Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 447 of 542

Strategic Wealth Accumulation Under Transformative AI Expectations

Assumptions of the Paper

  • Many commenters reject the core setup: treating AI automation as zero-sum and assuming the “AI owner” captures essentially all of the previous wage stream (e.g., a $500 AI lawyer).
  • Critics argue competition would drive prices down; historically, tech cuts costs for consumers rather than letting providers keep full surplus.
  • Defenders respond that the paper is about expectations and interest rates: even if the exact future is wrong, modeling “what if investors expect labor → capital transfer” is still useful.

AI, Legal Work, and Pricing Power

  • Debate over whether clients will ever pay human-level rates for AI legal documents.
  • Some think oversupply of AI-augmented lawyers will crush prices; others think oligopolies or high switching costs could keep prices elevated.
  • Several lawyers’ perspectives: much legal value is in risk, accountability, creativity, and jurisdictional nuance; AI is already helpful in discovery and drafting but not yet trustworthy as a standalone.
  • Ethical concerns arise about feeding client data into cloud LLMs (confidentiality, malpractice).

Labor, Unions, and Globalization

  • Analogy between firms coordinating prices and unions coordinating wages; pushback that global competition and offshoring have historically weakened unions.
  • Some argue automation shifts work rather than eliminates it; legal services, for example, may simply become affordable to many who currently never hire lawyers.

Transformative AI, Inequality, and System Stability

  • One faction: if AI replaces most labor, wages and mass demand collapse, so extreme capital concentration is macroeconomically and politically unsustainable; likely outcomes are depression, revolution, or systemic reset.
  • Counter-faction: history shows long-lived unequal empires; modern surveillance, drones, and weaponized robots could entrench tiny elites; economy could tilt toward serving ultra-rich consumption and mega-projects.
  • Disagreement over “no moat”: some say AI will diffuse like open-source; others note data centers, fabs, and weapon systems look moat-like, akin to nuclear tech.

Who Captures AI Wealth?

  • Proposed beneficiaries: chip makers, model labs, application builders, end users, and “rentiers” (land/resources).
  • Some argue ultimate power lies with owners of scarce physical assets as automated production drives the marginal cost of many services toward zero.
  • Others claim the main gains go to whoever can best use AI to solve their own problems, not to model owners; countered by examples of cloud and GPU vendors already earning outsized returns.

Preparation Strategies and Attitudes

  • Reported strategies: building AI-centric companies, investing in chip and index funds, improving health, specializing in AI systems, or simply ignoring long-horizon AGI scenarios.
  • Meta-debate: whether believing in imminent AI displacement motivates useful adaptation or paralyzes people into premature career changes.

DigiKey's Tariff Resources

Impact on DigiKey, Mouser, and Non‑US Buyers

  • Semiconductors (including LEDs) now carry steep additional tariffs on China/HK origin, with some users facing ~50% effective increases.
  • Several commenters note DigiKey/Mouser ship almost everything from US warehouses, even to Europe/India/Canada, so US‑applied tariffs can indirectly affect foreign buyers unless special customs regimes are used.
  • Some report no tariffs when ordering into Europe/Switzerland, suggesting DigiKey uses bonded/transit warehouse arrangements there.
  • Others worry DigiKey can no longer reclaim the new flat 10% “China tax” via duty drawback, effectively turning it into an “export tax” on re‑exports and eroding their global competitiveness vs. non‑US distributors.

Alternatives and Sourcing Strategies

  • LCSC is frequently cited as a cheaper alternative for many parts (especially Chinese chips and passives), cutting BOM cost dramatically, but:
    • Shipping to the US is expensive and slow.
    • Buyers are still responsible for US tariffs and carrier processing fees.
  • European and non‑US options mentioned: Farnell, RS/Distrelec, TME, Arrow, JLCPCB for PCB/PCBA.
  • Some foresee a shift to non‑US suppliers if US distributors pass through the full tariff load.

Pricing, Inventory, and Warehousing

  • Multiple comments stress that distributors price based on future replacement cost and business risk, not what they paid for existing stock; tariffs can raise prices immediately even on pre‑tariff inventory.
  • Detailed discussion of bonded warehouses and duty drawback:
    • Classic model: pay duties on import, reclaim most for re‑exports.
    • New 10% China/HK duty is explicitly non‑drawbackable per DigiKey’s page, though some older semiconductor tariffs may still be.
    • Setting up bonded warehouses and doing own customs processing is non‑trivial and changes operations.

De Minimis, Carriers, and “Junk Fees”

  • Confusion around the status of the $800 de minimis exemption: recent orders show it temporarily still in effect, but people expect it to disappear.
  • When de minimis doesn’t apply, carriers (UPS, DHL, etc.) often:
    • Front duties to customs, then charge the recipient both tariffs and sizeable “processing/brokerage” fees.
    • UPS in particular is criticized for surprise fees; DHL seen as more transparent but still error‑prone on tariff classification.
  • Some Canadians and Europeans describe workarounds (self‑clearing at customs, preferring postal services) to avoid high brokerage charges.

Economic Effects and Fairness of Tariffs

  • Many frame tariffs as a hidden consumption tax on domestic citizens, generally regressive and raising prices broadly.
  • Tariffs may “work” in specific sectors: cited example of earlier washing‑machine tariffs that raised prices but led to new US plants and some jobs.
  • Skeptics argue:
    • US manufacturing cost gaps vs. China/India/Taiwan are so large that 10–25% tariffs are insufficient to restore industry.
    • Policy volatility and arbitrary executive action make long‑term capital investments too risky.
    • Large incumbents and oligopolies can pass costs to consumers and may even enjoy higher margins, while small businesses and hobbyists get squeezed.
  • Supporters counter that higher margins plus tariffs create space for new domestic entrants and could slowly reverse offshoring, albeit over many years.

Manufacturing, Labor, and Policy Incoherence

  • Re‑industrialization is seen as requiring not just tariffs but:
    • Massive, long‑term investment, ecosystems of suppliers (PCBs, passives, assembly), and skilled labor.
    • Stable policy and, paradoxically, easier high‑skill immigration (visas) to import know‑how—at odds with concurrent anti‑immigration rhetoric.
  • Several note the internal contradiction: one faction wants to onshore everything, another wants to exclude foreign workers; together this undermines the stated reshoring objective.

International Reactions and Trust in US Policy

  • Non‑US commenters (especially in Europe and Canada) describe:
    • Re‑evaluating dependence on US supply chains and considering closer ties with other regions, including China.
    • Viewing broad, unpredictable tariffs on allies (EU, Canada, Mexico) as strategically self‑defeating if the goal is to counter China.
  • Some see the US as rapidly burning “soft power,” making partners more inclined to hedge between US and China rather than align strongly with Washington.

Broader Political and Ideological Threads

  • Long digressions compare past “fiscally conservative” Republicans with current tariffs‑plus‑tax‑cut politics, with many lamenting the loss of predictable, anti‑tax conservatism.
  • Several participants argue that:
    • Tariff policy is driven more by short‑term politics, populism, and a “cult of wealth/power” than by coherent industrial strategy.
    • Replacing income taxes with tariff‑like consumption taxes is attractive to the wealthy and structurally regressive.

We are the builders

Purpose of the site and initial reactions

  • The site is read as an “alt‑USDS” effort to defend and explain US Digital Service–style reform against the newly created DOGE initiative.
  • Some see it as a needed counter‑narrative aimed at persuadable, non‑extreme Americans, not at DOGE itself.
  • Others dismiss the branding and logo as cringe or partisan, and question whether posting it to HN is just culture‑war fuel.

