Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 514 of 547

Ghostty 1.0

Project scope & goals

  • New GPU-accelerated terminal emulator for macOS and Linux, written in Zig, aiming for:
    • “Platform‑native” UI (AppKit/SwiftUI on macOS, GTK4/Adwaita on Linux).
    • High performance (rendering, input latency, large scrollback handling).
    • Sensible defaults with minimal required configuration.
  • Source was private during a long beta to keep focus/polish; 1.0 is MIT-licensed and fully open.

Performance & UX

  • Many users report it feels noticeably snappier than iTerm2, Alacritty, GNOME Terminal, etc., especially:
    • Resizing, scrolling, and editing in Vim/Neovim/tmux.
    • Handling huge outputs (hundreds of thousands of lines) without lag.
  • Others see little or no benefit over existing fast terminals, or even worse performance on some setups (e.g., older GTK, certain Linux desktops, GPU/GL issues).
  • Some complain of higher CPU usage or input lag compared to lightweight terminals like xfce4-terminal or xterm.

Native UI & platforms

  • macOS users like native tabs/splits, system keybindings, Quick Look, “Quick Terminal” (quake-style dropdown), secure input, and window state restore.
  • On Linux, “native” via GTK4 is contentious:
    • Works well for users on GNOME-like environments.
    • KDE/Xfce users report clashing CSD/headerbar aesthetics and need config tweaks (gtk-titlebar = false, etc.).
  • No Windows build yet; some run it via WSLg. “Cross-platform” marketing is criticized for omitting Windows.

Config, features & missing pieces

  • Configuration is plain text key–value files; praised by some, others expect a GUI settings panel.
  • Community tools exist (web config generator). A GUI for settings is planned.
  • Features highlighted:
    • Native tabs and splits, quake-style terminal (macOS only), ligatures, Kitty graphics protocol, Kitty keyboard protocol, custom shaders, minimum-contrast settings, selection color control.
  • Notable gaps or limitations:
    • No built-in scrollback search yet (planned).
    • Quick Terminal lacks tabs and is macOS-only.
    • No bitmap font support by design; TTF “bitmap-like” workarounds are mixed in quality.
    • Some shell-integration behaviors (cursor blinking, prompt jumping) are opinionated and not yet fully configurable.

Compatibility & reliability

  • Some terminfo issues (e.g., SSH/tmux, FreeBSD, certain TUIs like lazydocker, goaccess) require TERM overrides or remote terminfo installation.
  • OpenGL 3.3 / GLES requirements break on some Linux GPUs/drivers; a few users hit crashes or warnings.
  • Others report months of stable daily use and praise the bug triage and community responsiveness.

Ecosystem & comparisons

  • Often compared to Kitty, WezTerm, Alacritty, Foot, iTerm2, Warp:
    • Seen as combining iTerm2-like mac “feel” with Alacritty/WezTerm-like speed, but fewer features than iTerm2 and less extensibility than WezTerm’s Lua config.
    • Appreciated for being fully open source with no telemetry, accounts, or AI features, unlike some commercial terminals.
  • Some question why another terminal is needed; the recurring answer is different tradeoffs: native UI, performance focus, and a particular design philosophy.

OpenAI is Visa – Buttering up the government to retain a monopoly

OpenAI’s Market Power and “Monopoly” Debate

  • Many argue OpenAI is far from a monopoly: strong competitors (large tech firms and smaller labs) exist, some models match or beat GPT on benchmarks or specific tasks.
  • Others note ChatGPT’s massive user base and brand dominance give it de facto power, even if not a legal monopoly.
  • Several commenters stress that having the best product for now is not the same as having a monopoly, and switching LLM providers is relatively easy compared with switching payment networks.

Visa Analogy and Network Effects

  • Some see the Visa comparison as about how firms entrench themselves, not a literal equivalence of market structure.
  • Posters emphasize credit card network effects: once merchants and consumers converge on Visa/Mastercard, new networks face a chicken‑and‑egg problem.
  • In contrast, LLM APIs are fungible, integration costs are modest, and firms can swap providers or run open models.

