Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 476 of 545

Seagate: 'new' hard drives used for tens of thousands of hours

Alleged source of the problem (Seagate vs. distributors)

  • Some readers assume Seagate is directly at fault; others note the article suggests a shady but “approved” distributor or reseller chain, not necessarily Seagate corporate.
  • Multiple German retailers (including official Seagate partners) are implicated, suggesting a distributor- or wholesaler-level issue rather than a single rogue shop.
  • Explanations range from honest warehouse mix‑ups to gray‑market sourcing and deliberate relabeling; commenters stress that wiping SMART hours looks intentional, not accidental.

Marketplace and retailer behavior

  • Many report Amazon (and, to a lesser extent, other big retailers) shipping obviously used or damaged items as “new,” including HDDs, SSDs, audio gear, and other electronics.
  • Amazon’s inventory commingling is highlighted: “sold by Seagate” doesn’t guarantee the item actually came from Seagate’s stock.
  • Some users have received outright counterfeit drives with fake anti‑counterfeit labels, especially via marketplace sellers.
  • This leads many to avoid buying HDDs from Amazon and prefer specialty dealers or direct manufacturer channels.

HDD vendor reputations and prior scandals

  • Seagate is seen by many as chronically unreliable (e.g., infamous 3TB models like ST3000DM001, Maxtor-era issues). Others counter that recent Backblaze data shows Seagate mostly comparable to peers except for a few bad SKUs.
  • Western Digital is criticized for the WD Red SMR debacle and for mixing SMR/CMR under one product line without clear labeling; some users boycotted WD over this.
  • HGST/Ultrastar and Toshiba enterprise lines are frequently praised as more reliable, though most admit personal anecdotes are statistically weak.

Used/“new” drives and fraud vs. accepted risk

  • Several commenters routinely buy refurbished/used enterprise drives (often ex‑datacenter) at deep discounts, but only when clearly disclosed.
  • The core outrage here is not that drives are used, but that they’re sold as new and their SMART history is reset—widely characterized as straightforward fraud.
  • Speculation: some of these drives may be retired datacenter or Chia‑mining units with tens of thousands of hours.

Why this matters even if warranty exists

  • Drives have finite life; a “5‑year” drive that’s already 2–5 years into its service reduces effective lifespan.
  • Warranty replaces hardware but not lost data, downtime, or rebuild headaches (especially for RAID/NAS setups that want matched drives).
  • Enterprise/OEM drives entering retail may have warranty start dates years in the past; customers buying “new” don’t expect that.

Technical detection: SMART vs. FARM

  • SMART power‑on hours can be (and are) reset by some refurbishers.
  • Seagate’s FARM (Field Accessible Reliability Metrics) logs are discussed as harder to fake and more detailed (e.g., voltage ranges, real accumulated hours).
  • Users share commands: smartctl -l farm /dev/sdX (requires smartmontools ≥ 7.4) and mention Seagate’s openSeaChest tools. Some struggle to extract logs or find documentation.

Buying strategies and alternatives

  • Many now:
    • Avoid HDDs from Amazon/marketplaces for critical data.
    • Prefer known-good enterprise lines (Ultrastar, Toshiba MG/MN) or clearly labeled refurbs from reputable sellers.
    • Verify warranty status on manufacturer sites and cross‑check DOM vs. reported hours/FARM logs on arrival.

Broader decline in quality and enforcement

  • Several see this as part of a wider pattern: companies quietly lowering quality or relabeling returns to cope with price pressure.
  • Opinions differ on effectiveness of remedies: class actions are seen as a “corporate nightmare” but not very rewarding to consumers; others suggest consumer‑protection agencies, regulators, or small‑claims routes.

Our phones are killing our ability to feel sexy (2024)

Role of Phones vs. Social Media & Algorithms

  • Many see phones as neutral tools; the real problem is social media and algorithmic feeds that enable “infinite scroll” and constant dopamine hits.
  • Others argue phones and social media are inseparable: ubiquitous cameras + pocket access normalized always‑online behavior and made current social media toxicity possible.
  • Some mitigate by disabling notifications, avoiding social apps, or using dumb phones / watches instead.

Nostalgia, Risk, and Romance

  • Several comments resonate with the article’s longing for pre‑smartphone romance: missed connections ads, waiting by landlines, physical media, and chance encounters.
  • The key loss is seen as risk and uncertainty: not knowing the menu, getting lost, walking into a random store, or flirting in person instead of curating profiles.
  • Others dismiss this as selective nostalgia; every era has its own “edgy” youth culture, and earlier decades also had plenty of passive consumption (e.g., TV).

Time, Work, and Instant Gratification

  • One camp blames economic pressure, long commutes, and complex lives for pushing people toward instant digital gratification and away from embodied experiences.
  • Another insists most people actually have more leisure than they admit; detailed time audits often reveal hours lost to TV and phones.
  • “Opportunity cost” of screen time is emphasized: no single scroll is catastrophic, but the cumulative diversion from hobbies, relationships, and “third spaces” is large.

Sexiness, Image, and Embodiment

  • Some agree that constant phone use looks and feels unsexy: staring down at a slab, staging fake candid shots, losing bodily presence and eye contact.
  • Side debates cover watches (Apple Watch vs. Rolex) as signals of utility, money, personality, or superficiality.
  • Others counter that smartphones can increase confidence, health, and connection, and that “sexy” is highly subjective.

NEETs, Addiction, and Responsibility

  • The article’s framing of NEETs “robbing themselves” via games and porn drew strong pushback: some see these as survival buffers for people excluded from work and relationships.
  • Long subthreads argue over addiction, free will, and responsibility: how much is individual choice vs. engineered environments and social structures.
  • Similar arguments surface around diet and obesity as an analogy for phone overuse.

Asteroid Impact on Earth 2032 with Probability 1% and 8Mt Energy

Asteroid risk level and impact consequences

  • 2024 YR4 is estimated at ~8 Mt yield, comparable to a large nuclear weapon or Tunguska-level event: serious city‑scale damage but not civilization‑ending.
  • Torino scale rating implies “localized destruction,” not regional or global catastrophe.
  • Several comments stress that the greatest chance is impact over ocean (most of Earth’s surface) or sparsely populated land; only a tiny fraction of the planet is “very urban,” so risk of a million‑plus death event is low.
  • Ocean impact could generate tsunamis, but there is disagreement over how severe compared with major earthquake tsunamis.
  • For individuals, commenters argue the risk is orders of magnitude smaller than everyday hazards (cars, disease, etc.).

Probability, uncertainty, and orbit dynamics

  • The 1.2% figure is cumulative over several possible encounters starting in 2032; most subsequent passes are much lower probability.
  • Negative Palermo scale rating means this is not above background asteroid risk.
  • Several explanations: current orbit is poorly constrained due to a short observation arc; as more observations come in, the “error ellipse” usually shrinks and the impact probability almost always drops toward 0%.
  • Orbital uncertainty is handled via Monte Carlo sampling of the covariance on orbital elements, then propagating many deterministic n‑body simulations forward.
  • Discussion of chaotic n‑body dynamics vs deterministic physics: consensus that randomness comes from measurement uncertainty, not the equations themselves.

