Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 504 of 546

Ask HN: Spending Tracking Tools

Manual and Spreadsheet-Based Tracking

  • Many prefer spreadsheets (or simple custom apps mimicking them) for maximum control, privacy, and flexibility.
  • Manual entry is seen as a feature: it adds friction, increases awareness, and curbs impulsive spending.
  • Common patterns:
    • Export CSVs from banks, then categorize and pivot in Excel/Sheets.
    • Daily or weekly manual entry and review, sometimes shared with a partner.
    • Cronjobs or scripts to generate reports or trigger email/SMS/Telegram/ntfy notifications.

Envelope / Zero-Based Budgeting Tools

  • YNAB is widely praised for changing spending habits and stress levels, especially via its rules and envelope approach.
  • Some still use older non-cloud versions or self-hostable clones like Actual Budget and other YNAB-like apps (e.g., Buckets, Moneywell).
  • Critiques: learning curve, subscription cost, and lack of certain features for some workflows.

Mint Replacements and Aggregator Apps

  • After Mint shut down, users migrated to Monarch, Copilot, Quicken Simplifi, LunchMoney, Tiller, and Quicken for Mac.
  • Monarch and Copilot are viewed as solid Mint-like aggregators; some highlight Copilot’s strong UI and subscription handling.
  • LunchMoney is praised for rules, multi-currency, API, and responsive development, but lacks native mobile apps for some; bank coverage can be an issue.
  • Tiller bridges automation with spreadsheets by feeding data into Sheets/Excel.

Plaintext / FOSS Accounting

  • Plaintext accounting (hledger, ledger-cli, beancount, etc.) attracts users who value files over apps, double-entry rigor, and powerful reporting.
  • Challenges include file organization and naming consistency.
  • GnuCash looks powerful but is reported as daunting or confusing by some.

Privacy, Integrations, and Plaid

  • Some avoid aggregators entirely due to distrust of Plaid/Yodlee-style access, preferring CSV exports.
  • Others note integrations are improving when banks support OAuth or read-only access, but many banks still require full credentials.

Categorization, Granularity, and Automation

  • Categorizing transactions is seen as the most tedious part; current tools use heuristics, not LLMs (with a few experiments mentioned).
  • Many want finer-grained insight (e.g., item-level breakdown of Amazon/costco receipts via OCR and linkage to transactions), which participants say doesn’t really exist yet for consumers.

Budgeting Philosophy and Behavior

  • Some argue tracking after spending is “too late” and advocate budgeting first, allocating pay on arrival.
  • Others, especially high earners, see less need for strict budgets and focus on broad tracking or net-worth projections (Projection Lab, simple trackers).
  • Several tools and even a (now-defunct) card concept try to constrain spending in real time or signal when daily/discretionary targets are exceeded.

My Favorite Book on AI

Inevitability of AI vs. Coordination Problem

  • Original article frames advanced AI as unavoidable; several commenters dispute this, noting frontier models need vast capital, chips, and data centers and “don’t happen in a garage.”
  • Some compare it to climate change: if global coordination failed there, why assume it’s impossible but for AI?
  • Others argue AI research is now a strategic, global arms race (notably between major powers), making a pause or stop extremely hard.

Climate Change Analogy

  • Debate over whether we’re still trying to “stop” climate change or just soften impacts.
  • Some express deep pessimism about political will; others note AI’s huge energy demands might accelerate nuclear build‑out and force serious decarbonization.
  • Discussion about whether climate harm is a byproduct of energy use versus AI risk being an intrinsic goal.

Quality and Purpose of the Recommended Book

  • Many see the book as shallow pop‑sci: interesting first 10%, then repetitive, generic, and contradictory.
  • Critiques: no serious engagement with “what if this all fizzles,” weak handling of LLM hallucinations, and a heavy tilt toward insider regulatory capture and “containment.”
  • Some suspect it functions as PR for the AI industry and its corporate backers.

Author Credibility and Bias

  • Strong skepticism about the author’s technical depth; seen more as a manager/promoter than a researcher.
  • Past management issues and corporate maneuvering are raised to question motives.
  • Others counter that technical coding skill isn’t required to analyze social impact.

AI Risk, Misuse, and Governance

  • Several think nuclear war, climate collapse, or ecosystem failure are more likely existential threats than AI itself.
  • Others worry about AI lowering barriers to bio‑terror (step‑by‑step virus guides), though lab realities may still be hard.
  • Comparisons to nuclear weapons and human cloning: partial success in constraining them, but AI scales like code, not hardware, which may make containment harder.

Reading Habits and Alternatives

  • Multiple commenters say they vet non‑fiction authors (Goodreads, reviews, conflicts of interest) and largely avoid pop‑sci.
  • Alternative recommendations include technical and conceptual works (e.g., reinforcement learning textbooks, alignment and safety books) and some speculative fiction exploring AI futures.

Ads chew through half of mobile data

Site bloat and data usage

  • Many note the irony that the article complaining about ads is itself extremely heavy: tens of MB transferred for a few kilobytes of text, with numerous ad slots and trackers.
  • Some estimate that, at this rate, modest data plans would only support reading a handful of such pages per month.
  • Users report intrusive pop‑ups, product tables, auto‑playing media, and reflowing layouts that make pages hard to use, especially on mobile.

Negative externalities: cost, environment, usability

  • Ads are framed as a classic negative externality: users pay in bandwidth, battery, time, privacy, and attention, while publishers and adtech capture the revenue.
  • Environmental impact of unnecessary bandwidth is raised; blocking ads is described as a “green” action that also improves security and performance.
  • Others argue this is a minor energy use compared to video streaming and broader consumption, though some push back that environmental mitigation is “a game of pennies.”

Study quality and scope

  • Several commenters note the article is from 2016 and based on an undisclosed sample of eight “popular” news sites and an iPhone 6 profile, questioning its current relevance and rigor.

Ad blocking and technical countermeasures

  • Strong consensus that effective blocking dramatically reduces data and improves usability.
  • Techniques mentioned: browser extensions (uBlock Origin, etc.), DNS blocking (Pi‑hole, AdGuard Home, NextDNS), VPN/WireGuard tunnels to home blockers, ad‑blocking browsers (Brave, Firefox Focus), and OS‑level or app‑level blockers on mobile.
  • Debate over whether this is a sustainable “arms race” or already “good enough” for most users.
  • Some highlight that ad, tracking, and analytics traffic (including video and clever workarounds like filmstrip images) can be large and persistent.