Regulation, Lobbying, and “Safety” Framing

  • A major theme: OpenAI’s advocacy for heavy “frontier AI” regulation is seen by some as self‑serving—shifting focus to speculative doomsday risks and away from concrete harms, and raising compliance costs that smaller players can’t bear.
  • Others note this plays into a broader government preference for a small number of controllable AI providers; concern is raised that future rules could effectively whitelist a few large firms.
  • There is disagreement over how much current or future US administrations will pursue strict AI regulation; policy direction is viewed as unstable and politically contingent.

Open Source and Competitive Pressure

  • Multiple comments argue open models (Llama, Qwen, Mistral, various image/video models) are 3–6 months behind at most and “good enough” for most users.
  • Some predict foundation models will become commoditized; value will shift to compute, deployment, and applications, undercutting any OpenAI moat.

Credit Cards, Exclusivity, and Merchant Impact

  • The Visa–Costco exclusivity example sparks debate:
    • One side calls it straightforwardly anti‑competitive “pay for play.”
    • Another sees it as a common form of exclusive deal, analogous to beverage, apparel, or console exclusives.
  • Discussion broadens into whether surcharging, steering, and interchange caps should be regulated, and how card systems shift costs from cardholders to cash/debit users, often hurting poorer consumers.

The Gambler Who Cracked the Horse-Racing Code (2018)

Survivorship Bias, Luck, and “Systems”

  • Some argue survivorship bias could explain apparent long-term success: among many gamblers, a few will look brilliant just by chance.
  • Others strongly reject this for someone making billions over hundreds of thousands of bets, likening that to monkeys producing Shakespeare.
  • A more nuanced view: systems can be EV-positive yet still depend on hitting key wins at the right time; even sophisticated models may have worse-than-believed expected value.

What the Horse-Racing System Really Was

  • Commenters stress the article’s “can’t lose” framing is misleading: the system was positive-expected-value, not risk-free.
  • Large numbers of losing tickets are integral to the strategy; profit comes from aggregate edge, not individual wins.
  • The operation is likened to a hedge fund exploiting pricing asymmetries, structural quirks, and market inefficiencies, especially in earlier, less-efficient eras.

Taxation, Regulation, and Jurisdictions

  • Significant advantages came from jurisdictions where gambling winnings are untaxed or effectively taxed only at the operator level.
  • Several countries have complex regulatory systems: detailed reporting, player limits, and tight control of operators, making taxation of firms easier than taxing individual bettors.

Professional and Automated Sports Betting

  • One participant describes being a professional automated bettor, placing tens of thousands of bets daily through betting exchanges’ APIs.
  • Core idea: place many small, positive-EV bets so losing days are rare and limited. Market opportunity, not capital, is the main constraint on scaling.
  • Betting exchanges differ from traditional bookies: they mainly match counterparties and rake fees, so they tolerate winners more, though high-profit accounts can face higher fees.
  • Others mention arbitrage shops and odds-comp providers; the consensus is that making money in gambling is real but industrialized and tech-heavy.

Scams, Illusions, and Education about Probability

  • Several comments discuss stage “systems” and scams that rely on partitioning large groups and only showing the winners, illustrating how people misread probability.
  • These stories are used as cautionary tales and teaching tools about randomness, selection effects, and why “someone has to win” doesn’t imply a beatable game.

Lua is so underrated

Lua as Embedded / Scripting Language

  • Widely used as an embedded scripting language in games, editors, calculators, Redis, HAProxy, Neovim, OBS, etc.
  • Praised for tiny runtime, easy C/C++ integration, and suitability for constrained environments (microcontrollers, old consoles, small binaries).
  • Several report very productive experiences building game logic, GUIs, automation, and scientific tools; quick iteration is a key benefit.
  • Others find embedding painful: stack manipulation is error‑prone, memory leaks are easy, and the API feels low‑level and “assembly‑like” unless wrapped.