USDS vs DOGE: efficiency and methods

  • Multiple commenters with government/contracting experience praise USDS: small, technical teams, iterative delivery, user focus, and quiet partnership with agencies.
  • They describe traditional federal IT as stuck in hardware‑era processes (milestones, 18‑month deployments, fake “agile”), with USDS as a rare bright spot that lacked real power.
  • DOGE is widely characterized as “PE firm meets worst management consultancy”: mass firings, cancelled contracts and leases, little process analysis, then scrambling to rehire.
  • A minority argue that deleting processes and then “listening for pain” is a known way to untangle legacy systems, but critics reply that this is reckless where lives and critical infrastructure are involved.

Legality, constitutionality, and power

  • One side claims DOGE has been lawfully created inside USDS by presidential action and can do what it is doing.
  • Others insist DOGE has no independent legal authority, that canceling congressionally mandated programs (e.g., NEPA, aid, tax systems) is unconstitutional, and courts have already issued restraining orders in some cases.
  • There is broad concern about erosion of separation of powers and treating the presidency as a near‑monarchy.

Human impact and program cuts

  • Specific harms raised: disrupted nuclear safety work, bird‑flu response, scientific research, NIH‑style funding, veterans’ and seniors’ benefits, protections for minorities, and IRS Direct File.
  • Some worry that cuts will leave permanent voids or decay (e.g., public health, climate and weather data) rather than being “efficiency gains.”
  • A few commenters support the idea of periodically killing obsolete laws/programs but call DOGE’s execution “ham‑fisted” and driven by ideology (e.g., targeting DEI, trans, or “diversity”‑branded programs).

Musk’s role and conflicts of interest

  • Strong criticism of giving the world’s richest person de facto “root access” to the federal bureaucracy while his companies are heavily regulated by it.
  • Many see blatant conflicts of interest: deregulation that benefits his firms, hostility to specific agencies and social causes, and a pattern carried over from the Twitter acquisition (rapid purges, brand damage, later walk‑backs).
  • Some defenders argue that bureaucracy is so entrenched that only a disruptive outsider with huge personal power could break it.

Platforms, outreach, and security

  • Using Instagram draws fire from those who view big social platforms as part of the problem; others counter that mass‑reach platforms are necessary to find a broad audience.
  • Several suggest adding SecureDrop or similar for whistleblowing instead of relying on email or social media; there is also skepticism about trusting the site’s operators at all.

Meta: HN polarization and broader fears

  • Commenters note a visible drop in civility and rising “us vs. them” dynamics on HN around DOGE and US politics generally.
  • Some frame DOGE as part of a longer project to dismantle the “administrative state,” weaken checks and balances, and pave the way for a more polished, enduring form of authoritarian rule.
  • Others respond that government has become bloated and corrupt, that deficits are unsustainable, and that radical pruning is justified—even acknowledging some “acceptable losses.”
  • The thread ends with calls for more nuance: recognizing genuine bureaucratic problems while rejecting mass, ideologically driven dismantling of governance.

The Deep Research problem

Perceived usefulness & concrete use cases

  • Some users find Deep Research and similar tools nearly worthless in domains they know well (e.g., game dev, B2B sales modeling), calling results shallow, wrong, or spammy.
  • Others report strong practical value when:
    • Doing broad, annoying data collection (e.g., public salary comparisons across many municipalities).
    • Getting “good enough” qualitative overviews, structure, and first drafts to beat blank-page or analysis paralysis.
    • Using it as a “hazmat suit” for today’s SEO-poisoned web: it suffers from the same sources, but at least handles the clicking and skimming.

Accuracy, trust, and verification burden

  • Central tension: if you must verify every fact and number, does it really save time over doing your own research?
  • Users emphasize that LLMs:
    • Hallucinate, misquote, and even misread specific tables/PDFs.
    • Present partial or 60%-correct output as if it were 100% reliable.
  • For tabular or quantitative work, several commenters say they wouldn’t trust it at all; qualitative synthesis is seen as safer.

Comparison to humans, search, and “interns”

  • Supporters argue it’s still an upgrade over ad-driven, SEO-gamed web search and low-quality social media.
  • Many compare Deep Research to an unreliable intern: useful if you already know the domain and can critically review everything; dangerous if you don’t.
  • Debate over whether LLM “lies” are comparable to human error:
    • One side: humans misremember but don’t routinely invent entities the way LLMs do.
    • Other side: functionally, both produce wrong answers that must be checked.

Workflows, multi‑LLM strategies, and domain scoping

  • Several people describe elaborate multi-model workflows: run the same query across multiple LLMs, discard 60–75% “slop,” then have another model synthesize the remainder.
  • Others rely on tools that operate only over curated, user-provided sources to avoid SEO-driven junk.
  • Suggested mitigations: domain-specific profiles curated by experts; stronger source control; visible context and inline citations; explicit uncertainty ratings.

Marketing, terminology, and future trajectory

  • Strong criticism of branding this as “deep research” from an organization that positions itself as doing “research.”
  • Many accept that current systems are “intern level”: impressive but not trustworthy for high-stakes research, especially in academia or medicine.
  • Disagreement on future: some expect dramatic improvement akin to coding assistants; others argue structural limits (source quality, incentives, bias, SEO gaming) mean error-free “research” is unlikely.

20 years working on the same software product

IP, Power Asymmetry, and Legal Threats

  • The Sony TV-show mockup episode sparked discussion about how large media companies freely appropriate small developers’ work yet aggressively enforce their own IP.
  • Commenters note that even sending a serious legal letter is expensive; much of the weight comes from a lawyer’s credentials (e.g., “JD” after the name) rather than the letter’s content.
  • Several argue this asymmetry is systemic: copyright law and litigation capacity function as weapons favoring rich entities over individuals.

Algorithms and Problem Complexity

  • Readers ask whether the product still uses a genetic algorithm and if a globally optimal solver (MIP/IP) would be better.
  • The author confirms GA is still used, optimized for thousands of seats and real-world constraints (proximity, couples, alternating genders).
  • Others point out that most combinatorial optimization approaches risk local optima and that seating is often overconstrained anyway.

Business Model, Scale, and “Lifestyle Business”

  • Many are inspired by a long-lived, niche, non-VC product that reliably supports a family.
  • The licensing model: perpetual license per major version with discounted paid upgrades is widely praised as user-friendly and more trustworthy than pure subscriptions.
  • On scale: ~$300k ARR is seen as realistically reachable solo; $1M ARR is “hard but possible” in exceptional niches; $10M ARR as a solo founder is viewed as effectively unattainable.
  • Some dislike the term “lifestyle business,” others find it useful to distinguish profit-driven, owner-controlled companies from growth-at-all-costs startups.

Desktop Software, Electron, and UI Toolkits

  • Strong nostalgia for native desktop apps that work offline and don’t bundle entire browsers.
  • Sharp criticism of Electron as wasteful and symptomatic of “skill issues,” countered by arguments that cross-platform web tech is rational given SDK complexity, distribution friction, and hiring realities.
  • Several note that modern native UI APIs (Windows/Linux especially) are painful for animations, drag-and-drop, and styling, which nudges teams toward web stacks.
  • Frameworks like Qt and newer toolkits (e.g., Slint, SwiftUI) are cited as attempts to bridge this gap, but feature-complete, powerful desktop UI frameworks are seen as rare.