Detection systems and upcoming surveys

  • A contributor working on the NEO Surveyor telescope explains that:
    • The object is small and dim; prior apparitions were hard to recover in archival data.
    • NEO Surveyor (IR) and the Vera Rubin Observatory (LSST) are expected to re‑detect and greatly refine its orbit years before 2032.
    • IR observation reduces size uncertainty by measuring thermal emission rather than brightness alone.
  • Several note that new surveys will massively increase the catalog of near‑Earth objects, raising communication challenges: more “scary‑sounding” detections without increased underlying risk.

Mitigation and deflection ideas

  • Proposed methods include nuclear disruption, gravity tractors, deliberate gravitational “tugs,” Yarkovsky manipulation, and even mining; others push back that:
    • Available space power is tiny relative to the energy needed to significantly alter a tens‑meter object’s orbit on short notice.
    • Fragmenting an object adds complexity and could increase or decrease impact risk depending on details that are hard to control.
    • Testing deflection should be done on very safe targets, not a close‑approach object with non‑zero impact probability.

Societal, political, and media angles

  • Some see this as an argument to build a global asteroid‑defense system; others worry about dual‑use, nuclear‑armed space systems and strategic instability, citing past warnings about weaponizing asteroid deflection.
  • Debate over whether widespread coverage of such objects will inform the public or create a crisis of panic and misinformation, especially via social media.
  • Comparisons are drawn to climate change and other global risks: disagreement over which is more “existential,” and skepticism about humanity’s ability to mount coordinated responses.
  • Evacuation scenarios are discussed: moving a city is considered feasible (analogous to hurricane evacuations), but relocating half the planet to the “safe” hemisphere is viewed as logistically and politically impossible.

Humor, culture, and speculation

  • Many jokes reference “Don’t Look Up,” “Armageddon,” “giant meteor for president,” and Mayan‑prophecy‑style doomsday cults.
  • Several commenters explicitly say they are “rooting for the asteroid,” while others push back, emphasizing the localized but very real human toll such an impact would have.

Nuclear fusion: it's time for a reality check

Political optimism vs. “30 years away” reality

  • Commenters note fusion has been “decades away” for half a century and see current UK rhetoric (“within grasping distance”) as dangerously over-optimistic.
  • Main concern: governments may shape energy (and even AI/automation) policy around speculative technologies rather than proven ones.

Current fusion efforts and technical challenges

  • Some point out that companies like Commonwealth Fusion and Tokamak Energy are building serious tech demonstrators, not just science toys; they see value in “building to learn.”
  • Others stress that multiple independent breakthroughs are still needed (confinement, materials, breeding, maintenance, cost), so a sudden “DeepSeek moment” is unlikely.
  • Debate on magnetic-confinement tokamaks:
    • Pro side: new high‑temperature superconductors allow much higher fields; power scales strongly with field, enabling smaller, cheaper reactors.
    • Skeptical side: structural limits (J×B forces, material strength) cap usable fields; volumetric power density is still far worse than fission, implying huge, costly plants.
  • ITER is widely viewed as a cautionary project: outdated magnet tech, major delays, and a design that would be noncompetitive even if it works.

Maintenance, remote handling, and reliability

  • “Remote operation” is interpreted as remote maintenance inside highly radioactive vessels, not offsite control.
  • Robotic access into tight, fragile, vacuum‑sealed geometries is described as a major unsolved engineering problem; failure to extract a stuck robot could be catastrophic.
  • One analysis of a DEMO‑like plant estimated ~4% availability, highlighting RAMI (reliability/availability/maintainability/inspectability) as a central bottleneck.

Economics vs. renewables and fission

  • Many argue the biggest omitted challenge is cost: fusion must beat rapidly falling solar/wind + storage, not just “work.”
  • Fuel is considered a minor cost driver; capex and complexity dominate. Tritium supply and breeding add further expense.
  • Extensive side discussion on fission history: subsidies, breeder failures, SMRs repeatedly cancelled, and chronic cost overruns vs. explosive growth and cost drops in renewables and batteries.
  • Some think fusion R&D is worthwhile long‑term; others argue marginal dollars would do more for climate if spent on modern fission or scaling renewables now.

Neutron flux, waste, and alternatives

  • DT fusion’s intense neutron flux is seen as creating large volumes of activated material and tritium‑handling issues—“all the hassles of fission with more steps.”
  • Aneutronic fusion is noted as conceptually cleaner but vastly harder.
  • A minority suggests fusion may make more sense for niche roles (e.g., advanced space propulsion) than for terrestrial grid power.

Jevons paradox

Jevons Paradox in AI and Nvidia

  • Many comments apply Jevons to AI: cheaper or more efficient training/inference (e.g., DeepSeek R1, synthetic data, RL) could drive more total AI usage and thus more total GPU demand.
  • Some argue the DeepSeek paper is actually bullish for Nvidia: synthetic data pipelines and “thinking models” imply more and better foundation models, hence more GPU usage overall.
  • Others counter that Nvidia’s current margins rely on a few mega-buyers building huge, differentiated datacenters. If AI becomes cheap and commoditized, demand for ultra‑expensive datacenter GPUs and $500B buildouts may shrink even if total AI use rises.

Stock Valuation, Market Dynamics, and Politics

  • Comparisons are made between NVDA and AMZN in the dotcom era. Detractors say the analogy fails because Nvidia already has massive operating income; supporters still see bubble‑like speculation and hope for a “dot‑com‑style” AI crash as a buying opportunity.
  • Several note Jevons applies to resource consumption, not directly to stock prices. Market moves reflect perceptions of future margins and competition, not just volume.
  • A side thread debates a recent high‑profile Nvidia stock sale: some see normal trading on public news; others speculate about political insider knowledge, without evidence.

Efficiency, Constraints, and Demand Curves

  • One line of argument: theory of constraints and finite use cases mean there isn’t an infinite GPU demand curve; at some efficiency level, “good enough” caps spending.
  • Others claim that large labs will always find ways to saturate any available compute (larger, more frequent, or more specialized models), so efficiency gains still increase total consumption.
  • Analogies are drawn to SMT solvers: huge efficiency and price drops didn’t yield infinite or even massive mass‑market demand; adoption is limited by people and workflows, not just cost.

Access to LLMs and Price Sensitivity

  • Several commenters say price does lock out users and organizations:
    • Paid add‑ons for office suites were too expensive for many SMBs.
    • Local SOTA inference often needs 400–768 GB of RAM/VRAM, with hardware costing $15–30k, which is out of reach for most individuals.
  • Lower costs plus local trainability are seen as alleviating:
    • Lack of tuning control,
    • Data ownership/privacy issues,
    • Power waste per useful unit of work.
  • Some remain skeptical, arguing many end users dislike current AI features and that LLMs are “solutions in search of problems.”

Induced Demand, Rebound Effect, and Definitions

  • Multiple comments tie Jevons to induced demand and the rebound effect:
    • Rebound: efficiency → more use, partially offsetting savings.
    • Jevons: efficiency → more than full offset, total resource use rises.
  • Debate centers on whether induced demand is:
    • Just “realized latent demand” along a standard demand curve, or
    • A genuine shift of the demand curve itself.
  • Highway and housing examples illustrate how cheaper travel or lighting can permanently change behavior and urban form.