Language Design & Ergonomics

  • Fans like the small, orthogonal core: tables + closures + coroutines; easy to make DSLs and custom OO patterns.
  • Common complaints:
    • 1‑based indexing; nil‑terminated “arrays”; tables conflating arrays, maps, and objects; footguns with nil and #.
    • Globals by default; lack of continue, switch, structured error handling (try/catch); minimal standard library.
  • Some see this minimalism as elegant and empowering; others see it as “hostile” and requiring each project to reinvent basic abstractions.

Performance & Implementation

  • Vanilla Lua is generally fast for a high‑level language but slower than modern V8 in benchmarks; newer Lua versions may be slower than older ones.
  • LuaJIT is repeatedly described as extremely fast, with an exceptional FFI that makes C interop easy, but it’s less portable and not evolving quickly.
  • Several note that for embedded scripting, “fast enough” plus small footprint matters more than beating JS JITs.

Tooling, Types, and Ecosystem

  • Lack of batteries and smaller ecosystem vs Python/JS is a recurring concern.
  • LuaLS + LuaCATS annotations give LSP/type‑like support; some use TypeScript‑to‑Lua to get types and nicer tooling.
  • Dynamic typing and weak invariants are criticized; others argue tests and discipline suffice.

Alternatives and Successors

  • JavaScript (QuickJS, Duktape, XS) is frequently proposed as a better default embedded language due to ubiquity and ecosystem.
  • Luau (Roblox), Fennel, Janet, FixScript, Terra, and WebAssembly‑based plugin models are discussed as directions with better typing, performance, or ergonomics.
  • Some argue Lua is “correctly rated” or even overrated: unbeatable for embeddability, but rarely the best general‑purpose choice.

Short Message Compression Using LLMs

How the LLM-based compression works

  • The system uses a deterministic language model to predict a probability distribution over next tokens.
  • An arithmetic coder then encodes the actual next token using that distribution, achieving lossless compression.
  • When the model is very confident, few bits are needed; when it is wrong or uncertain, more bits are required.
  • This is conceptually “encoding the difference between prediction and reality,” but always reversibly.

Relation to traditional compression & information theory

  • Commenters compare this directly to arithmetic coding, Huffman coding, PAQ, and other high-order statistical models.
  • The LLM acts as a powerful adaptive probability model, analogous to traditional context models but trained with ML.
  • Debate over whether to encode token rank vs true probabilities; consensus is that using full probabilities is more efficient.
  • Some note that similar ideas already appear in top entries for text compression benchmarks and the Hutter Prize.

Lossy variants, embeddings, and generative uses

  • Several people speculate about lossy text compression: nudging text toward more probable tokens to save bits.
  • Encoder–decoder schemes that store only embeddings are suggested but reported as hard in practice; small perturbations tend to erase critical details (e.g., dates) rather than just style.
  • Analogies are made to image/video compression and to compressed “evocations” in science fiction.

Potential applications

  • Suggested domains: LoRa/Meshtastic-style low-bandwidth radios, satellite SMS/messaging, possibly Apple’s satellite iMessages.
  • Idea: heavy compute on phones or gateways, but dramatically fewer bits over extremely constrained links.
  • Some envision on-device models enabling highly compressed offline storage of reference material.

Steganography and security

  • Idea: encode secret data in choices among plausible next tokens so resulting text looks natural.
  • Discussion over whether this is steganography or cryptography; consensus is that it functions as steganography if the text appears ordinary.
  • As a lossless scheme, it is not seen as an obvious attack vector beyond possibly degrading compression ratios; correctness depends on deterministic model configuration.

Model size, performance, and benchmarks

  • The implementation uses a ~169M-parameter model; download size is about 153 MB.
  • Some criticize comparisons to brotli as unfair unless the model size is counted; others argue the model cost amortizes across many messages and is acceptable for modern phones.
  • Hutter Prize relevance is noted, but constraints on total program+data size and CPU/time make large LLMs impractical there; training-on-the-fly neural compressors exist but are very slow.