Trust, Longevity, and Single‑Founder Risk

  • Commenters contrast a 20-year, one-person product with frequently short-lived VC-funded services that vanish after acqui-hires or pivots.
  • Skeptics emphasize mortality and “key person” risk; defenders note that stable desktop software continues to run even if the business ends, whereas SaaS dies as soon as the server or billing stops.
  • Business-continuity planning and potential later sale of the business are suggested as mitigations.

Marketing, Piracy, and Practicalities

  • Some wonder why the product doesn’t appear higher in search results and suggest modest ad spend; the author explains long experience with PPC, noting that rising bid prices have eroded ROI.
  • A leaked license key incident leads to a tangent on piracy: small changes to make piracy harder can still significantly affect sales, even for solo developers.

Niches, Underserved Markets, and Career Aspirations

  • Multiple commenters say this is their “dream career”: a small, focused product that deeply serves a niche without chasing unicorn-scale outcomes.
  • It’s noted that many such micro-ISVs stay solo intentionally (to avoid people-management and tech churn) and thus rarely hire.
  • There’s discussion that many developer demographics (e.g., “young men”) build for markets they understand, leaving other demographics—like older or less tech-savvy users—under-served and potentially rich in opportunities.

Yocto, RockPi and SBOMs: Building modern embedded Linux images

Perceived strengths of Yocto

  • Widely seen as powerful for building fully custom embedded distros, including SDKs, cross‑toolchains, and highly tailored images (e.g. scientific instruments, Qt setups, Swift/Flutter images).
  • Good support for cross‑compilation and packaging everything into deployable SDK installers for other developers.
  • Supports transactional A/B image updates and integration with update frameworks (Mender, RAUC, swupdate, etc.).
  • Strong documentation and a large ecosystem of BSP/meta layers; when SoC vendors or community do good Yocto layers, life is easier.

Learning curve & developer experience

  • Many describe the learning curve as “pure brutality”: opaque errors, complex layer/recipe/meta concepts, and a mix of Python, BitBake, and shell.
  • Out‑of‑the‑box configurations often “just work”, but small deviations or non‑standard build systems can require deep debugging.
  • Error messages from BitBake/Yocto builds are considered very noisy; finding the real compiler error in thousands of lines is painful.
  • Some find the docs good for “what is possible” but insufficient for “how exactly to do it”, often falling back to reading recipes or using bitbake -e.

Yocto vs Buildroot (and other systems)

  • Buildroot is repeatedly praised as simpler, faster to grasp, and good for smaller/less complex projects or bring‑up.
  • Yocto is preferred by some for long‑term maintainability, parallel builds, dependency tracking between packages, and richer tooling.
  • Critiques of Yocto: feels like an organically grown “ball of mud”; dependency modeling in BitBake is said to be incomplete, sometimes requiring full rebuilds after config changes.
  • Buildroot criticisms: historically weaker dependency tracking, slower rebuilds; mitigations include per‑package build directories and ccache.
  • Other contenders mentioned: Nix, Bazel/Buck, Gentoo (for native builds), LFS for fundamentals, niche tools like e2factory, and specialized projects like SkiffOS or makrocosm.

Setup, project structure, and helpers

  • Common pain: managing multiple layer repos, commits, and bblayers.conf/local.conf. Many teams script this or use git submodules/monorepos.
  • Tools like kas, emerging bitbake-setup, and smaller helpers (e.g. yb) aim to standardize and simplify environment setup.

SBOMs and supply chain

  • Yocto’s SBOM generation is appreciated for compliance, but criticized as low fidelity: manifests often include components not present in the final binaries, and don’t reflect patches well.
  • Industry tools (e.g. binary scanners) also misidentify versions and miss Yocto‑applied CVE fixes; commenters say higher‑quality, aligned SBOM/BCA tooling is still 1–3 years away.

Updates and deployment models

  • Strong preference from experienced practitioners for immutable full‑image updates (A/B partitions, rollback) over on‑device package updates (apt, deb, etc.), especially for large IoT fleets.
  • Yocto‑based solutions often use RAUC, swupdate (sometimes with Suricatta/WFX), or commercial stacks (Mender, Torizon, Balena, Ubuntu Core).
  • For Raspberry Pis and small fleets, some suggest sticking with distro tools (Debian/RPi OS, pi‑gen) plus external update systems, or container‑centric approaches (Balena, bootc, OSTree‑based distros).

Embedded Linux vs “just run Debian/containers”

  • Counter‑argument to “just use a normal distro”: embedded boards lack BIOS, have highly specific SoCs/boot chains, and often need vendor or BSP‑specific kernels and bootloaders that mainline distros don’t support.
  • Vendors frequently don’t upstream fully or quickly; Yocto/Buildroot remain the practical way to ship products on niche or low‑volume hardware.
  • Some foresee eventual convergence between embedded image builders and container tooling, but acknowledge that today they operate at different layers.

General sentiment

  • Strong split: some love Yocto and even fear losing it as a job skill; others see it as overcomplicated legacy that should be replaced.
  • Shared recognition: when it finally works, it’s extremely satisfying—but getting there can be slow, fragile, and mentally expensive.

Suckless.org: software that sucks less

Political controversy and community culture

  • A substantial part of the thread debates alleged far‑right / neo‑Nazi associations around the Suckless community: torchlit hikes, logo designs overlapping with far‑right imagery, use of terms like “cultural Marxism,” a machine named “Wolfsschanze,” and a revisionist WWII email.
  • One side sees these as consistent dog whistles, argues that Germans/Austrians know the context, and concludes they “wouldn’t touch the project.”
  • Others see the evidence as weak or limited to a few individuals, emphasize traditional non‑political torch walks, or argue that one or two fringe contributors shouldn’t define the whole ecosystem.
  • There’s a broader ethical debate: some refuse to use software tied to ideologies that target them; others insist on separating “art from artist” and focus solely on technical merit.
  • Disagreement also appears over whether communities must expel problematic members vs. “ignore, don’t feed trolls,” and over “woke/identity politics” vs. meritocracy.

Minimalism, configuration, and usability

  • Fans praise dwm/dmenu/st for stability, tiny code, and hackability: editing a few thousand lines of C once, then not touching it for years, is seen as the ultimate “sucks less.”
  • Critics argue minimalism often fails under real‑world workloads, that recompiling for every config change is performative complexity, and that mainstream desktops (GNOME, etc.) better handle random real‑life tasks.
  • There’s back‑and‑forth on whether complexity is “needless” or intrinsic to reality, and whether Suckless’ aggressive attitude (“elitist,” no novice support) is a feature or off‑putting.

Static vs dynamic linking (inspired by Stali)

  • The Stali FAQ leads some commenters to embrace static linking for small in‑house tools, avoiding distro dependency hell and version skew.
  • Others highlight downsides: missed “free” security fixes and bugfixes, brittle static binaries over time, and the value of package managers and shared libraries.
  • Long sub‑thread covers RPATH/$ORIGIN, Nix/Guix, AppImage, Windows’ “DLL next to exe” model, and when static vs dynamic linking is appropriate.

Tools, alternatives, and ecosystem

  • Many mention non‑Suckless tools that embody similar values: zathura, mupdf, Sioyek, SumatraPDF, Okular, AwesomeWM, dwl, Niri, foot, kitty, xterm, and others.
  • Side discussions cover Wayland’s adoption, single‑thread vs multi‑thread designs, and Suckless’ C coding style guide, which some see as arbitrary or inconsistent.