Energy, Lighting, Transport, and Other Examples

  • Home insulation: cited research suggests initial gas savings erode as occupants raise thermostats, matching Jevons‑like behavior.
  • LEDs: strong disagreement over whether 10x efficiency led to similar or greater increases in total lighting energy:
    • Some point to far more fixtures (accent lights, outdoor, screens) and historical data showing consumption rising >100x as lighting got cheaper.
    • Others doubt a full 10x usage increase and focus on per‑fixture savings and reduced replacement.
  • Transport: commenters discuss EVs and 1950s travel levels; cheaper per‑km driving may increase total kilometers driven, but lifestyle and urban design constraints complicate this.

Scope and Misuse of Jevons

  • Several see Jevons being casually invoked as “cope” to defend high AI and chip valuations, ignoring time lags and competitive dynamics.
  • Others stress that Jevons is empirically uncommon compared to ordinary rebound effects and that its relevance must be analyzed case by case, not assumed.

Bacteria (and their metabolites) and depression

Diethanolamine (DEA), consumer products & safety

  • Commenters note DEA is an industrial surfactant in detergents, shampoos, cosmetics, CO₂ capture, etc., not a natural metabolite, yet can be incorporated into lipids via cardiolipin synthase.
  • Concerns raised: mitochondrial membrane disruption, oxidative stress, possible links to cancer and depression; safe dose considered “unclear” and the focus here is chronic suffering, not acute toxicity.
  • Some propose practical avoidance: DEA‑free products, reverse‑osmosis water, minimally processed foods, thorough rinsing of dishes, switching to natural fibers and “simple” soaps.
  • Others correct chemistry (DEA is an amine that yields abnormal lipids) and stress “dose makes the poison,” warning against overgeneralizing from absorption anecdotes.

Skin, plastics, and exposure pathways

  • Debate over how meaningful skin absorption is: examples of extreme toxins (hydrofluoric acid, dimethylmercury) versus the likely much lower permeability for DEA.
  • Discussion about micro/nanoplastics from clothing: some fear dermal absorption and endocrine disruption, others argue skin uptake is an “extraordinary claim” with little evidence and that inhalation/ingestion via lint and dust are more plausible routes.

Statistics, GWAS, and causality

  • The reported association between M. morganii and depression (very low p‑value ~1e‑37) prompts both excitement and skepticism.
  • GWAS specialists explain that such tiny p‑values are common with large samples and many tests; they reflect strong statistical evidence but potentially small effects and heavy dependence on model assumptions.
  • “Crud factor” is invoked: in rich datasets, almost everything weakly correlates with everything (diet, obesity, depression, microbiome), making causal inference hard. Mendelian randomization and biological follow‑up are viewed as essential.

Individual genetics and gut–brain tailoring

  • Personal genomics anecdotes: FUT2 non‑secretor, NOD2 variants, partial PNP deficiency guiding diets high in seaweed, mushrooms, omega‑3 fish, low sugar, careful infection control.
  • A shared NotebookLLM summary of the paper emphasizes gene–microbiome–diet interactions (LCT/lactose, ABO/secretor status, fiber) and suggests cautious, personalized dietary adjustments plus professional guidance.

Fasting, keto, microbiome & mood

  • Multiple users report dramatic mood improvements from long fasts, repeated shorter fasts, or ketogenic diets; others describe depression triggered by low‑calorie/low‑carb regimens.
  • Proposed mechanisms include microbiome reset (reducing overgrowth like M. morganii), lowered inflammation/oxidative stress, dopamine “reset,” behavioral activation, and “starvation euphoria”; all remain speculative.
  • Some suggest structured low‑FODMAP protocols, specific probiotics (e.g., certain Bacillus strains), oregano oil/garlic extracts, or butyrate as more sustainable microbiome interventions.
  • Skeptics caution against seeing diet as a universal cure‑all for depression and highlight bipolar spectrum, behavioral therapy effects, and placebo/psychosomatic possibilities.

Possible interventions on the microbiome

  • Beyond general lifestyle changes (diet, fasting, stress reduction, probiotics), fecal microbiota transplant is mentioned as a more direct way to reshape gut flora.
  • Idea floated of species‑specific antimicrobials against M. morganii; bacteriophages are cited as an existing, highly specific antibacterial approach.

Regulation, precaution, and “via negativa”

  • Several commenters criticize regulatory regimes that treat chemicals as “safe until proven harmful,” citing historical drug and industrial scandals.
  • Taleb’s “via negativa” is referenced: favor only long‑historical foods and exposures (water, wine, coffee) and avoid novel additives where long‑term effects are unknown.
  • Others counter that while caution is warranted, depression and similar conditions are serious enough that experimental self‑interventions may still be justified.

Other biological links (Long Covid, serotonin)

  • One thread connects Long Covid to reduced gut tryptophan uptake and low serotonin; a commenter reports benefit from hydrolyzed protein supplementation but another notes the underlying study has methodological issues and lacks replication.
  • Overall, participants converge on the view that the gut–brain–immune axis is important but poorly understood, and that current evidence supports cautious experimentation rather than definitive clinical recommendations.

We got hit by an alarmingly well-prepared phish spammer

Attacker sophistication and objectives

  • Some see the attacker’s behavior as unusually prepared for “typical spammers,” moving quickly through VPN signup, internal docs, and SMTP use without exploration.
  • Others argue it’s not remarkable by serious-hacker standards and could be an automated script plus basic network scanning.
  • Debate over the real goal: mass spam vs. high‑value phishing that perfectly impersonates internal departments (HR, pensions, IT) using legitimately-signed mail.
  • One speculative view: the spam flood might even serve as a distraction from other activity.

VPN, 2FA, and access control

  • Multiple commenters are surprised VPN access lacked 2FA and/or certificate requirements.
  • Several note that simply requiring admin approval for VPN enrollment would have blocked this path.
  • Criticism that VPN accounts have separate credentials instead of SSO, increasing attack surface.

Unauthenticated internal SMTP & legacy baggage

  • The internal, no‑auth SMTP relay is widely viewed as the main design flaw; “being on the network” was incorrectly treated as authentication.
  • Pushback: many orgs still depend on old hardware/software (MFPs, NAS, payroll/HR apps) that can’t authenticate, so insecure relays survive for cost and inertia reasons.
  • Dispute over whether this is “oversight” vs. a conscious risk decision to avoid breaking unknown dependencies.

Zero trust, ZTNA, and network architecture

  • Several advocate “zero trust” or ZTNA-style access instead of flat VPNs: tunnel-in should still face per-host and per-service access controls.
  • One commenter describes a painful zero‑trust rollout where opaque device posture checks cause constant user issues, blamed on poor implementation rather than the model itself.

Human factors and phishing as an industry

  • Emphasis that phishing is a professionalized, sometimes state-linked industry, not just hobbyist “script kiddies.”
  • Stories from hotels and the military highlight that people and informal processes are often the weakest link.
  • Suggestions: strict processes (never ask for passwords, refund only to original payment method), broad 2FA, anomaly monitoring, and post‑incident reviews.

Defensive techniques and email hygiene

  • Proposed responses include immediate account lockdown, forced in‑person password resets, tighter ACLs, geo/IP-based access limits, and simulated internal phishing tests.
  • Heavy layered email filtering (multiple scanners, including outbound) is recommended but acknowledged as imperfect.
  • Many describe using custom domains, catch‑all addresses, and per‑service aliases to detect and isolate phishing, with debate over the limitations of Gmail “+tag” schemes.

AI and automation in future attacks

  • Some suspect that what looks like deep prior research may increasingly be AI‑driven multi‑agent systems that rapidly learn from successful techniques.
  • Concern that generative AI plus scraped personal data makes phishing emails far harder to distinguish from legitimate communication.