Platforms and browser ecosystems

  • Android: Firefox with uBlock Origin is widely praised; DNS‑based blockers and rooted solutions also used.
  • iOS: content blocker APIs (e.g., AdGuard, Wipr, 1Blocker, Firefox Focus) help but are seen as weaker than full extension support; Safari is criticized for poor UX and broken autoplay controls.
  • Concerns about Chrome/Chromium’s Manifest V3 limiting powerful blockers; hope that Firefox will retain stronger APIs.

Economics and ethics of ads

  • Divided views: some say “the internet as we know it” is funded by ads and people overwhelmingly choose ad‑supported over paid options; others argue most real value comes from ad‑free or user‑funded spaces.
  • Common complaints: tracking, manipulative design, and the fact that subscriptions often don’t actually remove ads.
  • Alternative suggestions include lightweight, contextual text ads, micro‑/nano‑payments per article, or simply using fewer ad‑driven services.

Net neutrality and who pays for ad traffic

  • One line of discussion suggests ISPs should charge ad networks (or zero‑rate ad traffic for users); others warn this conflicts with net neutrality and could worsen ISP power.
  • It’s noted that ISPs and CDNs currently benefit from high traffic volumes and have little incentive to reduce ad bandwidth.

Do It in Jeans First

Overall metaphor & “toolbox fallacy”

  • Core idea: start activities with whatever you already have (“do it in jeans”), avoid paralysis from over-preparing or buying perfect gear.
  • This is framed as an instance of the “toolbox fallacy”: believing you must first assemble ideal tools instead of actually doing the thing.
  • Several comments echo similar advice for tools: buy the cheapest usable option, upgrade only what you actually use and outgrow.

Arguments for “do it in jeans first”

  • Early experiences will be imperfect regardless; the key is lowering activation energy and learning from setbacks.
  • For low-stakes, short hikes or beginner attempts (gym, climbing, skating, basic sailing), existing clothes or cheap gear are often “good enough.”
  • Over-optimization and status-driven gear culture can intimidate beginners and delay getting started.

Arguments against jeans for hiking (safety & comfort)

  • Multiple posters emphasize that jeans/cotton absorb and hold water, increasing hypothermia risk in wet, cold, or multi-day scenarios.
  • Others highlight chafing, heat, lack of mobility, and general discomfort, especially when damp or for heavy sweaters.
  • Guides describe real-world problems: cold, chafed, or angry clients whose clothing ruined trips; hence strict gear requirements.
  • Some argue safety-critical items are a poor metaphor: if a mistake can be fatal, “do it in jeans” is bad advice.

Risk perception & safety culture

  • Debate over “safety first”: some say safety is always a trade-off; others warn of overly risk-averse cultures and “safety theater.”
  • Disagreement on how likely extreme events are while hiking, and whether risks are comparable to everyday life.
  • Several stress that inexperience dramatically increases risk, especially far from help.

Clothing/material considerations & alternatives

  • Key distinction: cotton vs synthetics/wool; synthetics and merino wool stay warmer when wet and dry faster.
  • Some praise hiking pants for durability, quick-drying, stain resistance; others note microplastic concerns.
  • Suggestions include army surplus pants, athleisure/“performance denim,” running shorts (with caveats about chafing), and layering systems.

Practical heuristics

  • Start with short, nearby, lower-risk outings.
  • Basic must-haves often cited: grippy shoes, water, headlamp, maybe map/compass and extra layers.
  • Respect stricter requirements when joining guided or high-commitment trips.

In my life, I've witnessed three elite salespeople at work

Reactions to the article and writing style

  • Strongly polarized: some found it one of the best, funniest, most honest pieces they’d read; others called it overwrought, empty, or “wannabe edgy.”
  • Several noted it works more as memoir / life story than as practical sales advice.
  • A few questioned the narrator’s reliability, especially around the “No. 1 telemarketer” claim and self‑reported illegal behavior.

What counts as “elite” sales

  • Many distinguish between:
    • One‑off, high‑pressure, low‑recurrence sales (telemarketing, door‑to‑door, car lots, storm-chasing contractors).
    • Long‑cycle, relationship and domain‑heavy sales (enterprise SaaS, telecom infrastructure, consulting, specialized B2B).
  • “Elite” in the second category is described as: deep customer/industry knowledge, problem‑solving, trust building, accurate requirements gathering, and being closer to a strategist or consultant than a script‑reader.
  • Multiple anecdotes: good salespeople making engineers’ lives easier, rescuing projects, or driving decades‑long accounts.

Ethics, manipulation, and legality

  • Many see telemarketing in the article as outright fraud: skipping mandated disclosures, exploiting information asymmetry, and treating customers as marks.
  • This fuels broad cynicism: “most sales is about pushing things people don’t need,” with car dealers and realtors common examples.
  • Others push back: good sales matches real needs to good products and can be genuinely value‑creating, especially with repeat business and reputational consequences.
  • Several note that low‑recurrence, low‑diligence transactions structurally reward sleazier tactics.

Psychology: feelings, trust, and relationships

  • The article’s punchline (“it’s about how you make people feel”) gets extended:
    • Some agree and generalize it to all relationships.
    • Others argue the real core is trust; making people feel good is one route to that.
  • A number of commenters describe practical techniques: listening, mirroring cadence, affirming people’s choices, structuring interactions so that saying “yes” feels like consistency with their self‑image.

Luck, structure, and broader social critique

  • Thread frequently notes the role of timing, product fit, and macro conditions: even great salespeople can’t beat a dead market, while mediocre reps can look brilliant at a dominant vendor.
  • Several pick up on the article’s wider thesis: modern life is saturated with sales‑like behavior—ads, algorithms, “personal brands,” gig work—and economic precarity pushes everyone toward constant, sometimes demoralizing, self‑promotion.

Olympians turn to OnlyFans to fund dreams due to 'broken' finance system (2024)

Olympic athlete funding and economics

  • Many see Olympic athletes as underpaid “intense hobbyists” despite being world‑class; funding is especially poor in non‑“tier 1” TV sports.
  • Commenters highlight the IOC’s massive revenues and high executive pay versus minimal direct support for most athletes.
  • Some argue this is “system working as designed”: niche events (e.g., javelin, racewalking, fencing) draw limited commercial interest, so low pay is expected.
  • Others counter that the Olympics clearly generate billions via broadcast and sponsorship, so the issue is distribution, not demand.