NASA's James Webb Space Telescope faces potential 20% budget cut

Budget cuts and political motives

  • Several comments frame the cuts as ideological, aimed at shrinking or crippling parts of the federal government rather than saving money.
  • Some argue the “savings” are largely fake and will be outweighed by spending on border security and tax cuts for the wealthy.
  • There is pessimism that courts or Congress will effectively challenge executive actions that halt already‑appropriated spending.
  • A few see this as part of a broader pattern of democratic backsliding and institutional collapse, not just a technocratic budget decision.

Value of JWST and arguments against cutting

  • Many emphasize JWST as exactly the sort of high‑risk, high‑payoff science project only governments do, comparing it favorably to more routine launch systems.
  • Commenters argue that canceling or mothballing JWST now makes no sense: development costs are sunk, operations costs are relatively modest, and the telescope is producing transformational science and public inspiration (e.g., IMAX films).
  • Some express anger and despair that something built over decades and just reaching full stride could be sacrificed.

Privatization, SpaceX, and conflicts of interest

  • Multiple threads debate whether the broader goal is to privatize large portions of NASA: not selling NASA outright, but turning it into a pass‑through for contracts to favored firms.
  • SpaceX is central to the discussion. Some see Mars rhetoric as sincere but intertwined with a drive to funnel taxpayer money into Musk‑controlled ventures; others think Mars talk is mostly hype or recruiting/PR.
  • There is concern about conflicts of interest, e.g., ISS deorbit contracts and the possibility of dismantling other programs to fund Mars‑centric ambitions.

SLS, industrial base, and ICBMs

  • SLS is widely criticized as inefficient “pork,” but some defend it as a way to maintain solid‑rocket industrial capacity relevant to ICBMs.
  • Others dispute meaningful overlap between SLS and missile programs, calling SLS SRB work a separate, low‑volume niche.
  • Starship vs. SLS capabilities and milestones are debated, including nitpicking about what counts as “orbit.”

NASA efficiency and staffing

  • A few commenters with project experience claim NASA (or NASA‑related work) is overstaffed, with people “standing around” post‑development; they argue a 20% cut might not harm operations.
  • Others counter that slashing budgets tends to reduce services, not waste, and that the real solution is tighter accountability, not across‑the‑board cuts.

Operational impact on JWST

  • Questions are raised about how long JWST can safely run with reduced staffing and funding.
  • One comment notes it uses ~2.7% of its fuel per year for station‑keeping, implying ongoing, active operations are required and that lost observing time cannot be recovered.

Richard Feynman's blackboard at the time of his death (1988)

Interpretation of the Blackboard Mottoes

  • “Know how to solve every problem that has been solved” is read by some as aspirational practice: repeatedly solving known problems (at least in one’s domain), not literally knowing all solutions.
  • Others emphasize the word “how”: you don’t need every solution memorized if you understand the methods well enough to re‑derive them.
  • A minority reads the phrase as hubristic or even “profoundly unwise,” especially juxtaposed with his death.
  • “What I cannot create, I do not understand” is taken as a credo about deep understanding, though several note that one can perform or “operate” skills (like riding a bike) without fully understanding or being able to explain them.

Compression of Knowledge and Education

  • Multiple comments connect the mottoes to Feynman’s belief that settled physics should be compressible into undergraduate courses.
  • There’s debate over whether centuries of progress can really be compacted: some say modern physics already does this via general principles; others argue many topics remain uncontracted and discovery stories are lost.
  • Some propose that advanced classes should focus on unresolved problems, preparing students for research rather than rote learning.

Popular Legacy vs Real Person

  • A long subthread discusses a critical video about the “sham legacy” of Feynman: the claim is that the public image is dominated by colorful stories rather than his physics.
  • Many defend his scientific stature (Nobel, QED, diagrams, pedagogy) and argue the video critiques the mythmaking, not his work.
  • Others agree the “character” version of Feynman—always the clever trickster—has overshadowed the actual person and contributions.

Authorship, Anecdotes, and Editing

  • Several point out that the famous books were compiled and edited from lectures and stories by collaborators, not written by him in the strict sense.
  • Debate centers on whether this undermines their authenticity or just reflects common ghostwriting practice.
  • Stories in the popular memoir are widely believed to be embellished; some note later editions were censored or softened, especially around sexism and specific accusations.

Ethics, Misogyny, and Harm

  • Commenters split on how damning his behavior was: some see him as a misogynist and “jerk,” citing bar stories, life drawing of students, and documented domestic violence.
  • Others argue the notorious anecdotes are framed as mistakes he later rejected, or as era‑typical misbehavior, and that criticisms conflate him with his mythologized persona.
  • There is concern about “Feynman bros” adopting his worst attitudes as a model.

Quantum Hall Effect and Limits of Expertise

  • The presence of “quantum Hall effect” on his “to learn” list impresses many: evidence that even top physicists die with major topics still on their to‑do lists.
  • Comments highlight how undergraduates now see streamlined versions of such work, whereas original understanding was harder‑won.

Teaching, Understanding, and Creation

  • Several derive corollaries: “what I cannot teach, I do not understand,” and link this to the idea that clear explanation reveals real understanding.
  • Others push back: teaching is its own skill; many experts cannot teach beginners well despite deep understanding.
  • The gap between tacit skill and explicit explanation (bike riding, language, dancing) is invoked to nuance Feynman’s slogan.

Broader Reflections (AI, Hero‑Worship, Mortality)

  • Some tie the mottoes to modern LLMs: tools can “spit out” answers, but without human understanding there’s little real value.
  • There’s meta‑discussion about hero‑worship of scientists, generational iconoclasm, and the discomfort of reassessing revered figures.
  • The blackboard itself is seen as poignant: a snapshot of unfinished learning and the brevity of a life, even one as accomplished as Feynman’s.

Some critical issues with the SWE-bench dataset

Benchmark Leakage and Reliability

  • Discussion centers on the claim that ~33% of SWE-Bench “successes” are actually cases where the solution is stated or heavily hinted in the issue/comments, inflating pass rates (e.g., 12% → ~4%).
  • Many see this as confirming that public benchmarks are being gamed or at least unintentionally measuring “training set lookup” rather than genuine problem solving.
  • Others push back:
    • The official SWE-Bench authors say the hints_text field is not used for leaderboard runs, so some leakage claims may depend on non-standard usage.
    • Some example “bad” evaluations in the new paper look wrong: AI patches appear functionally equivalent to human ones, or differences are purely stylistic.

Real-World Coding vs Benchmark Claims

  • Many commenters say the reduced pass rates match their lived experience: models are decent helpers but poor autonomous coders on non-trivial, unique codebases.
  • LLMs are seen as strong on: boilerplate, training loops, CRUD/front-end, small tasks, and working with popular stacks.
  • They perform poorly on: niche/novel problems, complex refactors, integration into large legacy systems, and tasks where no online pattern exists.

Agentic Coders vs Autocomplete Tools

  • Strong preference expressed for “AI Intellisense” (e.g., Copilot-style inline completion) over fully agentic tools (Cursor, Devin-like systems).
  • Reason: tight feedback loop and minimal prompting vs agents that wander off generating large, error-prone diffs.
  • Several claim 50–80% of their typed code is AI-completed in certain domains; others report <10% useful output, highlighting variability by domain, skill, and workflow.

Designing Better Benchmarks

  • Suggestions:
    • Periodic, versioned, post-training datasets from fresh GitHub issues, with strong tests.
    • Private / team-specific eval suites, more like interview question sets, manually judged.
  • Concerns raised about volunteer labor, data being absorbed into training corpora, and vendor cheating if benchmarks are public.