I still like Sublime Text

Performance and Large Files

  • Many comments praise Sublime’s speed: instant startup, low latency, and handling multi‑GB logs/SQL dumps without crashing, often better than VS Code or JetBrains on modest hardware.
  • Some report opposite experiences (e.g. huge CSVs using more RAM than Notepad++), but overall performance is a key reason people keep Sublime installed even after moving to other IDEs.
  • The responsiveness contributes to a “tactile” feel—users feel they are directly manipulating text rather than waiting on the tool.

Primary Uses and Workflows

  • Common pattern: Sublime as everyday “Swiss army knife”/scratchpad, IDEs for heavy work.
  • Uses include: log viewing, JSON prettifying, fast regex search/replace across files, large CSVs, one‑off scripts, note‑taking, markdown writing, books, to‑do lists, and configuration editing.
  • Persistent unsaved buffers and remembered undo history are heavily valued; some treat it as a lightweight personal wiki or notes app.

Comparisons with Other Editors

  • VS Code is acknowledged as richer: better default LSPs, debugger, integrated terminal, remote development, extension marketplace, and AI integrations (Copilot, Cursor).
  • Critics of VS Code cite Electron bloat, telemetry, UI clutter, frequent nags, and configuration complexity; some deliberately avoid corporate tools or “enshittification”.
  • Zed gets attention as a fast, modern competitor, but is criticized for telemetry/privacy terms, heavy AI/collaboration focus, rough edges on Linux, and configuration churn.
  • Emacs/Vim/Neovim/Helix users emphasize hackability and modal editing; others explicitly prefer Sublime’s “good defaults + enough customization” over infinite tweakability.

Licensing and Business Model

  • Debate over pricing: some call ~$100 per seat or ~$65/3‑year updates expensive; many argue it’s trivial compared to developer time and appreciate the perpetual‑with‑3‑years‑updates model.
  • Several users pay specifically to support a small, non‑VC company versus “free” but telemetry‑driven or ad‑laden tools. Others refuse to pay for an editor on principle and prefer FOSS.

Plugins, LSP, and Missing Features

  • Strengths: simple Python plugin model (often single files), powerful community packages (LSP, Pretty JSON, Markdown Images, debuggers, note/todo syntaxes).
  • Weaknesses: external Package Control with an MIA maintainer, many stale extensions, limited UI API, friction for rich panes/terminals, and no built‑in remote dev.
  • Some view Sublime as “basically done” and appreciate the stability; others see it as falling behind VS Code/Zed in AI tools, remote editing, semantic highlighting, and turnkey language setups.

Remote Development and AI

  • VS Code’s SSH/remote workflow is repeatedly called its “killer feature”; several say this alone forced them off Sublime.
  • Workarounds in Sublime (SFTP, remote mounts, separate terminals) are seen as clunkier.
  • Opinions on AI are polarized: some want deep, Cursor‑style integration; others threaten to leave if AI “slop” is added. The Sublime team leans toward enabling third‑party AI via plugins rather than core features.

Sublime Merge and Ecosystem

  • Sublime Merge is widely liked as a fast, clear Git UI, especially combined with Sublime Text.
  • Users request better blame workflows, search across history, and some performance fixes; maintainers are present in the thread and respond with clarifications and small improvements.

Science YouTuber physicsgirl (Dianna Cowern) stands for the first time in 2 yrs

Dianna’s illness and recovery

  • Commenters identify her condition as severe ME/CFS triggered by COVID (long Covid), with years of near-total disability.
  • Several note she only started improving after a recent nerve block procedure, plus extensive rest.
  • Many express relief and surprise at seeing her stand, having expected little or no recovery.

ME/CFS and Long Covid context

  • Multiple stories of ME/CFS and long Covid spanning decades, often starting after viral infections (Covid, Epstein–Barr/mono, flu).
  • Debate over terminology: some see long Covid as essentially ME/CFS or “post-viral fatigue” with a Covid trigger; others stress that “long Covid” is a heterogeneous umbrella with multiple subtypes and non-ME/CFS symptoms (e.g., isolated smell/taste loss).
  • A recurring theme is that these conditions are debilitating, poorly understood, and historically dismissed.

Healthcare and medical attitudes

  • Many describe doctors minimizing symptoms as “stress”, “in your head”, or psychosomatic, across both US and European systems.
  • Some recount excellent, validating care; others report fatal or near-fatal misdiagnoses and being refused tests, referrals, or basic aids like oxygen.
  • Insurance and system incentives (public or private) are blamed for inertia and risk-aversion.

Hypotheses and experimental treatments

  • Speculation centers on metabolic and mitochondrial impairment, immune dysregulation, autoimmunity, and microclots; one detailed commenter presents this as a working model, another notes it is not yet evidence-based consensus.
  • Proposed or tried interventions (all anecdotal): antivirals, blood thinners, monoclonal antibodies, vitamins (especially D, zinc, B3/NMN/NAD), MCT oil, nicotine patches, melatonin, nattokinase/NAC, diet changes (low-FODMAP, gluten/dairy removal), exercise/weight training, infrared light, and oxygen therapy.
  • Commenters frequently warn that effects are highly individual, mechanisms unclear, and rigorous studies scarce.

Symptom diversity and long-term effects

  • Numerous anecdotes of long-lasting or recurring loss of smell/taste, chronic fatigue, brain fog, pain, new food intolerances, GI issues, and possible autoimmune or arthritic-like symptoms after Covid or vaccination.
  • Some report partial or near-complete recovery over years; others remain bedbound.

Finances, work, and support

  • Her growing Patreon despite no new content sparks discussion: some see it as fans acting as patrons or de facto disability insurance; others find it surprising or worry about the potential for grift in similar situations.
  • There’s broader criticism that crowdfunding and creator income are filling gaps left by inadequate health and disability systems.

Emotional tone

  • The thread mixes joy and hope at her progress with anger, grief, and exhaustion from personal experiences with long Covid/ME/CFS.
  • Several posters say her improvement gives them or their loved ones renewed hope not to give up.

OpenAI says it has evidence DeepSeek used its model to train competitor

Irony and perceived hypocrisy

  • Many see it as “thief cries thief”: OpenAI scraped the internet (often against ToS and copyrights) to train its models, then complains when someone allegedly trains on its outputs.
  • Several argue training on LLM output is at least as ethical as training on unconsenting human creators; some say it’s more ethical because it targets a giant company rather than individuals.

Legal, ToS, and copyright debates

  • Distinction drawn between:
    • Scraping publicly available web data (copyright and ToS issues, but diffuse and hard to enforce), and
    • Systematically using a paid API in violation of explicit terms to distill a competing model.
  • However, OpenAI’s own fair‑use arguments in the New York Times case (“public data is fair game”) undercut a hard IP stance against DeepSeek.
  • Enforcement is questioned: DeepSeek is Chinese, models are mirrored globally, LLM outputs aren’t copyrightable in the US, and remedies beyond cutting API access seem unclear.

How DeepSeek could have used OpenAI

  • Two main theories:
    • Straightforward API distillation: pay for access, generate large reasoning datasets, then train cheaper models.
    • Indirect ingestion: public datasets of ChatGPT conversations (e.g. ShareGPT) or third‑party services that already distilled OpenAI models.
  • Some are skeptical OpenAI has strong evidence beyond “suspicious” traffic; others note repeated instances of models calling themselves “ChatGPT” as suggestive but not conclusive.