Side discussion: compressing JSON in Postgres

  • For repetitive JSONB, suggestions include: TOAST compression with modern codecs (LZ4, Zstd), gzip/zstd with seed dictionaries, and custom schemas or templating techniques inspired by log compression systems.

Ask HN: Is ChatGPT down?

Outage reports and scope

  • Many commenters report ChatGPT being down across web, desktop, and mobile for about an hour or more.
  • UI partially loads for some, but histories and responses fail.
  • Downdetector and similar services show spikes for OpenAI and other services.
  • Some note the OpenAI status page initially showed all green, later updated to acknowledge a major outage caused by an “upstream provider.”

Status pages, SLAs, and incentives

  • Strong skepticism about official status pages: often slow to reflect reality, sometimes technically inaccessible during outages.
  • Discussion that updating a status page can have contractual/SLA implications, creating incentives to delay acknowledging issues.
  • SLAs mainly refund service fees, not business losses; several point out the mismatch between tiny credits and potentially huge downtime impact.
  • Some argue this is standard for commodity services; real compensation requires expensive, negotiated contracts.

Azure / infrastructure incident

  • Multiple users observe concurrent issues on Azure, Microsoft 365, Xbox Live, and large retailers, suggesting an Azure-related problem.
  • Later, Azure’s status page cites a “power incident” in a South Central US availability zone, impacting multiple services, including OpenAI.
  • Commenters debate how power failures happen despite redundancy, sharing anecdotes of failed generators, transfer switches, flooding, fires, and maintenance lapses.
  • Language like “may experience a degraded experience” is criticized as evasive corporate/legalese.

Monitoring tools and early-warning services

  • A status-aggregation service (StatusGator) is mentioned as detecting outages minutes before official acknowledgments from OpenAI, AWS, and Azure.
  • One user describes a slightly confusing email/onboarding flow with that service.

Alternatives and over-reliance on LLMs

  • Several people temporarily switch to other models: Claude, Google Gemini, Grok 2, local models via Ollama (e.g., mistral-nemo), or API-based usage that remains functional.
  • Mixed views on Grok and Gemini: some praise capability, others worry about provider bias or ethics.
  • A few emphasize not putting “all eggs in one basket” and keeping multiple AI options.
  • Others question how developers now feel unable to work without ChatGPT, contrasting this with older workflows based on docs and Stack Overflow.
  • Some warn that heavy reliance on LLMs may erode foundational understanding; others argue it’s just another productivity tool if you can spot and correct hallucinations.

ChatGPT Pro / higher tiers

  • One detailed account argues the $200/month “Pro-Mode” is worth it for:
    • Much larger context window (e.g., 128K vs ~32K),
    • Fewer prompt limits,
    • Better handling of complex, multi-file firmware and hardware contexts.
  • Example: using Pro-Mode to analyze datasheets and code to diagnose power-draw issues, dramatically improving battery life of a product.
  • Others ask how context is practically uploaded (code, datasheets, etc.) and compare with Google’s large-context models.
  • Some skepticism remains about how well long-context models truly “use” very large inputs.

Cultural and ethical side-discussions

  • Debate over which AI providers are more “biased” or ethical (e.g., Musk’s products vs Google), including concerns about ideology in training data and corporate behavior.
  • Reflections on corporate language around outages and layoffs as shifting responsibility away from decision-makers.
  • Light humor about outages marking the end of the workday and the modern equivalent of “is the Wi-Fi down?”

A Tour of WebAuthn

Value of the write-up / learning resources

  • Many find the article unusually clear and code-focused compared to the dense, hyperlink-heavy WebAuthn specs.
  • Some report it finally helped them understand evolving standards (U2F → FIDO2 → WebAuthn → passkeys).

Complexity and usability of WebAuthn

  • Several commenters view WebAuthn/passkeys as over-complex and “enterprise-shaped,” with ease of implementation seemingly a low priority.
  • Complaints include confusing UX around registration, credential discovery, authenticatorAttachment, and inconsistent site flows.
  • There’s frustration that WebAuthn is tightly tied to browser JavaScript APIs with no simple non-browser/CLI path.