OnlyFans, sex work, and morality

  • Several posters see no issue with athletes using OnlyFans or similar platforms, framing it as entrepreneurship and direct monetization of image.
  • Others view OnlyFans as “online prostitution,” harmful to youth, or indicative of low self‑worth, and are uneasy that elite sport funnels people into sex work.
  • A recurring theme: it’s socially accepted when media corporations sexualize athletes (e.g., magazines), but controversial when athletes do it directly.

Value of sport vs “useful” work

  • One camp argues athletes should accept that sport is risky, low‑ROI entertainment and choose more economically useful careers (e.g., factory work, nursing).
  • Opposing voices stress that elite sport is part of human flourishing: it inspires, builds community, and offers role models, even if not economically efficient.
  • Some compare disdain for athletes to dismissing artists or open‑source developers; they warn that the same “profit only” logic could be used against programmers and startups.

Inequality within and across sports

  • Big team sports (football/soccer, basketball, volleyball in some regions) capture most money and attention; niche Olympic sports struggle for sponsorship.
  • Even within lucrative sports (e.g., UFC, pro leagues), lower‑tier athletes often barely cover training and travel; for many, visibility mainly feeds coaching or gym businesses.

Broader system critiques: capitalism, welfare, and platforms

  • Multiple comments zoom out to criticize “late capitalism,” platformization, and value extraction by intermediaries (IOC, sponsors, media, platforms).
  • Analogies are drawn to GoFundMe for healthcare and to debates over socialized medicine and UBI: society will crowdfund or tip individuals but resists systemic fixes.
  • Some accept competition and market outcomes as appropriate; others argue public funds should better support Olympians as a source of national pride and inspiration.

A messy experiment that changed how I think about AI code analysis

Perceived Contribution of the Technique

  • Many find the core idea useful: pre-structure the codebase, add higher-level context, and then have the LLM reason about code like a more experienced reviewer.
  • Several note this mirrors how good human reviewers triage: understand architecture and impact first, then inspect details.
  • Some see it as an example of “domain-specific chain-of-thought” prompting applied to code analysis.

Prompting, Planning, and Agentic Workflows

  • Multiple commenters already ask models to “plan first, code later” and explicitly forbid code generation until an architecture or approach is agreed.
  • Existing tools (AI IDEs, coding agents, code search systems) already implement variants of:
    • Architecture discussion / project mapping
    • Context gathering via code search and call graphs
    • Multi-file editing, build/test/deploy loops

Context, Structure, and Transformer Behavior

  • Strong agreement that more and better-curated context dramatically improves LLM outputs.
  • Some push back on “context first” language, arguing transformers see the whole window at once; others respond that ordering and scaffolding still influence behavior via prompting.

Skepticism: Missing Details, Evaluation, and Hype

  • Key functions in the article (file grouping, context extraction) are omitted, leading to accusations of “jazz hands” and hidden “secret sauce.”
  • Repeated calls for:
    • Actual source code, not just narratives
    • Benchmarks on diverse, realistic codebases and PRs
    • Metrics for correctness and significance, not just impressive anecdotes
  • Several see the tone as marketing-adjacent, typical of AI-hype content.

Junior vs Senior Analogy and Anthropomorphism

  • Heated debate over the claim that juniors read code linearly; some say this matches their early experience, others call it unrealistic and condescending.
  • The text was edited mid-thread, prompting questions about narrative reliability.
  • Many dislike anthropomorphizing AI as a “senior developer,” seeing it as misleading framing.

Real-World Use of Coding Assistants

  • Some report substantial productivity gains using tools like AI IDEs and agents for:
    • Boilerplate, stories, tests, localization, and documentation
    • Large-scale but low-conceptual work across many files
  • Others emphasize that such output still needs human review and often contains duplication or suboptimal patterns.

Limits: Hallucinations, APIs, and Verification

  • Concern that the showcased example may involve hallucinated details (e.g., fabricated PR references).
  • Common frustrations:
    • Invented APIs and mixed framework versions
    • Plausible-sounding but wrong suggestions
  • Suggestions include feeding concrete API docs, using RAG, and explicitly validating how often outputs are both correct and important.

Broader Reflections

  • Disagreement over whether tech debt is mainly a coding vs management problem.
  • Meta-discussion notes strong emotional reactions: some developers feel threatened or defensive; others accuse critics of Luddism.
  • Several see this work as one early step toward “engineering practical thinking patterns” for LLM-based tools.

Human study on AI spear phishing campaigns

Perceived severity and human vulnerability

  • Commenters report frequent, often crude “CEO” and invoice scams via email and SMS, and note that non‑technical and technical people alike fall for them.
  • Many argue that anyone can be socially engineered in the right context; “grandma” is no longer a special case.
  • Some see the everyday inbox as an active “warzone” where a small mistake can cause major harm.

AI’s role in spear phishing

  • Many view AI‑generated spear phishing as a terrifying but likely already‑active threat: it automates personalization and drastically lowers cost.
  • Others note this commoditization might, paradoxically, reduce long‑term risk by flooding channels with so much junk that they become unusable or force systemic changes.
  • There is speculation about an “agent vs agent” future: attackers’ AI vs defenders’ AI triaging email and information.

Study design, metrics, and ethics

  • The study used data scraped from public profiles to personalize messages and framed them as “targeted marketing emails,” with IRB approval.
  • Several think defining “success” as merely clicking a link is weak; security‑savvy users may click in sandboxes or out of curiosity without being truly compromised.
  • Some worry about bias if participants knew they were in a study; others question whether any non‑consensual design would be ethical.

Email, OS security, and structural issues

  • Strong frustration that email security still relies on individuals not clicking links.
  • Critiques of deny‑list models (spam filters) vs trust/allow‑list models, though some argue strict whitelisting would kill the open internet.
  • Debates about desktop sandboxing, running as admin, and whether operating systems and email clients should better isolate risky actions.
  • Divided views on HTML email: some see it as unnecessary attack surface driven by marketing; others note plain text cannot prevent social engineering.

Legitimate services mimicking scams (“scamicry”)

  • Numerous anecdotes where banks, big tech, ecommerce sites, and even governments send messages that look indistinguishable from phishing: odd domains, third‑party verifiers, cryptic links, SMS fines, and callback flows.
  • This erodes trust and blurs the line between legitimate and malicious contact; users end up ignoring or auto‑filtering even important internal or security emails.