Technical significance and skepticism

  • DeepSeek’s contributions seen as:
    • Massive efficiency gains (Mixture‑of‑Experts, compressed KV cache, cheaper RL reasoning layer),
    • A strong open‑weights reasoning model (R1) that is competitive with frontier systems on many tasks.
  • Pushback: $5–6M was only the final run, not full R&D; quality is uneven in some domains; and if much of the “reasoning” is derived from o1/4o, the breakthrough is partly piggybacking on earlier expensive work.

Economic and competitive implications

  • If a frontier model can be approximated via API‑driven distillation and clever training, OpenAI’s “compute moat” shrinks dramatically.
  • That implies:
    • Lower sustainable prices and margins,
    • More competition from smaller labs and open‑weights models,
    • Pressure on Nvidia’s “sell shovels in a gold rush” narrative, even if GPU demand remains high.

Geopolitics, bans, and “national security”

  • Many expect US policymakers and incumbents to frame DeepSeek as a security and IP threat and push for restrictions, TikTok‑style.
  • Others argue bans would mostly hurt US competitiveness while the rest of the world adopts cheap Chinese or open‑weights AI.

Microsoft Probing If DeepSeek-Linked Group Improperly Obtained OpenAI Data

Perceived Hypocrisy and Irony

  • Many see Microsoft/OpenAI’s stance as blatantly hypocritical: mass-scraping the public web (often against sites’ ToS) is framed as “innovation,” but training on OpenAI outputs is suddenly “improper.”
  • Commenters note OpenAI’s own argument that AI outputs aren’t copyrightable; trying to retroactively treat them as protected IP is viewed as “having it both ways.”
  • The language of “exfiltration” from a paid API is mocked as scare-terminology for “using the service at scale.”

Law, ToS, and Enforcement Limits

  • Distinction drawn between copyright (weak for AI outputs) and contract/ToS violations (potential civil breach, not crime).
  • Debate on whether website ToS bind scrapers who never explicitly agreed; some argue OpenAI itself is only constrained by copyright, not third‑party ToS.
  • People doubt any meaningful legal remedy against a Chinese company, especially when model weights are openly released; at best, the US could try to restrict DeepSeek services or US‑based hosts.

US–China Politics and Monopolies

  • Thread ties this strongly to US–China tech rivalry: an American “pro‑business” (really pro‑monopoly) administration is expected to weaponize regulation against a cheaper Chinese competitor.
  • Some predict export controls, app‑store bans, tariffs, or KYC rules aimed at “frontier models” benefiting China.
  • Others argue such policies backfire long‑term, pushing China to self-sufficiency in GPUs and AI.

Distillation, Training Data, and Model Identity

  • General consensus that distilling from another model’s outputs is technically standard and likely legal fair use, aside from ToS.
  • People note vast public ChatGPT transcript datasets (e.g., ShareGPT) already contaminating training data.
  • DeepSeek and other models sometimes claim to be “ChatGPT”; many attribute this to dataset contamination and weak self‑identity rather than direct weight theft.
  • A minority speculates about more serious data access (internal OpenAI logs, labeled datasets) but flags this as unproven.

Market Dynamics and Microsoft/OpenAI Strategy

  • Deep skepticism that Microsoft/OpenAI have any real moat if another lab can match performance cheaply.
  • Some see this probe as an attempt to create legal uncertainty and scare enterprises away from using DeepSeek, rather than out‑competing on quality or price.

Apple and SpaceX link up to support Starlink satellite network on iPhones

Enthusiasm and Main Use Cases

  • Many commenters see satellite connectivity as one of the only genuinely meaningful recent phone advances (alongside on-device AI), especially for:
    • Backcountry and wilderness safety
    • Rural and fringe coverage gaps
    • Basic messaging when Wi‑Fi and towers are unavailable
  • Several report already using Apple/Google satellite SOS or Starlink ground service in areas with poor cell coverage, finding it reliable for texts and emergency contact.

Limits of Current Satellite Phone Tech

  • Satellite messaging is still mostly text-only with tight capacity constraints.
  • Earlier Android-side efforts (Qualcomm/Iridium, Bullitt/Inmarsat) fizzled; dedicated Garmin inReach remains the go‑to for many outdoors users despite rising prices and “extortionate” fee structures.
  • Dedicated beacons and inReach offer advantages like automatic breadcrumb tracking and physical robustness; several would not yet trust a phone alone for life-or-death situations.

Apple, Starlink, and Globalstar Strategy

  • Some are surprised Apple works with Starlink given its existing Globalstar-based SOS “moat.”
  • Others argue Apple:
    • Avoids single-supplier dependence
    • Uses Globalstar for low‑bandwidth, emergency-first coverage
    • May turn to Starlink later for higher-bandwidth data services
  • Google/Pixel already has its own satellite SOS, showing Apple’s lead isn’t absolute.

Technical and Standards Discussion

  • Starlink Direct-to-Cell uses standard LTE/5G bands (e.g., T‑Mobile PCS spectrum) and works with unmodified phones, requiring firmware changes mainly to control behavior and avoid overloading links.
  • There is concern about interference, front-end overload, and raised noise floors; defenders point to power limits, beamforming, and regulatory approvals.
  • Non‑Terrestrial Network (NTN) standards work (3GPP releases 17–19) is ongoing; commenters debate how “ready” full 5G-from-space really is.

AST SpaceMobile vs Starlink

  • One side claims AST has a strong architectural and spectral-efficiency lead, FCC approval for testing full 5G broadband, and major carrier partnerships.
  • The opposing view highlights:
    • Missed milestones and SPAC history
    • Heavy dilution and fines/penalties from partners
    • Lack of independently verifiable, commercial-scale deployments
  • Overall, who is “ahead” remains contested and unclear.

Politics, Ethics, and Opt-Out

  • Some object to Apple partnering with a Musk-led company on ethical/political grounds and consider switching platforms; others insist on separating technology from personalities or note that alternatives also work with Starlink.
  • There are questions about how to disable satellite features; beta reports mention a carrier settings toggle, but many ask why anyone would turn off an SOS-capable link.

Libraries and Well-Being: A Case Study from The New York Public Library

Perceived Bias and Study Design

  • Several commenters note a conflict of interest: a library system “proving” libraries are good.
  • Critiques focus on methodology: surveying current patrons only (“people who enjoy libraries say they enjoy libraries”) and not measuring before/after well‑being.
  • Debate over sampling:
    • One side says to assess quality you must talk mainly to users.
    • Others argue non‑users (including informed non‑users) provide crucial data on barriers, alternatives, and dissatisfaction.
  • Some still see value in patron surveys for understanding how libraries fit into users’ lives and identifying mechanisms of impact.

Public Value and Third-Place Role

  • Multiple anecdotes: chronically underfunded libraries stepping in where schools and other services retreat (afterschool programs, ESL, resume classes, computer literacy, clothing for interviews).
  • Libraries are framed as rare non-commercial public spaces, important for democracy, free flow of information, and mental well‑being.
  • Some posters say personal or nearby branches hugely improved their quality of life; others call libraries a “secret weapon” for intellectual growth.