Critiques of the Paper Itself

  • Some commenters argue the new paper mischaracterizes SWE-Bench (e.g., claiming hints_text is used) and mislabels correct AI patches as incorrect.
  • A few conclude the paper’s own errors are severe enough that its conclusions should be treated cautiously, even though the general problem of benchmark contamination is acknowledged as real.

Broader Reflections

  • Multiple references to Goodhart’s Law: once benchmarks become marketing targets, they stop being reliable measures.
  • Widespread skepticism toward headline claims like “PhD-level reasoning,” given mediocre performance on everyday coding and reasoning tasks.

Why Ruby on Rails still matters

Rails, CRUD, and Application Shape

  • Many describe Rails as naturally favoring “1 model = 1 concept = 1 REST resource” and CRUD-style flows (list → form → updated list), which match a huge share of real-world back-office and line-of-business apps.
  • Others note real UIs almost always mix multiple models per screen, which strains strict REST and pushes complexity to the frontend.
  • Rails’ responders: you’re not forced into 1:1; you can build composite controllers, multi-model forms, dashboards, and partial updates, especially with Turbo/Hotwire and nested forms.

API Design and GraphQL Debates

  • Pain points with REST in rich UIs: overfetching, many small requests, ad‑hoc query parameters, or view-specific RPC endpoints. No approach feels clearly “right” at scale.
  • Some see GraphQL as a clean view–model boundary; others argue it’s complex to harden, easy to abuse (expensive queries, broad data access), and ends up devolving into whitelisted, REST-like calls anyway.
  • Several argue it’s fine for the UI to make many REST calls, especially with HTTP/2 and caching, and that APIs should be designed around use cases, not tables.

Rails vs Next.js and the JS Ecosystem

  • Next.js is praised as React’s “Rails-like”: conventions, routing, SSR/CSR, good for highly interactive products.
  • Critics counter that it’s not “batteries included”: no built-in ORM, jobs, mailers, attachments, or auth/authorization; those must be assembled from many libraries.
  • In contrast, Rails is viewed as a full-stack, opinionated monolith that remains extremely productive for 0→1 apps and complex CRUD-heavy systems, with Hotwire covering a large slice of SPA-style interactivity.

Other Frameworks: Django, Phoenix, Elixir, Rust, Go

  • Many say everything argued for Rails applies similarly to Django; some Rubyists find Django “behind” Rails; others prefer Python’s broader ecosystem and typing.
  • Phoenix LiveView is repeatedly praised as a stateful, reactive alternative that inspired Hotwire/Turbo; Elixir is seen as attractive for concurrency and scaling but has a smaller ecosystem and a bigger conceptual jump.
  • There’s curiosity about Rails‑like frameworks in Rust/Go; current options feel more like low-level libraries or microservice tools than integrated “Rails for X”.

Typing, AI Tools, and Rails’ “Age”

  • The article’s claim that Rails struggles with LLM streaming and parallelism is disputed; several report streaming LLM chat UIs and concurrent IO working fine with Rails + Hotwire.
  • Lack of strong typing is seen by some as a drawback for AI-assisted coding and refactoring; others report LLMs perform very well in Rails codebases because conventions and structure compensate for missing types.
  • Broader thread: static types help with refactoring and correctness, but LLMs are reducing the autocomplete advantage of typed languages.

Why Rails Still Matters (and Critiques)

  • Pro-Rails comments emphasize: convention over configuration, batteries-included stack, mature ecosystem, and the fact that most business software is “just” CRUD plus a few special features (“spreadsheets on the internet”).
  • Critics cite dynamic typing, metaprogramming, and large monoliths as long-term maintenance risks, and argue many successful companies eventually outgrow Rails—though others point out major firms still run large Rails codebases.
  • There’s meta-discussion about Rails’ image: some quietly ship with it; others feel compelled to periodically assert it’s “not dead” amid hype around Next.js and AI.

Bybit loses $1.5B in hack

How the “cold wallet” was compromised

  • Commenters dispute whether the hacked wallet was truly “cold”: it was a Gnosis Safe multisig smart‑contract wallet used by the exchange, not an air‑gapped hardware vault.
  • The CEO’s description suggests all multisig signers’ machines were compromised and shown a spoofed Safe UI (“masked”) that looked like a normal internal transfer.
  • Instead of a transfer, they apparently signed a contract upgrade that handed control of the Safe to the attacker, who then drained the ETH.
  • Hardware wallets likely did “blind signing” of opaque EVM data, so signers couldn’t verify what they were really authorizing.

Security architecture & operational failures

  • Many see no “protocol bug,” only human/OPSEC failure: signers “clicked through” without understanding the transaction.
  • Criticisms:
    • Too much value in a single wallet.
    • “Cold” wallets that are regularly used and reachable via normal workflows are effectively “warm.”
    • No extra controls for billion‑dollar movements (e.g., multiple tiers, airlock wallets, different signer sets, time delays).
  • Others note this type of attack (UI manipulation + blind signing) has been seen before and is a systemic weakness of EVM tooling.

“Code is law”, reversibility, and ethics

  • Some argue this is exactly what decentralized finance permits: whoever controls the key “owns” the assets; the system itself doesn’t distinguish theft.
  • Others push back, noting prior chain interventions (Bitcoin overflow rollback, Ethereum DAO fork) as evidence that “code is law” is selectively applied when losses are big enough.
  • Ideas floated: protocol‑level safeguards for known exchange cold wallets, multi‑stage/escrow‑like transactions, or on‑chain bureaucracy (delays, voting) for large moves—critics say this just recreates banks.

Tainted coins, law, and liquidation

  • Debate over whether stolen coins can be sold cleanly:
    • Some expect exchanges to blacklist addresses and say large‑scale off‑ramping will be hard.
    • Others point out mixers, bridges, and decentralized exchanges, and note the hacker has already started liquidating staked ETH.
  • A subthread discusses UCC Article 12 in some U.S. states: a good‑faith purchaser who gains “control” of a digital asset may take it free of prior property claims, unlike a stolen car.

Exchanges, solvency, and trust

  • Commenters note Bybit’s huge trading volumes and the extreme profitability of crypto exchanges; some think covering $1.5B over time is plausible, possibly via loans.
  • Many distrust the CEO’s assurances and suggest withdrawing funds immediately; past “we were hacked” episodes (Mt Gox, FTX, others) are cited.
  • There’s recurring skepticism about custodial exchanges at all: if “professional” firms can’t keep keys safe, individuals are even less likely to do so, yet self‑custody is also unforgiving.

Broader crypto sentiment

  • Strong anti‑crypto voices frame the space as a casino and Ponzi‑like system that keeps “speedrunning” the worst parts of traditional finance without its protections.
  • Pro‑crypto commenters mostly emphasize censorship‑resistant cross‑border payments and usefulness in countries with capital controls or inflation, but acknowledge that security and user protection are severely lacking.

I found a backdoor into my bed

Remote SSH Backdoor & Security Concerns

  • Commenters are alarmed that each bed appears to have an authorized SSH key and a hardcoded endpoint, implying vendor engineers can log in and run arbitrary code on devices inside private homes.
  • This is framed as worse than normal app updates: access is real-time, likely per-device, and may lack audit trails, enabling quiet network probing or data exfiltration.
  • Others note that many embedded Linux products do similar things; this is painted as endemic to IoT rather than a one-off.