Ideas for defenses and future directions

  • Suggestions include stronger trust networks, email aliases, removing HTML, clearer “we will only contact you from X addresses” policies, and more realistic internal phishing tests (measuring more than clicks).
  • Some expect social media exposure and OSINT to keep raising risk and foresee growing reliance on AI and other tools just to assess what is real online.

Extracting AI models from mobile apps

Role of resize_to_320.tflite and basic ML details

  • Commenters note a .tflite file that only does image resizing via standard TensorFlow ops, not an “AI model” for resizing.
  • Size (~7.7 KB) implies almost no learned weights.
  • Clarifies that TensorFlow is a general compute framework; many vision models require fixed low‑resolution inputs.

Status of AI models as intellectual property

  • Strong debate over whether model weights are copyrightable or just “facts”/coefficients produced mechanically.
  • Some argue:
    • Copyright generally requires human authorship; automated weights may not qualify.
    • Weights may be better treated as trade secrets, or protected via contracts and licenses.
    • Training-set curation and model implementations are clearly copyrightable; architectures may be patentable.
  • Others counter:
    • Models are licensed (e.g., LLaMA, Stable Diffusion, banknote‑net), implying they’re treated as IP.
    • Compilations and compiled code are copyrighted even if produced by automated tools, suggesting an analogy for weights.
  • Consensus: legal status of model weights is unclear and largely untested in court.

DMCA, circumvention, and legality of extraction

  • DMCA §1201: circumventing effective access controls can be illegal even without redistribution, but only for works protected by copyright.
  • Discussion of broad interpretations (any copy‑prevention scheme) vs case law limiting DMCA to actual copyrighted works.
  • Extracting models via reverse‑engineering tools may produce illegal “circumvention tools” in some cases; legality is unsettled and jurisdiction‑dependent.

Training on copyrighted data vs claiming IP on models

  • Many criticize big AI firms for training on unlicensed copyrighted data while asserting strong IP over resulting models (“rules for thee, not for me”).
  • Disagreement over whether training is fair use:
    • Pro side: highly transformative, analogous to learning; weights are statistics over many works.
    • Con side: models can regurgitate training data, can undermine creators’ livelihoods, and scale content production massively.
  • Some say if models are protected, training on copyrighted data should not simultaneously be fair use; others separate those questions.

Model “laundering” and distillation

  • Techniques like model distillation and training on synthetic/model‑generated data are common; could be used to avoid direct copying of proprietary weights.
  • Legal treatment of such derivative models is unclear.

On‑device models, extraction risk, and DRM

  • General principle: anything shipped to a user device can be extracted with enough effort; mobile apps are not a secure place for “secret sauce”.
  • Frida is highlighted as a powerful dynamic instrumentation tool; approach extends to recovering tokenizers and pre/post‑processing by observing framework calls.
  • Ideas for protection:
    • Encrypt models for specific inference runtimes (e.g., CoreML with public/private keys).
    • Use GPU/TEE/DRM‑style secure hardware so decrypted data never leaves the device’s protected area.
  • Counterpoint: given physical access, skilled attackers can still use hardware attacks (fault injection, power analysis, etc.); any device that must run matrix multiplies on decrypted data is ultimately attackable.

Cloud vs on‑device inference

  • Hosting models remotely (e.g., via Firebase) avoids shipping them but introduces:
    • Ongoing compute costs, latency, and bandwidth use.
    • Loss of offline functionality.
  • Hybrid schemes (partial cloud, partial device) are discussed as possible but technically complex.

Use of open models in the example

  • The extracted banknote recognition model used as the demo is publicly available, trained on open data, and MIT/CDLA‑licensed; commenters see this as a safe and illustrative target.
  • Some speculate this choice avoids demonstrating the technique on truly proprietary models.

Community reception and educational value

  • Many appreciate the article as an accessible intro to Frida and mobile reverse engineering, especially for newer ML engineers or security‑curious readers.
  • Others downplay novelty but agree it effectively illustrates that “what runs on your device can be recovered.”

A story on home server security

Exposing Home Services & Databases

  • Many see exposing a database or home service directly to the internet as a basic security mistake; others think it’s an easy error for non‑experts given common guides and tooling.
  • Several argue beginner docs and “quick start” tutorials underplay security and should default to localhost binding (e.g., 127.0.0.1) and private networks.
  • Consensus: home/self‑hosted databases generally should not be internet‑reachable; if they must be, they need strong auth, hardening, and active maintenance.

Docker, Firewalls, and Footguns

  • A major theme is Docker’s default behavior: publishing a port (-p) causes Docker to manipulate iptables and expose it on all interfaces, often bypassing host firewalls/UFW in surprising ways.
  • Some view this as terrible design and a decade‑old “footgun”; others say Docker is simply doing what was explicitly requested and is well‑documented.
  • Workarounds: bind to 127.0.0.1, use internal Docker networks, disable Docker iptables management, or move to Podman/rootless containers; but these add complexity.

VPNs, Overlay Networks, and Reverse Proxies

  • Strong support for accessing home services only via VPN/overlay networks: WireGuard, Tailscale, ZeroTier, Headscale, Cloudflare Tunnels, or bastion/VPS setups.
  • Many run all internal services unexposed and reach them through VPN; some add reverse proxies (Nginx/Traefik/HAProxy) with extra auth/WAF.
  • Debate on Cloudflare/CDNs: convenient but they see all decrypted traffic; some avoid them for privacy.

Security Practices & Threat Surface

  • Repeated advice: minimize exposed ports, prefer SSH/WireGuard as the only public endpoints, disable UPnP, and avoid direct exposure of databases/Redis/etc.
  • Geo‑blocking (e.g., China/Russia, Tor exits, scanners) is suggested by some as useful defense‑in‑depth; others say it adds little since attackers can use VPNs or other regions.
  • Opinions vary on how “locked down” consumer/self‑hosted systems should be versus usability and learn‑by‑doing.

Languages, Stacks, and Responsibility

  • Side discussion: memory‑unsafe languages (C/C++) vs safer ones (Rust); some see them as a root cause of many exploits, others say most real‑world compromises here are misconfigurations.
  • Several note loss of traditional sysadmin roles and overburdened security teams, leading to configuration mistakes slipping through.

Unclear Aspects of the Incident

  • Multiple commenters note the original story never clearly explains how Postgres exposure led to code execution; possibilities raised include default/weak passwords or pre‑pwned images, but this remains unclear.