Homelessness, Safety, and Mission Creep

  • Many urban libraries are described as de facto homeless day shelters, with staff spending substantial time managing homeless, mentally ill, and drug‑addicted patrons.
  • Some see this as inappropriate and inefficient: libraries becoming “anachronisms” or social-service overflow rather than book-centric institutions.
  • Counterarguments: homeless people are still members of the public; libraries are among the last places they’re welcome, and eliminating libraries to address discomfort is rejected.

Funding, Efficiency, and Public vs Commercial Models

  • Discussion of why commercial libraries are rare in some US cities vs common in parts of India/Asia (costs, public competition).
  • Hypothetical for‑profit library models (membership tiers, ad-supported apps, data sale, pay‑to‑skip queues) are widely viewed as dystopian.
  • Some advocate donation- or membership-funded non-profits; opponents highlight equity concerns, cyclic funding, and the fact that heavy users are often those least able to pay.
  • Several note library spending is a small slice of local budgets; others insist even small programs must justify costs and not be treated as “sacred.”

Physical vs Digital and the Decline of Stacks

  • Reports from universities: physical collections moved off‑campus, downsized, or reduced to décor; emphasis on e‑books and study space; librarians losing tenure.
  • Commenters lament loss of rare materials and community borrowing, and the erosion of slow, deep research practices.
  • Generational contrast: younger users assume information is instantly available via search; older researchers stress value in browsing shelves, microfiche, and obscure reports.

Serendipity, New Services, and Practical Frictions

  • Many miss the serendipity of physical browsing in stacks, bookstores, and record shops; online discovery feels narrower and more self-reinforcing.
  • Positive examples: makerspaces, recording rooms, extensive manga collections, “library of things,” and board games expand relevance beyond books.
  • Practical complaints: limited hours (especially evenings and weekends) and lack of private or call-friendly spaces make coffee shops more usable for remote work.
  • A recurring joke thread riffs on initially misreading the title as about software libraries and dependencies.

Goodbye, Slopify

Tech naming and branding jokes

  • Many initially misread “Slopify” as mocking Shopify, not Spotify, leading into jokes about overused suffixes (-ify, -ly, -r, -ai) and domain scarcity (“getX.com”).
  • Nostalgia for the “Flickr/Tumblr” disemvoweled naming era; some mock current “SomethingAI” names as quickly-dating fads.

AI-generated music and Spotify’s incentives

  • Multiple comments allege Spotify promotes cheap “Perfect Fit Content,” including AI or low-paid session “slop,” to reduce royalty payouts; links shared to reporting on ghost/commissioned tracks and “fake artists.”
  • Some believe much of this is commissioned or third‑party, others think Spotify likely avoids generating it in-house but still benefits from it.
  • Users complain that unlabeled AI or ghost content pollutes mood/ambient playlists and undermines trust.

UI, product direction, and “enshittification”

  • Heavy criticism of the client: shifting layouts, accidental taps, constant A/B tests, degraded playlist/library management, and intrusive podcast/audiobook/course promotion.
  • Anger at removal or hobbling of third‑party APIs/clients (libspotify, DJ integrations), seen as a way to force use of the official, growth-optimized app.
  • Some recount quitting over autoplay bugs, forced DJ feature, and inability to hide sections or disable personalization.

Artist economics and platform power

  • Spotify is portrayed as fundamentally exploitative: low royalties, demonetizing under‑1,000‑stream tracks, bundling music with other media to push down music rates, and using platform-controlled playlists to steer listening.
  • Others counter that all major streamers pay similar pro‑rata rates and that mega‑stars structurally capture most revenue.

Discovery quality and algorithm changes

  • Many say Discover Weekly, Radios, and once-great genre/mood playlists have worsened or become hyper‑personalized “bubbles” that recycle old favorites and label-promoted tracks.
  • Complaints that shared playlists and radios now differ per user, undermining shared experiences and discovery.
  • A minority report that Spotify’s recommendations and DJ still work very well for them.

Alternatives and personal libraries

  • Suggested exits: Tidal, Qobuz, Deezer, Apple Music, YouTube Music, Pandora, Idagio, SoundCloud, Bandcamp, Hangout.fm, plus self‑hosted stacks (Beets + Navidrome/Jellyfin/Plex + local players).
  • Tools for migration and ownership: Soulseek, CDs/FLAC, Bandcamp purchases, playlist export tools, ListenBrainz, RateYourMusic/Sonemic, home servers, and refurbished/modern MP3 players.
  • Several describe deliberately returning to album-based listening and owning files to escape algorithmic slop.

Attitudes toward AI music itself

  • A sizable group “cannot stand” AI music and wants platform-level filters, watermarking, and clear labeling.
  • Others enjoy specific AI tracks, see it as just another production tool, or care only that music is good and non‑plagiarized.
  • Some foresee broader “AI slop” in podcasts and other media.

Why Spotify persists and disagreement on severity

  • One side sees Spotify as a “miracle” given cross‑platform access and huge catalogs; they mostly ignore recommendations and are content.
  • Critics argue licensing moats and label alliances block real competition, allowing long‑term “enshittification.”
  • Several note that the thread’s negativity may be skewed by HN’s technical, power‑user demographic.

Deferred resignation email to federal employees

Email authenticity and abuse concerns

  • Commenters predict waves of spoofed “resign” emails and responses, and doubt OPM has any robust plan to distinguish real from fake.
  • Some liken this to harassment tactics used by abusive partners.
  • Others note impersonating federal employees is a crime, but there’s skepticism it would ever be enforced against email pranksters.

Loyalty, merit, and civil service norms

  • The memo’s emphasis on “loyal, trustworthy” employees is widely read as ideological loyalty rather than professional merit.
  • Critics argue this reverses a 140-year tradition of politically neutral, merit-based civil service and edges back toward a “spoils system.”
  • Defenders highlight accompanying “performance culture” language, but others note job performance is overshadowed by vague “other misconduct” wording seen as a threat to dissenters.

Job security, working conditions, and incentives

  • Several note federal pay is generally lower than private sector and fear job security will now be worse than typical U.S. at‑will employment, especially if political affiliation becomes firing criteria.
  • Some predict this will repel talent and degrade government capacity.

Economic role of government employment

  • One line of discussion: is government payroll a social welfare / economic stimulus, or just waste?
  • Some argue direct salaries inject more demand than tax cuts for higher earners; others counter that saved/invested money also re-enters the economy, sparking a debate over secondary markets and “real” production.

Details and tone of the deferred resignation program

  • Linked OPM memo says employees who accept deferred resignation should have duties reassigned and be put on paid administrative leave (effectively ~8 months of pay) before their set exit date.
  • FAQ language suggesting public-sector jobs are “lower productivity” and urging people into the private sector is seen as insulting.
  • Many note the program targets nearly all 2.2M civilian employees, with only narrow exclusions.

Comparisons to Musk / corporate takeovers

  • Multiple commenters see the email as stylistically identical to Elon Musk’s “hardcore or leave” Twitter ultimatum, including similar subject line and even typos.
  • Some frame the whole effort as running government like a PE-style hostile corporate takeover.

Democratic backsliding and authoritarian risk

  • A large subthread fears this is about enforcing personal loyalty to Trump/MAGA, not efficiency, and as one step in dismantling meaningful democracy.
  • People worry future elections may not be free or consequential if the bureaucracy, DOJ, and military are thoroughly politicized.
  • Others estimate the odds of full democratic collapse as nontrivial but not inevitable, debating whether Democrats, courts, or public mobilization could resist.

Is this “pro-democracy” or not?