Cloud Dependence, Subscriptions, and Business Model

  • Many see the core problem as a “hardware-as-a-service” model: $2k+ hardware, $19/month for features, and failure when the internet is down.
  • Several argue all functionality could be done locally (on-device, via Bluetooth, or via a small bedside controller); cloud is used to justify subscriptions and data collection, not because it’s technically required.
  • Some defend value-based pricing: if people with severe sleep issues get major benefit, they may rationally accept the cost and lock-in.

Privacy, Data Collection, and CEO Behavior

  • Users highlight that the bed can infer when you’re in bed, with whom, and when the bed is empty at night; this is seen as especially sensitive data.
  • A CEO tweet about aggregate city sleep data is widely perceived as creepy and emblematic of cavalier attitudes toward customer data.
  • Concerns extend to insider abuse, ex-partners at the company, and eventual data breaches exposing intimate behavioral patterns.

User Experiences: Transformative vs Terrible

  • Some owners say temperature control profoundly improved their sleep (e.g., handling apnea, night sweats, different partner preferences) and are unwilling to give it up despite privacy and subscription issues.
  • Others report worse sleep due to noise, uncomfortable covers, or temperature swings, plus evidence of heavy data streaming.

DIY and Competing Products

  • Aquarium chillers plus water-based mattress covers are praised as a cheap, offline alternative; discussion focuses on whether thermoelectric units can move enough heat.
  • Alternative products (ChiliPad/Sleep.me, BedJet, simple cold/heat pads) are mentioned; they’re often less “slick” but don’t require always-online cloud control or subscriptions.
  • Some fantasize about aftermarket “de-IoT” control boards (ESP32/ESPHome) or standardized pinouts to replace vendor logic.

Debate Over Technical Claims

  • A minority challenges the article’s rigor: pointing out it didn’t verify an SSH server is actually running or reachable through NAT, and that the presence of keys/configs doesn’t prove blanket engineer access.
  • Others reply that even the potential for reverse shells or blanket keys in production firmware is serious and newsworthy.

Wider IoT & Regulatory Themes

  • Many generalize this to a pattern: cloud-only devices that brick when servers die, subscriptions retrofitted post-sale, and opaque software consumers can’t realistically audit.
  • Proposed mitigations: strict VLANs/guest networks for IoT, consumer labeling about offline functionality, and stronger privacy/security regulation (likened to medical devices or children’s products).
  • There’s disagreement over blame: “the market” and affluent buyers vs. executives and compliant engineers; most agree consumer choice alone won’t fix systemic incentives.

Sleep Problems and Low-Tech Aids

  • Several note that non-connected solutions (latex or spring mattresses, white noise machines, AC/airflow tweaks, hot-water bottles, lifestyle and medical interventions) often give big improvements without surveillance or lock-in.

Tesla recalls 380k vehicles in US over power steering assist issue

Meaning of “recall” and why it’s used

  • Many commenters initially question calling an OTA software fix a “recall.”
  • Others explain “recall” is a legal term of art in U.S. auto regulation: it means a safety-related defect or non-compliance with standards that the manufacturer must notify owners about and remedy, regardless of whether the fix is software, hardware, or even a manual insert.
  • Because NHTSA’s statutory power is to order “recalls,” the word is required; changing it would need legislation.

OTA vs physical fixes

  • Multiple posts stress that delivery method (OTA vs dealer visit) is irrelevant to whether it’s a recall; it’s about the seriousness and required documentation.
  • Some want clearer subcategories (“software recall,” “hardware recall,” “soft/hard recall”) so owners know if they must visit a service center. Others say the notice itself already specifies the remedy and adding more terms would add confusion.

Safety, liability, and documentation

  • Recall status affects legal liability, resale, and warranty: dealers/manufacturers generally cannot sell vehicles with unresolved recalls, and fixes must be provided even out of warranty.
  • Recalls create an auditable trail used in lawsuits and by regulators; whether owners applied the fix can matter greatly in court.

Tesla software quality and OTA culture

  • Some see OTA recalls as a positive: faster, less hassle than traditional recalls, and evidence Tesla is ahead on software.
  • Others argue this shows “move fast and break things” culture in a life-critical domain, citing incidents where bad software overstressed hardware, required ECU replacements, or degraded behavior (e.g., wipers).
  • Concerns raised about trust in constantly changing car behavior and about OTA-induced failures, though other owners report years of trouble-free updates.

Media coverage and perception

  • Disagreement over whether headlines like “Tesla recalls…” are misleading clickbait or correctly serious.
  • Some note that many automakers have frequent, often more severe recalls (mechanical failures, wheels coming off), but Tesla stories get disproportionate attention due to brand/CEO politics and engagement incentives in news.

Disagreement on severity of this defect

  • One view: if failure is detected, a warning is shown, and the driver can safely pull over, it’s marginal as a “safety” issue.
  • Counterpoint: loss of power steering is inherently safety-related, especially at low speeds, and clearly fits recall criteria.

I ate and reviewed every snack in our office kitchen

Reception of the article & content marketing

  • Many found the piece very funny and engaging, calling it one of the best/most entertaining lead-gen or corporate blog posts they’ve read.
  • Several note it works well as recruiting material and as “what corporate blogs should be” rather than SEO filler.
  • A few readers were surprised it successfully made them aware of the company/product for the first time.

Office food culture & etiquette

  • Multiple anecdotes about office “meal hacks” and wikis documenting what you can cook from snack-room ingredients.
  • Leftover catering is a recurring theme: “free food” channels, scavenging Forkable/Doordash leftovers, and the chaos when food is mistakenly advertised as free while a meeting is still ongoing.
  • Strong condemnation of stealing coworkers’ food; some compare it to stealing medication or phones, though one person admits learning this norm the hard way as a teen.
  • Microwaving fish and hard-boiled eggs are suggested as socially negative snacks; boiled eggs especially get “stinky” and low social scores.

Health, nutrition, and self-control

  • Several commenters reflect on gaining weight when offices overstock candy; some literally demanded candy removal.
  • Some wish for constrained access (badge-kcal limits) or self-imposed controls to prevent over-snacking.
  • Subthread on fruit sugar vs candy: fiber, glycemic index, and fructose vs glucose are debated; some explanations are called biologically confused.
  • Dried fruit is seen as dangerously easy to overeat; fresh fruit is considered lower sugar by volume but still a concern for some diets (e.g., FODMAP).

Snack rankings and taste disagreements

  • Strong split on grapes’ logistics: some see them as perfect and trash-free, others cite stems, seeds, and stickiness.
  • Bananas: praised in the article as socially neutral, but banana-haters argue the smell is nauseating and absolutely not neutral.
  • Fruit vs candy: some argue a good apple beats any candy bar; others say modern fruit is over-engineered for sweetness and sometimes prefer chocolate.
  • Debates over specific items:
    • Mint chocolate Cliff/Builder bars: loved by some, reviled by others (especially as “food for people who just need energy”).
    • Beef jerky vs olives: readers question why jerky’s logistics score is high while olives are heavily penalized, noting both require handwashing and produce waste.
    • Nuts and boiled eggs are proposed as the “best” office snacks, though boiled eggs get pushback for smell and social acceptability.
    • Lemons and biting into them whole elicit enamel/sensitivity stories and jokes about signaling sociopathy.

Fruit culture, variety, and logistics

  • Long tangent on apples: complaints that supermarket apples are too sweet; praise for small, tart or heirloom apples; pointers to apple-ranking resources and old apple trees.
  • Cultural note: in some places (e.g., France), people more often eat whole fruit rather than pre-sliced.
  • Mangoes, mangosteen, cherimoya and other “broader fruitiverse” options are praised; dried mango is a personal office staple for one commenter.
  • Grapes get additional threads about freezing them (with or without vodka) and their use as a content-marketing prop.