Social media distorts perceptions of norms (2024)

Impact on youth, parenting, and regulation

  • Several commenters describe limiting or banning smartphones and unmonitored internet for children, framing it as straightforward harm reduction.
  • Others argue bans (e.g., under-16 in Australia) won’t work well; kids will evade them via smaller or new platforms.
  • There’s disagreement on whether youth should be sheltered until 16 or taught to navigate online life from early childhood.
  • Some see social media as adding little societal value and support much stricter limits or outright bans.

Algorithms, extremity, and “false norms”

  • Many agree with the paper: a small number of highly extreme users post disproportionately, making fringe views appear normal.
  • Algorithms and ad-driven “attention economy” are blamed for prioritizing provocative, negative, or hostile content; moderate views are rarely visible and often punished.
  • Others note that even non‑algorithmic platforms (e.g., Mastodon) still feel highly distorted, suggesting algorithms aren’t the only cause.
  • A recurring theme: some online spaces look like they’re dominated by people with extreme or unstable behavior, not a cross-section of the public.

Norms, bubbles, and social construction

  • One camp emphasizes “false norms”: social media presents a narrow slice of opinions as if they were society-wide.
  • Another stresses that different communities naturally develop different norms; labeling them “false” shows bias toward a presumed mainstream.
  • Several participants highlight how users wrongly universalize their niche community’s norms and are shocked by offline majorities (e.g., elections, polling on a CEO assassination).

Platform differences and what counts as social media

  • Debate over whether forums like Hacker News and Reddit are “social media” or distinct from ad‑ and algorithm‑driven feeds.
  • Some argue any user‑generated, socially networked site fits; others emphasize that recommendation algorithms and engagement optimization are the key dividing line.

Political and cultural skew

  • Multiple examples: Reddit perceived as far more left-leaning than national electorates; Twitter/X shifting from one ideological echo chamber to another.
  • Commenters note how specialized communities (programming, fandoms) get pulled into culture‑war topics, crowding out their original focus.

I made $100K from a dick joke

Reactions to the business story

  • Many find the “$100K from a joke” tale entertaining and inspiring, especially as a contrast to grinding on SaaS or more traditional products.
  • Others frame it as “lottery-like” success: possible but not a generalizable path compared to building durable businesses.
  • Some see it as proof that individuals can launch physical products with minimal resources if they research, ask questions, and start quickly.

Luck vs. structure of success

  • One view: this is mostly luck and timing; like quitting a job to buy lottery tickets.
  • Counterview: the same fundamentals apply as in “serious” businesses—make something people want, price it so you can fulfill profitably, and be willing to launch before everything is perfect.
  • “Just starting” is called out repeatedly as the key lesson.

Company formation, Stripe, and regulation

  • Many argue you can initially operate as a sole proprietor (especially in the U.S.) and formalize later.
  • Others emphasize that payment processors and banks ultimately need some legally recognized entity, even if that’s a natural person.
  • Discussion of different country regimes:
    • Some EU countries require early registration; others allow micro‑businesses to operate informally below revenue thresholds.
    • Costs and complexity of LLCs/corporations vary widely (from free/cheap to more involved).
  • Several warn that obsessing over “doing it 100% properly” prevents people from ever starting; suggestion is to launch small, then pay an accountant once there’s real revenue.

Ethics of viral marketing and pranks

  • The story involves a fabricated viral post to drive sales.
  • Some see this as standard viral marketing and “no harm, no foul” if customers understand what they’re buying and receive it.
  • Others call it lying/astroturfing that erodes trust, contributes to general online dishonesty, and reinforces cynicism about marketing.
  • Broader debate on marketing:
    • Critics see it as manipulative and often deceptive.
    • Defenders argue marketing is how people learn products exist; brand advertising can signal confidence in product quality, though this is contested.

Prank products and bullying concerns

  • Thread catalogs similar anonymous “prank” services (glitter bombs, poop, potatoes, etc.).
  • Some worry these facilitate anonymous bullying and emotional harm, especially when context about the recipient is unknown.
  • Others say intent and relationship matter; among friends with shared humor it can be harmless fun.

Platform tangents: Imgur, eBay, marketplaces

  • Imgur’s current UX and swipe behavior draw criticism; some miss its old role as a simple, direct-link image host.
  • Long subthread on eBay: seller scams, buyer scams, perceived lack of recourse, and comparisons with alternatives like Amazon, Facebook Marketplace, Vinted, and niche forums.

Show HN: Struggle with CSS Flexbox? This Playground Is for You

Reception of the Flexbox Playground

  • Many find the playground fun, helpful as a visual cheatsheet, and good for quick refreshers.
  • Some prefer interactive “play” over reading/writing tutorials, so this format is appreciated.
  • Critiques: current version is seen as limited because it focuses on a few container properties and omits item-level controls like flex-basis, flex-grow, and variable item counts.

Persistent Difficulty with Flexbox

  • Several commenters say they still “don’t get” flexbox after years, especially after breaks from using it.
  • The main pain point is memorizing which property does what, particularly justify-content vs align-items, and how they flip when flex-direction changes.
  • Nesting flex containers and handling overflow inside flex layouts are recurring sources of confusion.

Common Gotchas and Practical Tips

  • min-width: auto on flex items surprises many; min-width: 0 (sometimes globally) is described as the “secret sauce” to fix overflow and text truncation issues.
  • Recommended patterns:
    • flex: 1 1 0px to fill available space.
    • flex: 0 0 auto to size to content.
  • box-sizing: border-box on everything is suggested to make flex layouts more predictable.
  • Browser dev tools (especially flex/grid visualizers and flex toggles) are heavily recommended.

Naming, Mental Models, and Spec Frustrations

  • Many blame confusing, committee-driven naming. Suggestions include renaming:
    • justify-content → “main-axis alignment”
    • align-items → “cross-axis alignment”
  • Confusion also around row vs column and their mental model (one row containing many columns, etc.).
  • Some argue that the need for so many guides and playgrounds means the spec is poorly designed.

CSS Grid, Tables, and Other Layout Approaches

  • Opinions split: some prefer flexbox for most work; others find grid (especially with template areas) more intuitive, even for “1D” layouts.
  • Grid’s fr units and mixed-unit behavior confuse some; others explain them but acknowledge the learning curve.
  • Several people still view tables as the most intuitive layout model and see modern layout systems as overcomplicated.
  • Concern that overusing flexbox and grid can lead to hard-to-read and slower layouts.