  • A minority argue the opposite: that rotating out resistant bureaucrats after elections is democratic responsiveness—elections should yield visible policy shifts, like in a startup.
  • Critics respond that this collapses the distinction between loyalty to the Constitution and loyalty to a person, and ignores statutory constraints on purging disfavored employees.

Legal and constitutional issues

  • Some note federal employees enjoy statutory protections and cannot simply be made at‑will; they expect rapid legal challenges and TROs.
  • Others invoke Article II and argue Congress cannot practically bar the President from firing executive-branch personnel, predicting aggressive litigation by the administration.
  • There’s back-and-forth over Supreme Court precedent on limits to presidential removal power and how far this Court might go given political context.

Use of “loyalty lists” and distrust of motives

  • Commenters highlight earlier OPM emails soliciting tips on DEI-related staff and worry this and the resignation program are about building lists for future retaliation, not just buyouts.
  • The whole initiative is repeatedly compared to common “scam” patterns (urgent, too good to be true, odd language), feeding pervasive distrust.

Broader political tactics and mood

  • Some argue Trump-aligned Republicans first accused others (Democrats, “deep state”) of partisan abuses, then openly adopted those same tactics (e.g., demanding personal loyalty, contesting elections).
  • Several express long-term pessimism about U.S. institutional decline, media capture by the wealthy, and the absence of an effective opposition.
  • A few mention secession talk (e.g., California) as a symptom of deepening polarization, though even proponents doubt it would be smooth or realistic.

Questions censored by DeepSeek

Nature and extent of DeepSeek censorship

  • Many commenters attribute DeepSeek’s behavior to Chinese legal requirements to uphold “Core Socialist Values” and avoid politically sensitive topics (e.g., Tiananmen, Taiwan, Uyghurs).
  • Hosted DeepSeek (especially R1 671B on deepseek.com and some US-hosted APIs) often gives stock refusals or CCP‑aligned framings on such prompts, while answering similar questions about other countries.
  • Several note that the censorship can be asymmetric: detailed criticism of the US is allowed where criticism of Chinese state actions is blocked.

Hosted vs local, and model confusion

  • Strong distinction between:
    • DeepSeek-R1 671B (original reasoning model, heavily censored),
    • “R1 Zero” (earlier, reportedly less aligned),
    • Distilled models (Llama/Qwen fine‑tuned on R1 outputs) used by Ollama, Groq, etc.
  • Distilled smaller models often show much weaker or no censorship on Chinese politics, leading to conflicting anecdotes from users who think they’re “running R1 locally” when they’re actually running a distilled Llama/Qwen.
  • Some report additional bolt‑on moderation on hosted services: partial answers appear, then are wiped and replaced with a generic refusal.

Technical implementation and jailbreaks

  • Debate over whether censorship is:
    • post‑hoc filtering of outputs,
    • explicit safety fine‑tuning (RLHF),
    • or implicit via censored training data.
      Evidence suggests all three exist across different Chinese models and hosting setups.
  • Users show simple jailbreaks (e.g., leetspeak / ROT13 / alternative encodings) that bypass keyword filters and elicit detailed Tiananmen descriptions.
  • Similar multi‑layer safety stacks and browser‑side output filters are described for ChatGPT and other US models.

Comparison with Western LLMs

  • Many argue Western models also censor heavily (weapons, self‑harm, “crime stats,” group‑targeted questions, some live political scandals) but frame it as “safety” or “harm reduction.”
  • Examples show uneven treatment depending on country, religion, or person, and non‑deterministic refusals.
  • Some see Chinese censorship as more overt and state-driven; Western censorship as subtler, corporatized, and still influenced by governments and powerful individuals.

How much this matters

  • Split views:
    • Some only care about coding/technical tasks and see political censorship as irrelevant.
    • Others worry that people increasingly use LLMs instead of search, so embedded propaganda or omitted history is socially dangerous.
  • Several call for symmetric audits: similar prompt‑refusal datasets for ChatGPT, Gemini, Grok, etc., not just DeepSeek.

Instagram deals reveal Meta is offering TikTok creators as much as $300k to post

Meta’s Creator-Pay Strategy

  • Meta is offering monthly payments ($2.5k–$50k, up to ~$300k) for short‑term exclusivity of Reels content, trying to pull major TikTok creators over.
  • Some note the practical weakness of exclusivity: others can legally “react,” remix, or repost that same content on rival platforms, blunting the effect.
  • Commenters compare this to past “star poaching” efforts (Kick vs Twitch, Substack advances, Spotify–Rogan, SiriusXM–Stern, Mixer–Ninja), which can buy attention but don’t always build lasting organic culture.

Creator Incentives, Risk, and Diversification

  • Many see 3‑month exclusivity as risky: creators are urged to diversify platforms to avoid dependence on any single company.
  • Whether a deal is attractive depends on perceived viability of TikTok during the exclusivity window and the revenue they’d forgo from their main audience.
  • Some argue it’s not “free money” if it means losing exposure and income from the dominant platform.

User Perception: TikTok vs Meta vs YouTube

  • Several TikTok users reportedly “hate Meta” and distrust that Meta (and US government pressure) won’t degrade TikTok’s recommendation quality.
  • TikTok’s algorithm is widely praised as highly personalized and supportive of diverse, “authentic” content (news explainers, science, music, tutorials).
  • Reels is described as feeling manufactured and ad-heavy; Instagram’s feed is criticized for burying followed accounts under sponsored posts.
  • YouTube Shorts gets mixed reviews but some say it yields more educational content and less rage-bait than TikTok; long-form YouTube is often seen as relatively “sane.”

Legality and Antitrust

  • Multiple commenters say exclusive creator deals are clearly legal and commonplace (consultants, sports broadcast rights, exclusive hosts/streamers).
  • A minority raises potential antitrust concerns if a dominant firm uses such contracts to entrench power, but others emphasize that scrutiny would require nuanced analysis of monopoly leverage, not simple “paying to bury a competitor.”

US vs Chinese Tech and Data Politics

  • Some are uneasy about Americans flocking to Chinese apps post‑TikTok ban; others respond that many users see little moral difference between US and Chinese surveillance capitalism.
  • Younger users are portrayed as resigned to data exploitation and more angry at US government/platform control than at China’s access.
  • Long subthread debates whether the US or China is the greater authoritarian threat to ordinary users and how the TikTok ban law is structured (TikTok‑specific but extendable to other “foreign adversary controlled” apps).

Broader Creator Economy & Platform Quality

  • Several lament a “grifter economy” where low‑effort outrage and “influencer” manipulation displace substantive content.
  • Others counter that platforms like YouTube still support strong educational and science channels, though there are concerns about longer, more frequent, and increasingly AI‑generated “junk” content pushed by algorithms.
  • Some see Meta’s poaching as a symptom of lacking organic culture, versus TikTok’s strong pull without equivalent payouts.

Ask HN: Are YC startups *actually* hiring?

Overall picture

  • Commenters report both: some YC startups do hire from public postings, but many roles feel fake, stale, or impossibly selective.
  • The hiring market is described as “a mess” with automation, spam, and misaligned incentives on both sides.

Ulterior motives & fake / stale postings

  • Job ads may be used for:
    • Signaling health/prestige (“we’re growing”).
    • Building future candidate pools when no role is open.
    • Meeting formal posting requirements while an internal favorite already exists.
    • H‑1B/immigration games and general data collection.
  • Some claim many postings, including on big boards, are outright fake or created by job boards themselves.
  • Posts can remain up long after budgets or optimism have evaporated, making them effectively dead.