Company, product, and technical tangents

  • Readers ask about how office snacks are sourced (catering vendors often push free or cheap snacks to seed demand).
  • One commenter wanted a clear self-hosted open vs premium feature matrix; another points to the pricing page as the closest thing.
  • The company clarifies they’re hiring engineers but intentionally don’t list roles publicly to avoid overwhelming applications, inviting direct contact instead.
  • Minor side tangents include ELO rating trivia, the origin of “Pilates,” and a detailed discussion of “no nitrates added” labeling via celery powder and its actual nitrate content.

Apple pulls data protection tool after UK government security row

What Changed with Apple’s Advanced Data Protection (ADP)

  • ADP makes most iCloud data end‑to‑end encrypted so Apple cannot access it; without ADP Apple holds the keys and can comply with data warrants.
  • The UK used a “technical capability notice” under the Investigatory Powers Act to demand a mechanism to access encrypted iCloud data globally, not just for UK users.
  • Apple has stopped enabling ADP for UK-region accounts and says existing UK users will be forced to turn it off during a future grace period or lose iCloud account access. It claims it cannot disable ADP unilaterally.

Did Apple Cave or Take the Least-Bad Option?

  • One camp: Apple should have pulled iCloud or even exited the UK to force political backlash and set a stronger precedent. Disabling ADP is framed as capitulation and brand betrayal.
  • Another camp: any backdoor would have weakened security worldwide; limiting the damage to the UK market is seen as the only realistic, shareholder-compatible move.
  • Several note Apple has previously resisted US law-enforcement demands, but argue there’s a difference between fighting a single court order and defying a statute in a sovereign country.

UK Law, Surveillance, and Civil Liberties

  • Commenters highlight the Regulation of Investigatory Powers Act (compelled key disclosure), Investigatory Powers Act, border search powers, and arrests over online speech as part of a long UK surveillance trajectory.
  • Many fear the extraterritorial aspect: UK orders could potentially reach non‑UK users’ data.
  • Some argue this prioritizes law-enforcement convenience over systemic security, and will primarily harm ordinary users while serious criminals switch to independent tools.

Precedent, Other Jurisdictions, and “Five Eyes”

  • Worry that other governments (US, EU states, Australia, etc.) will see this as a template: “either give us a backdoor or lose the feature.”
  • Others counter that this move publicly demonstrates that such demands cause loss of capability, not “special lawful access,” which might politically backfire on governments.
  • Thread notes parallel pushes: US CLOUD Act, Australian “assistance and access” laws, EU “Chat Control” and “Going Dark” initiatives, and China’s long-standing requirements.

User Responses and Technical Workarounds

  • Advice for UK users:
    • Turn off iCloud backups and photos, or do only local encrypted backups via iTunes/Finder.
    • Consider NAS + Time Machine, self-hosted Nextcloud, or third‑party E2EE tools (e.g., file or photo vaults, encrypted containers).
  • Multiple people stress there is no full replacement for iCloud’s deep integration (app data, settings, seamless device restore) due to platform lock‑in.
  • General caution that E2EE from a vendor you don’t fully control is always contingent: OS updates can, in principle, exfiltrate keys.

Broader Themes: Authoritarian Drift and Politics

  • Strong sense that this is part of a wider erosion of civil liberties in the UK and across Western democracies; encryption debates are seen as a front in that conflict.
  • Some argue it’s naïve to expect corporations to “fight for citizens” rather than for markets; the real remedy is political organizing, lobbying MPs, and voting.
  • Others discuss emigration as a response and debate which countries meaningfully offer better privacy, with significant disagreement and cynicism about all major blocs.

Johnny.Decimal – A system to organise your life

What Johnny.Decimal Is Trying to Solve

  • Seen as an attempt to tame growing digital chaos via a shallow, fixed hierarchy and numeric IDs.
  • Works best, according to proponents, when:
    • Domains are relatively stable (small businesses, clearly bounded projects, personal archives).
    • The goal is reliable retrieval and shared mental models across a team or family.
  • Some use it only partially (e.g., just for folder names or a few domains like finances, housing, “life admin”).

Reported Benefits

  • Reduces deep nesting; three levels feel easier to navigate than ad‑hoc trees that sprawl.
  • Once internalized, people report “muscle memory” for IDs and fast navigation (often script- or launcher-assisted).
  • For some, the main value is not the specific scheme, but having any consistent system to copy/steal ideas from.
  • A few ADHD users say JD’s simplicity and “always there” structure help, as long as setup is done once and then mostly left alone.

Critiques and Limits

  • Many find the decimal codes non‑intuitive, hard to remember, or simply unnecessary versus descriptive folder names.
  • Hierarchies fail when items belong in multiple places (e.g., “car insurance” under cars or under money/insurance); this is a core recurring complaint.
  • Critics argue JD is brittle for individuals with changing interests and life areas, and better suited to static domains than personal knowledge management.
  • In shared/team environments, expecting everyone to learn numeric IDs is seen as unrealistic and potentially alienating.
  • Several people tried JD for months or years and reverted to simpler homegrown systems, judging the “juice not worth the squeeze.”

Alternatives People Prefer

  • Search-first, low-organization approaches: flat or lightly structured folders, strong filenames, desktop search tools, grep/Everything/mdfind, OCR’d document archives.
  • Tag- and link-based systems (Obsidian, Logseq, Tana, Capacities, MediaWiki, org-mode, paperless-ngx) that allow multiple contexts per item.
  • PARA, simple yearly folders, or “immutable chronological log” patterns for effortless filing and later discovery.
  • Physical systems (filing cabinets, banker boxes, labeled envelopes) often win for paper.

Meta-Themes: Personality, Aging, and Habits

  • Strong divide between people energized by systems and those overwhelmed or bored by them.
  • ADHD and “naturally messy” users often report intricate systems rapidly collapsing; forgiving, low-friction habits matter more than formal schemes.
  • Several older commenters note that volume of documents and weaker memory make some structure increasingly valuable, but not necessarily JD.
  • Broad consensus: the specific system is less important than:
    • Keeping things minimal, portable, and tool-independent.
    • Making capture and retrieval easy enough that you actually use it.
    • Accepting that no hierarchy perfectly matches real-life complexity.

SpaceX engineers brought on at FAA after probationary employees were fired

Alleged Corruption and Regulatory Capture

  • Many commenters see SpaceX engineers being brought into the FAA as blatant regulatory capture: the regulated company effectively taking over its regulator.
  • They argue this is “outright corruption,” with no serious attempt to avoid or even hide conflicts of interest, especially when those hires are tied to changes in critical safety systems and ongoing SpaceX investigations.
  • Others note that even when conflicts used to be hidden, the need to hide them at least imposed some friction; now the boldness is seen as a sign of democratic backsliding.

Schedule A Hiring and Article Accuracy

  • A major subthread disputes the Wired framing around Schedule A.
  • Several point out Schedule A has multiple subsections; the disability-based authority is different from the short-term/temporary authority likely used here.
  • They accuse the article of misleading readers for a “gotcha,” implying fake disability claims when the real issue is bypassing normal posting/competition.
  • This causes some to distrust the rest of the piece, viewing it as innuendo-heavy and crafted to maximize outrage.

Conflict of Interest and Recusal

  • Commenters mock assurances that conflicts of interest will be self-policed, noting that determining one’s own conflict is itself a conflict.
  • There is concern that Musk’s broad business footprint plus policy influence create numerous vectors for self-dealing, well beyond the FAA/SpaceX relationship.