Tools, Guides, and Learning Aids

  • Popular references mentioned repeatedly:
    • Game-like trainers for flexbox and grid.
    • Visual guides and cheatsheets (especially those with diagrams and MDN links).
  • Some print these guides or bookmark them because they need them every time they work with flex or grid.

Tailwind and Utility-First CSS Debate

  • Tailwind’s renaming of flexbox utilities (justify-center, items-center) is seen by some as adding another confusing layer.
  • One side calls Tailwind a “blight” that harms maintainability and weakens the semantic link between design and code.
  • The other side argues Tailwind is self-documenting, easier to refactor (simple class search/replace), and avoids opaque, bespoke class naming.
  • There is disagreement over whether utility classes or semantic class names make intent clearer and styling safer to override.

Use of LLMs for CSS Layout

  • Multiple commenters say flexbox is exactly the kind of task where LLMs shine: you can quickly test and iterate on their output.
  • Reported workflows:
    • Paste existing HTML/CSS and describe the desired changes in alignment or behavior.
    • Provide an image or describe a target layout and ask the model to generate the CSS.
  • Some never “hand-tune” flexbox anymore, preferring to rely on LLMs, while others are curious but have not adopted this workflow yet.

Back to basics: Why we chose long-polling over websockets

SSE vs Long‑Polling

  • Several commenters ask why not use Server-Sent Events (SSE) instead of long‑polling.
  • SSE advantages cited: simple one-way streaming, works over plain HTTP, good fit for streaming updates (e.g., job monitoring).
  • Drawbacks mentioned: need separate text/event-stream handling vs application/json, some proxies/load balancers buffer or break SSE, connection limits in HTTP/1.1 (per-domain) and quirks on mobile Safari.
  • Workarounds: BroadcastChannel or SharedWorker to share a single SSE connection across tabs; using visibility APIs to close/reopen; pings and reconnection logic; domain sharding.
  • Some report SSE being flaky on mobile, leading them back to long‑polling.

WebSockets: Pros, Cons, and Complexity

  • One side argues WebSockets are conceptually simple, efficient (no per-message HTTP headers), support binary data, guarantee in-order delivery, and work well with HTTP/2 (and RFC 8441).
  • Others stress real-world complexity: reconnections, missed events, load balancing, DDoS concerns, corporate firewalls blocking the Upgrade handshake, and substantially different observability and auth patterns.
  • Some say these problems are overstated or solved by mature libraries, GraphQL subscriptions, or frameworks; others insist the operational and monitoring shift at scale is non-trivial.
  • There is mention of a patent troll targeting WebSocket use.

Long‑Polling Pros, Cons, and Design Gotchas

  • Many like long‑polling for fitting existing request/response auth, logging, and infra; easier to reason about with standard HTTP tooling; robust fallback when WS fails.
  • Critics highlight message ordering races, reconnection and timeout handling, need for sequence IDs and ACKs, and complexity that can start to resemble reimplementing TCP.
  • Timeouts across clients, proxies, web servers (e.g., aggressive keepalive limits) and CDNs must be tuned; otherwise, connections drop and messages can be lost without careful queueing and resync logic.
  • Some argue these issues exist for all streaming mechanisms (WS, SSE, long‑poll), so you need logs, retransmit queues, and resync strategies regardless.

HTTP/2, gRPC, and Alternatives

  • HTTP/2 multiplexing helps with connection limits but does not by itself provide unsolicited server‑push to pages; browser support for HTTP/2 server push is minimal.
  • gRPC over HTTP/2 enables streaming in controlled environments but is not directly usable from browsers.
  • Some note that, in practice, resource usage mostly scales with “one connection per client” regardless of transport.

Backend & DB Considerations

  • Several suggest centralizing change detection and fan-out (e.g., message brokers, Redis, Postgres LISTEN/NOTIFY) instead of having many workers/job pollers hammer the database.
  • Others caution about resource costs and queue limits for DB-based pub/sub, and about the remaining need to map backend events to the correct client connection.

Guten: A Tiny Newspaper Printer

Comparisons & Prior Art

  • Many compare Guten to the earlier “Little Printer” and note that similar receipt-style news printers have been built multiple times.
  • Several share their own related projects: daily scripts feeding receipt printers, dot-matrix “daily news,” screenless-office concepts, roll-call/task lists, and tabletop-RPG-focused thermal printer tools.
  • Some see Guten as a physical analog to devices like Tidbyt: small, ambient, configurable information surfaces.

Appeal & Use Cases

  • Strong appeal for starting the day on paper instead of a glowing screen, with some arguing screens themselves are a core tech problem.
  • Suggested uses: news digests, weather, quotes, sudoku and puzzles, recipes, to-do lists, financial summaries (yesterday’s spending), journaling stickers, and occasional “Sunday newspaper” style bundles.
  • Several want modular content selection and an API or “developer-friendly” interface; others note it’s easy to script output to commodity receipt printers.

Hardware & Implementation Ideas

  • Interest in “bring your own printer” using CUPS or ESC/POS-compatible receipt printers.
  • Alternatives proposed: impact/dot-matrix printers (including modern POS models), pen plotters, label printers, and even vintage-style teletype tape.
  • Some highlight cheap second-hand thermal and impact printers from retail/restaurant environments.

Thermal Paper: Health & Environmental Concerns

  • Multiple comments stress that common thermal paper contains BPA/BPS, described as endocrine disruptors that can transfer via skin contact.
  • Links are shared to studies and regulators; mention that some workers now wear gloves for receipts.
  • Others point out BPA-free, phenol-free, or vitamin C–based thermal papers, with EU regulations pushing away from BPA. Counterpoint: substitutes like BPS may be similarly harmful, and durability can be worse.
  • Some are uneasy enough to avoid thermal-print projects entirely; others consider occasional personal use negligible and view opposition as over-optimization.

Waste, Business Viability & Alternatives

  • Debate over wastefulness: daily disposable slips feel excessive to some, while others argue modest paper use for enjoyment is acceptable.
  • Distinction drawn between a personal hobby device and scaling a commercial product whose business model encourages ongoing paper consumption.
  • Skepticism about paying for such a device when newspapers, home/office printers, libraries, or online-only options already exist.
  • Several suggest the real value may lie in content aggregation services rather than selling proprietary hardware.

