reject signals from ground‑based jammers/spoofers; export controls have slowed adoption but may ease.
  • Galileo’s authenticated signals (OSNMA) and related schemes can validate navigation messages, but replay/meaconing attacks remain a concern; strong local clocks plus multi‑sensor fusion are viewed as necessary.

Scale of the Problem and Political Context

  • Multiple tools (gpsjam.org, airline data) show extensive jamming and spoofing around Russia, its exclaves, and active conflict zones; airports have temporarily lost GPS approaches or closed.
  • Some see Russia’s behavior as intentional probing with insufficient Western response; others note similar, smaller‑scale jamming by other states.
  • Overall sentiment: aviation can still fly without GNSS, but safety margins and capacity shrink, and over‑reliance plus dismantling of legacy aids has increased vulnerability.

Bring Back Shortwave

Technical reception & antennas

  • Many commenters say built‑in SW antennas are inadequate, especially indoors; an outdoor long‑wire clipped to the whip is the simplest effective upgrade.
  • Height helps mainly to avoid local obstructions, not for ionospheric reasons; altitude is often misunderstood.
  • Noise sources (LED bulbs, laptop PSUs, solar gear, powerline networking) can “blank out” reception; moving outside or killing noisy devices often helps more than bigger antennas.
  • Suggested antennas range from cheap loops (MLA30+, Youloop) to K9AY loops, Beverage and rhombic antennas, to large directional Yagis on towers for serious DX.
  • Some warn against random long wires near strong transmitters or high static environments (e.g., military bases, desert) because of risk of overloading or damage.

Shortwave, resilience & strategy

  • Several posts argue HF/shortwave, plus medium and long wave, remain vital when digital, cellular, or satellite infrastructure fails, especially in war or disaster.
  • Emphasis on low‑tech robustness, century‑deep engineering experience, and the difficulty of detecting receivers (advantage for number stations and covert comms).
  • Others highlight intergenerational “loss of knowledge” and poor understanding among modern engineers, citing attempts to remove AM from EVs and close AM/LW services.
  • There’s concern that relaxing EMI standards for EVs and switch‑mode electronics has already raised the HF noise floor dramatically, threatening band usability.

Content, nostalgia, and culture

  • Many reminisce about BBC World Service, Radio Australia, Radio Moscow/China propaganda, number stations, and childhood exposure to global events via SW.
  • Others report that in practice they now mostly hear religious broadcasters or Chinese state outlets; this limits appeal and can make prepper scenarios unintentionally comic.
  • Pirate stations (especially around 6.95 MHz) and North Sea/medium‑wave pirates are described as some of the most entertaining and eclectic remaining content.

Hobby ecosystem: ham, SDR, and activities

  • Listening requires no license; transmitting does. Ham exams are easier now (no Morse) and can be taken online, but some find question pools off‑putting.
  • Cheap SDR dongles and web‑SDR servers have sparked exploration of the spectrum (including ISS passes), and simple homebrew receivers are popular.
  • POTA/SOTA are cited as driving a mini‑revival of HF portable operation, with gamified logging and real emergency‑relevant skills (rapid setup in the field).
  • QSL cards and international mail from broadcasters remain a beloved part of the culture for some.

Policy, efficiency, and future

  • One side calls megawatt‑class shortwave sites inefficient and serving a “tiny” audience, arguing that locals mostly prefer FM or streaming; they see SW headed for extinction.
  • Others counter that a single HF transmitter can reach vast areas and unlimited receivers without subscriptions or infrastructure, making it “extremely efficient” for broadcast.
  • Debate over the article’s claim that SW is a single point of failure: critics point to jamming and easy transmitter targeting; supporters note options like multiple sites, frequency‑hopping, and the value of having SW as a complementary backup.
  • Some propose opening vacated AM/LF/MF/HF spectrum to low‑power or community hobby broadcasting, rather than letting it go dark or be lost to interference.

Zig's dot star syntax (value.*)

What value.* Means in Zig

  • Consensus that ptr.* is simply pointer dereference, analogous to *ptr in C.
  • Clarification that this applies regardless of whether memory is on the stack or heap; it’s general pointer dereferencing, not just “stack addresses”.
  • ptr.*.* is a double dereference.

Postfix vs Prefix Dereference

  • Supporters of p.* argue:
    • It preserves left‑to‑right reading, especially when mixed with field access and indexing.
    • It aligns with the idea that . already auto‑dereferences for field access; * is like a “field” meaning “the whole value”.
    • Postfix operators compose better with other postfix operations, reducing parentheses in pointer-heavy code.
  • Critics argue:
    • p.* is unintuitive and visually jarring to those used to *p.
    • There was no strong need to deviate from widely established *p / &p syntax.
    • Syntax looks like regex or pattern notation and may not obviously signal dereference.

Comparisons to Other Languages

  • Rust: discussion of foo.await vs await foo:
    • Pro‑suffix: better left‑to‑right flow and composition (foo.await.bar.await).
    • Anti‑suffix: more complex precedence, unclear at a glance that .await is a suspension point.
  • C:
    • C already has a postfix dereference via p[0], though it’s considered ugly.
    • Complaints about C’s “declaration follows use” pointer syntax and need for many parentheses.
    • Historical reasons for -> and lack of auto‑dereferencing with . are noted.
  • Pascal/Ada:
    • Pascal uses ^ as postfix dereference; Ada uses p.all, both seen as conceptually similar to Zig’s p.*.

Audience and Teaching Pointers

  • Some are surprised that many Zig users don’t know C or pointers; others point out most modern developers start with Python/JS and higher‑level stacks.
  • Debate over whether C should remain the canonical way to learn pointers versus teaching them first in Zig or Rust.
  • Several comments defend beginner‑oriented explanations and “discovering” low‑level concepts via Zig; others find the article too basic for HN or oddly avoids directly mapping to C.

Views on Zig’s Syntax Overall

  • Mixed feelings:
    • Some see Zig’s pointer and initialization syntax (.{ ... }) as cleaner and more consistent than C.
    • Others describe Zig syntax as “poor”, over‑punctuated, or different for its own sake, and express interest in C‑like alternatives (e.g., C3) or a “TypeScript for Zig”.