Applicant experiences

  • Multiple people applied to hundreds of YC / HN roles and got zero or near-zero responses, even when seemingly well-qualified.
  • BS rejection reasons (“not velocity-focused”, “not a culture fit”) and late-stage rejections fuel cynicism.
  • Some do report success via YC’s WorkAtAStartup and HN “Who’s Hiring”, though it’s seen as a pure numbers game.

Startup / hiring side perspective

  • YC startups describe:
    • Hundreds to >1000 applicants per role within days.
    • Most applications as low-effort, AI-generated, or outright fraudulent résumés.
    • Many candidates unable to pass relatively simple real-world coding screens.
  • This volume pushes teams to:
    • Brutal early culling.
    • Focus on outbound recruiting and referrals; job posts mainly serve as shareable URLs.
  • Small teams lack dedicated recruiters and can’t thoroughly screen huge inbound pools.

Referrals, selectivity, and fairness

  • Several argue most startup hires are referrals; cold applicants are the last resort.
  • Advice: don’t rely on passive applications; hustle for warm intros.
  • Critics ask why companies keep public postings if they ignore them, calling it “make-believe” that wastes applicants’ time.

Automation, AI, and spam

  • Applicants use tools to auto-apply and generate AI résumés/letters; companies use ATS and ML filters.
  • This arms race leads to:
    • Candidates stuffing keywords to please algorithms.
    • Hiring managers filtering out anything that “sounds like AI” or generic enthusiasm.
  • There’s disagreement over expecting “mission enthusiasm” vs focusing on technical competence.

Compensation & incentives

  • Some founders complain applicants “want too much money”; others note YC startups offering very low pay/equity for high-risk roles.
  • Mismatch between startup comp and big-company expectations is seen as a source of friction.

Proposed improvements

  • Ideas floated: transparency about how long roles have been open, time-to-hire stats, response SLAs, vetting of job posters, centralized candidate databases, even “name and shame” lists.
  • Skepticism exists that platforms like LinkedIn already tried this and drifted toward spam and monetization.

Windows 7 boots slower if you set a solid background color

Mouse movement and stalled Windows tasks

  • Multiple anecdotes recall Windows installers (Win95, Win2000) that would hang or go slower unless the mouse was moved or hovered over the progress bar.
  • Workarounds included scripting mouse movement via Java APIs or automation tools to get “unattended” installs to complete.
  • Similar behavior is reported for Disk Cleanup: it appears to finish but the window doesn’t close until the user interacts with it.
  • In the Windows console (CMD), heavy output can slow programs because rendering happens in the same thread; making a selection used to freeze the console, which both sped up the underlying app and also unintentionally paused batch scripts. Options like “Quick Edit” control this behavior.

The Windows 7 solid-color login delay

  • Commenters find the Microsoft article confusing: it documents how to set a solid background even though that’s what triggers the delay.
  • Clarified workaround: don’t use “solid color” mode; instead set a tiny image (e.g., 1×1 pixel) of that color as the wallpaper and tile it. Windows handles image wallpapers without the extra logon delay.
  • Another workaround involves a registry change; someone notes the delay is tied to a session component timing out and then switching sessions, though deeper details are unclear.
  • The bug was reportedly patched shortly after Windows 7’s release, so it mostly affects very early or unpatched systems.

Wallpaper habits, performance, and nostalgia

  • Many still prefer solid-color backgrounds (often black or middle gray) to avoid distraction, reduce visual clutter, and improve responsiveness over RDP/VNC.
  • Historical context: early Windows versions only supported BMP wallpapers, which consumed significant RAM; paging could cause the desktop to redraw slowly. Active Desktop introduced JPEG and HTML wallpapers but was widely remembered as slow and resource-hungry.
  • Some users still use tricks like tiled 1×1 images from the Windows 2000/XP era, originally to save memory or eke out performance on low-spec or netbook hardware.

Other platform and UX issues

  • A Linux example (Vanilla OS + Samba) shows a similar class of boot-time bug: a network service waiting 90 seconds for an interface, stalling startup.
  • Several people complain that modern Microsoft web pages hijack the browser back button and joke about overcomplicated web stacks.

New speculative attacks on Apple CPUs

How these attacks differ from Spectre/Meltdown

  • Several commenters stress these are still speculative side‑channel attacks, not “true” remote code execution: the attacker gets speculative compute on mispredicted data plus a side channel, not persistent control.
  • Others argue they are “worse” than typical Spectre variants because the gadget gets hundreds of cycles of speculative execution on attacker-chosen code and data, making exploitation easier than pure cache-probe attacks.
  • There is debate over whether calling them “the same flavor” as Spectre understates their impact, but consensus that they fit within the speculative‑execution class opened by Spectre.

Browser, Safari, and site isolation

  • A key practical issue is Safari’s lack of full site isolation: different sites (or windows opened via window.open) can share a process and even heaps, letting a malicious page speculatively read another site’s strings.
  • Chrome/Firefox are said to have much stronger site isolation (per‑site processes bridged by IPC), though the paper notes corner cases where subdomains can still share a process due to public‑suffix list quirks.
  • Multiple commenters say that if Safari had robust site isolation, the SLAP demo would essentially fail; this is highlighted as a textbook “defense‑in‑depth” lesson.

User risk and mitigations

  • For typical end‑users, some argue the real‑world risk from speculative browser attacks is “basically zero” and highly targeted; others counter that a reliable JS exploit on even a tiny fraction of machines is enough to motivate attackers.
  • On Apple devices, disabling JavaScript, using Lockdown Mode (which turns off JIT/WASM) or avoiding Safari are suggested, but Lockdown alone is reported as insufficient and all iOS browsers share WebKit.
  • On desktops, using browsers with strong site isolation and keeping OS/apps updated are the main recommended mitigations; JS-based attacks don’t cross processes.

Apple’s response and disclosure

  • Researchers disclosed SLAP in May 2024 and FLOP in September; Apple requested an extended embargo but provided no mitigation timeline, so the work went public well past a 90‑day window.
  • Commenters criticize Apple for slow response and historically unfriendly bug‑bounty behavior, though some note hardware‑level fixes and Safari refactors can reasonably take many months.
  • Apple’s public statement that the issue poses no “immediate” risk is widely seen as PR minimization, especially given working proofs of concept.

CPU design, performance, and LVPs

  • Discussion reiterates that speculative/out‑of‑order execution is central to modern performance; fully avoiding it would make CPUs many times slower.
  • Load Value Predictors (LVPs) on newer Apple chips are recognized as a particularly aggressive optimization and a new attack surface; M1 reportedly lacks LAP/LVP and is unaffected by these specific issues but vulnerable to other side channels like GoFetch.
  • Some note ARM’s fixed‑length encoding and constant pools make LVPs especially effective there; x86 might still have plenty of predictable loads but makes different trade‑offs.

Broader ecosystem and “exploit marketing”

  • Several comments lament the web’s dependence on arbitrary downloaded JavaScript, rising browser/API complexity, and the difficulty of secure in‑process sandboxes (e.g., WASM).
  • Others defend the modern “logo + domain + FAQ” style of vulnerability disclosure as necessary to reach non‑experts and drive vendors to act, continuing a trend since Heartbleed.