Orca that carried dead calf for weeks appears to be in mourning again

Emotional reactions to the orca story

  • Many commenters describe the orca’s behavior as tragic and heartbreaking, expressing strong empathy for the mother and her pod.
  • Some frame human impacts on Southern Resident orcas (captures, food depletion, pollution) as a moral catastrophe or “war crimes” against a highly intelligent species.
  • Others see the episode as a reminder of broader animal suffering in agriculture (e.g., dairy cows separated from calves, animals panicking before slaughter).

Anthropomorphism and animal emotions

  • Debate over whether calling this “grief” is anthropomorphism or valid inference.
  • Several argue emotions aren’t uniquely human and point to mammals, birds, rats, and cetaceans showing grief-like and play behaviors.
  • Skeptics caution that we don’t know if the orca’s experience matches human grief and warn against projecting human concepts too literally.

Nature’s cruelty vs human cruelty

  • One camp emphasizes that predation and suffering are ubiquitous in nature; humans are just another predator, sometimes less cruel (quick killing vs prolonged predation).
  • Others argue humans differ by scale, industrialization, and capacity for needless cruelty and environmental damage.
  • There is ongoing tension between “nature is already brutal” and “humans have special responsibility because we can choose differently.”

Ethics of meat, dairy, and eggs

  • Extended discussion of factory farming: cramped conditions, mass slaughter, chick culling, dairy calves removed to maximize milk yield.
  • Disagreement on whether “more humane” slaughter (Temple-Grandin-style designs) meaningfully reduces moral problems or just streamlines killing.
  • Some defend hunting as more ethical than industrial meat, especially when targeting adults without young and using quick kills.
  • Vegan/vegetarian positions:
    • Pro-vegan arguments focus on avoidable suffering, speciesism, and moral inconsistency (loving pets vs eating livestock).
    • Critics highlight remaining harms in plant agriculture, accuse some vegans of moralizing, or reject absolute claims (e.g., “no way to avoid all suffering”).
    • There is internal debate about borderline cases (backyard eggs, honey, pets).

Practicality, cost, and social norms

  • Several say full veganism feels hard: time, cooking skill, family habits, children’s preferences, and higher cost/availability of alternatives.
  • Others counter that partial steps (eating much less meat, more plant-based meals) are impactful and feasible.
  • Discussion of dairy alternatives: oat/almond/soy milks are often pricier; some blame lack of scale, others subsidies for dairy or marketing strategies.

Alternatives and future directions

  • Interest in lab-grown/cultured meat as a way to satisfy demand without animal suffering, though some think it’s far off or “gross” in current form.
  • A few propose systemic over individual solutions: targeting subsidies, industrial practices, and cultural norms rather than relying solely on personal diet choices.

Researchers design wearable tech that can sense glucose levels more accurately

Current CGMs and Quality-of-Life Tradeoffs

  • Many people with Type 1 say modern CGMs (Dexcom, Libre/Freestyle) are already life‑changing, especially in closed‑loop setups with pumps; A1c and time‑in‑range can reach near‑non‑diabetic levels.
  • Main pain points: sensor cost, adhesive/skin irritation, occasional sensor inaccuracies, variability between patches, startup delay, shower interference, “compression lows,” and latency (≈10–15 minutes).
  • Several users say the invasiveness of current CGMs is minor compared to fingersticks; for some, the adhesive is worse than the tiny filament.
  • For managing kids with T1, going from one poke every 10–15 days to zero would still be a big deal.

Accuracy, Clinical Relevance, and Overhyping

  • Thread repeatedly notes the press release overclaims relative to the paper: the research mainly demonstrates a more sensitive RF “metasurface” antenna on simple solutions, not validated human glucose readings.
  • No clear, in‑body accuracy metrics vs. gold‑standard blood tests are provided; some references to “~90%” accuracy are vague.
  • People stress that T1 use and closed‑loop dosing require high, proven accuracy; CGMs already struggle outside normal ranges.
  • Several point out that non‑invasive glucose sensing has been a “holy grail” for decades, with many failed startups and past products (e.g., GlucoWatch) and even apparent scams.

Technical Approach and Limitations

  • Device uses mm‑wave / RF “near‑field” sensing with a metasurface (array of resonant antennas) to detect changes in dielectric properties of blood correlated with glucose.
  • Experts note the basic antenna/metasurface idea is not new; the challenge is extracting a specific glucose signal from complex, noisy tissue where many factors alter dielectric properties.
  • RF‑based methods are not chemically specific to glucose, unlike some optical/IR approaches; concern that other solutes or physiological changes could confound readings.

AI / Algorithm Claims

  • Marketing language about “artificial intelligence algorithms” is widely viewed as inflated; commenters expect mostly conventional signal processing, maybe simple ML (e.g., regression, random forests).

Potential Markets and Use Cases

  • Even if not accurate enough for T1 dosing, a wrist device could be useful for:
    • Type 2/pre‑diabetes management and lifestyle feedback.
    • “Glucose‑curious” non‑diabetics, athletes, and weight‑management use.
  • Some expect strong consumer demand if integrated into mass‑market watches, though others warn this space is crowded with dubious products.

Overall Sentiment

  • Enthusiasm for the concept and for any credible non‑invasive progress.
  • Strong skepticism that this specific work is close to replacing current CGMs; calls to wait for robust, published clinical data before believing the hype.

Nearly half Dell's US workforce has rejected RTO. Rather WFH than get promoted (2024)

Promotion vs. Job Hopping

  • Many view internal promotion as a poor deal compared to job hopping: more effort and politics for smaller raises.
  • Advancement in big companies is described as rare, biased, and often rewarding compliant “visible” work over high‑quality technical work.
  • Several posters say senior IC is the “sweet spot”: good pay, autonomy, fewer politics than staff/principal or management.
  • Staff/principal often means more meetings, cross‑org politics, and “manager who codes” responsibilities without commensurate upside, especially at non‑FAANGs.
  • Financial security lets people ignore promotion games, skip political busywork, and push back on bad managers. Visa holders (H1B/L1) are highlighted as lacking this freedom.

WFH vs. RTO: Tradeoffs and Employee Calculus

  • Many would rather stay remote than chase promotion, especially when the raise is small relative to commuting cost, time loss, and higher COL near offices.
  • WFH perks: no commute, flexible handling of home tasks, ability to live in LCOL areas, less exposure to open‑plan distractions, better work–life balance.
  • Commute time is debated: some cite 2+ hours/day in practice; others point to national averages under an hour round‑trip but concede additional prep time.
  • Hybrid/RTO framed as a power move or cultural control by some; others see it as legitimate preference for in‑person collaboration, especially for leadership roles.