Broader Political and Authoritarian Concerns

  • The episode is placed in a larger pattern of aggressive moves by the new administration and Musk, likened to a “Russian mafia state” model.
  • Some argue the media has spent years “calling it out” with limited political effect; others counter that ignoring it is worse.
  • There are dark scenarios sketched about future repression of dissent and media, with fears that tools like regulatory changes and law enforcement could be weaponized.

Resistance, Strikes, and Public Apathy

  • A few call for a general strike; others respond that elites are insulated, strikes would be crushed or ignored, and Americans are too economically insecure or apathetic.
  • Historical examples of violent strikebreaking in the US are cited to argue that large-scale labor action would face severe repression.

HN Meta: Flagging and Discussion Quality

  • Multiple comments complain that stories about Trump/Musk get heavily flagged, suppressing visibility and debate.
  • Others welcome the flagging to avoid turning HN into a constant political feed.
  • There’s concern about “one-sided propaganda” vs. concern about “willful ignorance”; some praise HN’s relatively higher signal compared to other platforms despite the polarization.

Why does target="_blank" have an underscore in front? (2024)

Origin of _blank and reserved targets

  • Commenters agree _blank comes from the mid‑90s Netscape frames era, where target referred to named frames/windows.
  • Netscape’s original proposal and later HTML specs define four reserved target names: _blank, _self, _parent, _top.
  • Historically, any non‑existing target name opened a new window; the first click created that window, later clicks reused it. _blank was standardized specifically to always open a fresh window, never reusing an existing one.

Why the underscore specifically?

  • Key point from the specs: early frame names/IDs had to start with an alphanumeric character. Because of that, any name beginning with _ was guaranteed not to clash with user‑defined frame names.
  • The underscore thus marks a reserved namespace for special semantics (_blank, _self, _parent, _top) while avoiding collisions with normal frame names like main, nav, or blank.
  • Several commenters find the article’s explanation incomplete until this “must start with a letter/alpha” rule is noted.
  • Some infer cultural influence from C/C++ and other languages, where leading _ often denotes reserved/private identifiers, but there’s no direct historical citation in the thread—this is presented as plausible, not proven.

Frames, frameset, iframes, and their legacy

  • People reminisce about building early “web apps” with <frameset> and frames, using targets heavily.
  • There’s debate over whether deprecating frames was a mistake:
    • Pro‑frames: they solved “part of the page changes, other parts don’t” and enabled simple multi‑pane UIs and persistent media players.
    • Anti‑frames: they broke URLs, bookmarking, linking, search indexing, and often produced poor UX.
  • Modern analogues like iframes, htmx/Turbo, LiveView, micro‑frontends, and proposals like “triptych” are seen as a reinvention/refinement of the same pattern.

Modern use and criticism of target

  • Outside of _blank and iframes, few strong modern use cases for target are mentioned.
  • Some view target="_blank" as user‑hostile (tab spam, broken back/forward history) and argue users should control whether links open in new tabs; they’d prefer browsers to neuter _blank.
  • Security details appear: _blank now implicitly gets rel="noopener" in many browsers, whereas custom targets like _new do not.

Cross‑device and underscore culture

  • A “shower thought” suggests target="_mobile" / "_desktop" to move sessions between devices; replies say this belongs in browser/OS “share” or “send to device” features, not HTML.
  • Several comments connect the underscore prefix to broader programming conventions (private/reserved names, “ignored” variables), reinforcing the idea of _something as a special/implementation namespace.

Sweden Investigates New Cable Break Under Baltic Sea

Status of the Incident

  • Cable owner reportedly confirms only modest physical damage with no impact on communication capacity.
  • Some commenters see media and political attention as disproportionate to the practical impact, but symbolically important.

Accident vs. Deliberate Sabotage in the Baltic

  • One side stresses that undersea cable faults are common globally (hundreds per year), mostly from anchors and fishing gear; recent investigations into Baltic incidents have often concluded “accidental.”
  • Others argue the Baltic is now a clear outlier: several breaks in ~1.5 years after a decade with none of this type; often involving Russia-linked or China-linked ships behaving oddly (AIS off, zigzagging, drifting, routes to/from Russian ports).
  • This camp sees it as textbook “grey-zone” hybrid warfare: damage just below the threshold for open conflict.
  • There is acknowledgement that attribution is inherently hard and information politically filtered; some call the true pattern “unclear.”

Perceptions of European Weakness and the US Role

  • Strong narrative that Europe is “soft,” overdependent on US security guarantees, late on defense investment, and constrained by public tolerance for economic pain (e.g., energy, sanctions).
  • Others push back: Russia is struggling even against Ukraine; claims that only “hard times” create strength are challenged as oversimplified.
  • Deep division over the US: some say Washington has betrayed Europe and is tilting pro‑Russia; others reject this as partisan or propagandistic.

What Should Europe Do? Deterrence vs. Escalation

  • Suggested measures short of direct war:
    • Tighter, more enforced sanctions; targeting the Russian “shadow fleet” and banks still active in Russia.
    • Closing borders and ports to Russia-linked shipping, or permanently banning vessels that call at Russian ports.
    • Requiring bonds/insurance for seabed damage and letting insurers price Russia-risk out of the market.
    • Escorting or heavily monitoring Russian shipping in the Baltic.
  • Hardliners argue appeasement invites further probing; some advocate explicit threats to block or even fire upon repeat offenders.
  • Others warn reciprocal sabotage or blockades could spiral into full kinetic war, with massive economic and infrastructure losses on both sides.

EU Defense Capacity and a European Army

  • Many argue the cable episodes highlight Europe’s need for autonomous defense: more spending, industrial capacity (shells, air defense, UAVs), and less reliance on US systems and spare parts.
  • Ideas range from:
    • A fully unified EU army under common command.
    • More realistic: shared command-and-control, interoperability, joint procurement, and an EU-level industrial plan, building on NATO structures.
  • Skeptics doubt political cohesion: threat perception is uneven (Baltics/Poland vs. Spain/Germany), and conscription or supranational command is unpopular.
  • Some believe a strengthened Europe could “easily” defeat Russia in Ukraine if it chose to intervene; others see this as optimistic, noting political risks and limited stockpiles.

Cutting Russia Off from the Internet

  • One proposal: bar US ISPs from peering with networks that route to Russia, effectively forcing countries to choose between a “US internet” and a “Russia internet.”
  • Proponents think most economies would side with the US, isolating Russia; critics argue practical routing workarounds exist and such a move would damage global trust in US infrastructure.
  • Another view: keeping Russia connected is strategically useful for delivering uncensored information; cyber-risk can be managed.

Technical Reality and Protection of Cables

  • Industry perspectives note:
    • Cable breaks are routine operational events; systems and distributed services are designed to tolerate partitions.
    • Many faults are never publicized; repairs are standard business.
  • Others emphasize the Baltic’s recent anomaly and call it likely intentional, given statistical spikes and ship-track patterns.
  • Protection ideas discussed:
    • Tamper-detecting fibers and distributed acoustic sensing; one Baltic operator is reportedly testing systems that can detect large marine life at tens of kilometers.
    • Parallel “dummy” detection lines to flag negligent or hostile anchoring patterns.
    • Undersea drones and sonar networks; however, persistent coverage is seen as expensive and technically challenging.
    • Physical defenses (hook lines, seabed anchors) are proposed but their cost-effectiveness vs. repair remains unclear.