Passkeys, syncing, and user control

  • Big concern: synced, “discoverable” passkeys feel paternalistic and lock users into vendor ecosystems and paid sync services.
  • Lack of robust export/import at launch is widely seen as user-hostile; some expect eventual export but fear “approved provider” lock-in.
  • Others note local/no-sync implementations exist (e.g., password-manager-based or self-hosted vaults) and argue “you have to trust something,” though some strongly reject needing to trust any online sync.

Hardware tokens vs software and key management

  • Debate over resident (discoverable) vs non-resident credentials:
    • Non-resident hardware keys praised for phishing-resistant MFA without capacity worries.
    • Resident keys introduce storage limits and management pain (deleting individual credentials, full slots, needing multiple keys).
  • Newer hardware supports more resident keys and credential management, but UX is still considered clunky.

Security comparisons: passwords, OTP, WebAuthn

  • Some argue strong, unique passwords plus TOTP is a practical “sweet spot.”
  • Others emphasize TOTP/SMS are phishable and replayable; WebAuthn’s URL-bound, non-replayable design is seen as a major security upgrade.
  • Push-based MFA and “pick the right number” flows are criticized as vulnerable to MFA fatigue and social engineering; “type this number in” is seen as slightly better but still phishable.

Standards process, power, and attestation

  • Strong skepticism that WebAuthn/passkeys are corporate-driven and user-controlling.
  • Others counter that work happened in public (W3C lists, GitHub), though dominated by big companies.
  • Attestation is controversial:
    • Critics say it lets sites whitelist/blacklist authenticators, undermining user freedom.
    • Others claim major platform passkey implementations have effectively dropped attestation for synchronized credentials, limiting this risk, though references show attestation still exists in some non-passkey or enterprise/MDM contexts.

Implementation pitfalls and tooling

  • Noted registration edge case: credential created on client but never recorded server-side (network failure) leading to “split brain” where authenticator thinks it works but server does not. A proposed “Signals API” aims to address this; implementation status is mixed.
  • Chrome DevTools’ virtual authenticator is suggested for testing, but there’s no simple curl-style tool for WebAuthn flows.

Adoption trade-offs and user behavior

  • Some see passkeys as clear progress and already use them alongside passwords for convenience.
  • Others refuse to use services that drop passwords, or view passkeys as a “manufactured solution” that centralizes control and complicates recovery and portability.

Nikon reveals a lens that captures wide and telephoto images simultaneously

Scope and Intended Use

  • Lens is described as an industrial/automotive component, not a photographer-oriented product.
  • Target use: vehicle situational awareness / ADAS (wide view for nearby pedestrians/cyclists plus detailed view far ahead).
  • Some commenters note Nikon’s core strength is optics and see no obvious need for exotic sensors/ISPs beyond the lens design.

Lack of Images and Article Critiques

  • Multiple people note there are no sample images anywhere (even in Nikon’s press release).
  • This is viewed as suspicious or “clickbait-like,” though others assume images are embargoed until CES.
  • Some complain the linked site is ad-heavy, hard to navigate, and thin on technical detail.

Optical Design Speculation

  • Ideas floated include:
    • Variable focal length across the image plane (higher magnification at center).
    • Concentric optics: telephoto center + wide “donut” fringe.
    • Beam-splitting prisms or pick-off mirrors feeding multiple sensors.
    • Anamorphic or “reverse-corrected” / foveated projection concentrating resolution in the center.
  • Several note significant downstream processing will be needed to make the raw output useful or human-viewable.
  • Some emphasize that whatever the scheme, true single-axis alignment (no parallax) is key.

Cropping vs Telephoto and Optical Limits

  • Debate on whether telephoto is just a crop of wide-angle:
    • One side: in ideal optics, yes; perspective differences in practice come from camera distance, not focal length.
    • Others argue real lenses, f-numbers, diffraction, and distortion complicate the equivalence.
  • Related discussion on depth of field, aperture equivalence, angular resolution, and why high-megapixel sensors alone don’t replace optical magnification.