Management, Productivity, and Culture

  • Some argue Dell and similar policies are self‑defeating: filtering promotions by office presence can exclude top remote performers.
  • Others defend it as a transparent filter: leadership wants people committed to in‑office culture, mentoring, and face‑to‑face work; those uninterested can remain ICs or leave.
  • Remote leadership is described as “soul‑crushing”: cameras off, loss of body language, harder engagement, compounded by timezone gaps and offshore teams.
  • Counterpoint: management should adapt to new work habits rather than force RTO, and deliverables already provide accountability.

Labor Market, Offshoring, and Risk

  • Some see WFH as making employees more interchangeable with cheaper overseas labor; others note timezone, communication, and quality problems with distant teams.
  • Remote roles are now highly competitive, with thousands of applicants; easier remote hiring pre‑COVID has tightened.
  • A recurring theme: if RTO is demanded, many would rather change jobs (or remain at a comfortable level) than trade WFH for marginal promotions.

University of Alabama Engineer Pioneers New Process for Recycling Plastics

University Branding & PR Context

  • Several commenters dislike headlines that foreground institutions (or demographics) instead of the work itself.
  • Others argue affiliation is relevant: it signals who funded and organized the research, matters to academics, and is expected when a university holds patents.
  • Many note the piece is clearly a university PR release meant for marketing and “school spirit,” not independent journalism.
  • There is minor meta-discussion about editing titles on the discussion site being frowned upon.

Access to the Research

  • The main paper is paywalled; commenters share a link to the journal and suggest using Google Scholar to find preprints.
  • One person compares the new work to an older 2009 paper and wonders what is truly new, but lacks access to evaluate it.

Plastic Recycling: Systemic Failure & Policy

  • Multiple comments describe current plastic recycling as a “catastrophic failure” and often a scam/greenwashing exercise.
  • Strong emphasis on the 3R/9R hierarchy: reduction and reuse should come before recycling, which is energy-intensive and rarely complete.
  • Some say the core problem is policy: underpriced plastics, externalized cleanup costs, and governments influenced by plastics lobbying.
  • Others counter that it’s more complex: people like cheap plastics; “recycling” lowers perceived costs, and improved policy (design rules, deposits) could still help.

Collection Systems & Deposit Schemes

  • Examples from Northern Europe, Germany, Sweden, Michigan and others: deposit systems achieve high bottle return rates but don’t solve downstream processing economics.
  • Side effects noted: scavenging by poor/homeless people, cross-border deposit fraud in some regions; elsewhere, design and barcodes largely prevent this.

Landfilling, Incineration & “Fake” Recycling

  • Claims that much collected plastic is landfilled, exported (historically to China/SE Asia), or burned in waste-to-energy plants rather than truly recycled.
  • Some cities simply stockpile low-value materials like glass.
  • Single-stream collection is criticized for contamination; several believe facilities mainly skim metals and discard the rest.

Plastics Use, Oceans & Responsibility

  • Distinction drawn between essential plastics (e.g., medical, some industrial uses) and unnecessary single-use packaging.
  • Debate over the main sources of ocean plastics: consumer waste vs. fishing industry vs. exports to SE Asia; evidence and anecdotes conflict, and attribution remains unclear.
  • Moral argument over who should bear higher costs: producers vs. consumers in rich vs. poor countries; concern about “outsourcing” environmental harm.

Value of New Recycling Processes

  • Some are deeply skeptical of yet another “breakthrough” that may never scale, comparing it to cold fusion hype.
  • Others argue incremental process improvements are worthwhile while broader political and economic reforms lag.

First live birth using Fertilo procedure that matures eggs outside the body

Procedure and Medical Impact

  • Fertilo matures eggs outside the body, then uses standard IVF: eggs are removed before maturation, matured in vitro, fertilized, then embryos are transferred back; hormonal support is still required.
  • A claimed ~80% reduction in hormone injections refers to the stimulation phase; commenters note that 8–10 weeks of injections after embryo transfer still remain.
  • Some see this as a meaningful reduction in ordeal for women undergoing IVF; others think it treats symptoms of broader social problems (late motherhood, poor support) rather than causes.

Artificial Wombs and Dystopian Scenarios

  • Many comments jump from ex‑vivo egg maturation to full artificial wombs, likening them to Brave New World, Dune “axlotl tanks,” and other sci‑fi.
  • Optimists predict acceptance of artificial gestation due to pregnancy risk, pain, and desire for gender equality.
  • Skeptics say we barely understand pregnancy biology and ethics even in animals, so viable extrauterine gestation for humans is likely far off.
  • Strong dystopian fears: mass‑bred armies, children raised in barracks or sealed colonies, commodified “designer babies,” and baby markets.
  • Others counter that exploitation of children (armies, slavery) already occurs without artificial wombs; technology changes scale and convenience, not the underlying moral risk.

Child Development, Health, and Bonding

  • Concerns that fetuses learn aspects of language in utero and experience unknown developmental effects that may be hard to reproduce artificially; audio playback is suggested as a crude substitute.
  • Debate over whether such prenatal learning or “bonding” is necessary vs merely present; some call fears speculative.
  • C‑section microbiome differences and higher asthma/immune risk are cited; requests for evidence elicit links to studies, but overall impact is debated.

Reproduction Drivers and Inequality

  • Discussion on why people will have children in a future of robots and longevity: legacy, instinct, social pressure vs economic and psychological costs.
  • Noted that fertility is already sub‑replacement in many places; some expect births to become a “luxury good.”
  • Speculation that wealthy individuals could have hundreds of children if gestation is cheap; proposed policy responses include limits based on required parental time or analogies to sperm‑donor caps, but enforceability and ethics are contested.
  • Several argue that pregnancy is only part of the burden; caregiving and career penalties mean women are still disadvantaged even with better reproductive tech.

Metrics, Markets, and Social Framing

  • The phrase “nearly half of women never reaching their maternity goals” is criticized as KPI‑like; others defend treating family size as a legitimate life goal that policy and technology can support.
  • Expansion to countries like Australia, Japan, and several in Latin America is read either as targeting high‑demand markets or those with fewer regulatory/religious barriers.