Potential Impact and Extensions

  • Some think 200+ MP sensors plus this lens could be powerful; others question processing and optical sharpness in a moving car.
  • A few see possible future smartphone applications: foveated capture, simultaneous wide/tele capture, and after-the-fact zoom.
  • Others note user downsides: larger files, storage pressure, and complexity of managing multiple versions per shot.

Overall Sentiment

  • Interest and curiosity from optics/vision-minded commenters.
  • Skepticism due to missing technical details and images; many defer judgment until CES reveals more.

The trap of "I am not an extrovert"

Critiques of the Article’s Premise

  • Many say the article misunderstands introversion/extroversion, treating them as choices or “mindsets” rather than relatively stable traits about how people recharge.
  • Strong pushback against the claim “everyone is an introvert and everyone is an extrovert” and that you should “be extrovert at work.”
  • Several see it as ableist: it assumes neurotypicality, trivializes genuine limits, and frames social difficulty as laziness or “excuses.”

Introversion, Shyness, and Social Anxiety

  • Multiple commenters distinguish:
    • Introversion: social interaction is energetically costly, even if enjoyable.
    • Shyness/social anxiety: fear of judgment or panic in social situations.
    • These can overlap but are not the same.
  • Some note they are highly social, speak publicly, or lead teams, yet are still introverts because they need extensive solitude to recover.

Neurodivergence and Masking

  • ADHD, autism, and related conditions are repeatedly mentioned as missing from the article.
  • “Masking” is described as performing socially “acceptable” behavior that doesn’t come naturally and is exhausting even if the skill level is high.
  • Several neurodivergent posters say “just practice” rhetoric feels like being told a depressed person to “just go outside,” and can worsen burnout.

Labels: Helpful vs Limiting

  • One strong thread: labels (introvert, autistic, queer, leftist, etc.) can:
    • Help people find community, tools, and explanations.
    • Also become shackles or excuses that restrict experimentation and growth.
  • People disagree on whether avoiding labels or embracing them is healthier; both benefits and risks are reported.

Social Skills, Work, and Fairness

  • Broad agreement that communication and visibility matter for careers, but disagreement on:
    • Whether everyone “must” push toward extroverted behavior.
    • How much office politics and likability overshadow raw contribution.
  • Some recommend “social gym” approaches (gradual practice); others say they tried this for years and only got more exhausted.

Context, Compatibility, and Hosts

  • Many argue energy cost depends heavily on context and who you’re with; “tribe” and fit matter more than raw introvert/extrovert labels.
  • Criticism of the article’s party anecdote: good hosts should mediate introductions or offer quiet space, not pressure or pathologize withdrawal.

Should more of us be moving to live near friends?

Value of Living Near Friends

  • Many describe strong benefits when friends live within walking distance: shared childcare, easier socializing, emotional support, and richer daily life.
  • Several examples: friends co-buying townhomes, moving into the same apartment complex, forming “tiny neighborhoods” or informal co‑housing.
  • Some see this as especially powerful for families with young kids: “it takes a village” becomes practical reality.

Making New Friends vs Moving to Old Ones

  • One camp says: don’t uproot for old friends; build a local network wherever you are. Friendships are dynamic, and people change.
  • Others argue long‑term friendships offer unique depth later in life and are worth centering major decisions around.
  • There’s debate on whether it’s realistic or wise to “pick a friend group and stick with it” versus continually “planting seeds” for new friendships.

Urban vs Suburban vs Rural

  • Big cities: praised for density, randomness, niche intellectual communities, but criticized for transience, homogeneity by class/profession, cost, and long commutes that undermine seeing friends.
  • Suburbs: often blamed for isolation and car‑dependence, yet some report highly social, kid‑friendly suburban neighborhoods with parks and transit.
  • Rural/small towns: some say they foster deeper, more diverse relationships because you must interact with whoever is around; others highlight limited opportunities or cultural mismatch.

Housing, Jobs, and Practical Constraints

  • Cost is a recurring blocker: many can’t afford to live where their friends are (Bay Area, Santa Cruz, etc.), see co‑buying as unrealistic, or must move for jobs.
  • US zoning, anti‑density politics, and weak renter protections are blamed for limiting flexible, stable housing near community.
  • Remote work is seen by some as the key enabler; others note it only applies to a minority of jobs and risks creating privileged “remote elites.”

Family vs Friends, Culture, and Life Stage

  • Some prioritize living near extended family over friends; others from toxic or mismatched families lean on “found family.”
  • Several contrast US individualism and mobility with Latin American or other cultures where staying near family and hometown is more normal and less stigmatized.
  • Many note that in midlife, kids, work, and aging parents limit how often even nearby friends can see each other, so expectations must be realistic.

Undersea power cable linking Finland and Estonia suffers damage

Attribution and Motive Debates

  • Many commenters see intentional sabotage as likely, not an accident, citing:
    • Prior confirmed cases of undersea cable damage tied to specific ships and anchor movements.
    • The owning company reportedly saying this did not look accidental.
  • Russia is frequently mentioned as the most likely culprit in context of the Ukraine war and Baltic tensions.
  • A specific suspect ship is flagged (Cook Islands, owner in UAE), escorted by Finnish authorities; it was allegedly dragging anchor and later found missing one.
  • Some point to nearby Chinese-flagged vessels; one note says its track crossed earlier than the damage time.
  • A minority blames Western actors (e.g., CIA) or points to Nord Stream as precedent that “undersea infrastructure is now fair game.”

Technical and Operational Details

  • This is a high‑power HVDC cable (~650 MW at 450 kV, ~1450 A), implying thick conductors and insulation.
  • Commenters debate whether an anchor could physically cut such a cable without heavily damaging the ship or noticeably slowing it.
  • Some discuss the difference between power and fiber cables; earlier incidents mostly involved communications fibers.
  • Speculation appears about possible covert devices inserted during “repairs,” but this thread’s incident is clearly a power cable, not fiber.

Wider Geopolitical Context

  • Extensive argument about Russia as a “terrorist/fascist” state vs. critiques of Western policy, propaganda, and past wars.
  • Some emphasize Russian aggression (Georgia, Crimea, full‑scale Ukraine invasion) and Eastern European warnings that were ignored.
  • Others highlight Western interventions and sanctions, comparing sabotage to economic warfare and questioning double standards.
  • Debate over whether the West is “starving” Russia effectively; some say current sanctions are weak.

NATO/EU Response and Strategy

  • Suggestions include: larger Baltic naval presence, tighter monitoring, possible Baltic blockade, and using Kattegat as a controllable choke point.
  • Boarding and holding the suspect ship is cited as a concrete response and potential model for future incidents.
  • Strong disagreement over “conflict management” vs. “appeasement”:
    • One side warns that restrained responses invite escalation.
    • The other argues that avoiding direct NATO–Russia war (and nuclear risk) is paramount.

Regional Energy and Infrastructure Context

  • Noted that Baltic states plan to decouple their power grid from Russia soon, giving this incident extra significance.
  • Discussion of dense undersea cable/pipeline networks in the Baltic and the difficulty of protecting them despite existing radar and underwater surveillance.
  • Linked mention of NATO work on orbital backup for critical communications if undersea cables are disrupted.

A Minecraft server written in COBOL

Overall reaction to the COBOL Minecraft server

  • Many commenters find the project impressive, surprising, and “awesome,” especially given it was written by someone new to COBOL.
  • Several note the code is quite readable and organized, especially compared to some modern-language projects.
  • Some see it as a fun, whimsical demonstration rather than a production-ready server.

COBOL as a language: stigma, readability, and features

  • Commenters discuss COBOL’s reputation: old, verbose, “punched card” heritage, but also very readable and business-oriented.
  • A few argue COBOL is effectively a high-level assembler, good at low-level byte manipulation, contradicting the repo’s framing that it isn’t suited for that.
  • The object-oriented features from COBOL 2002 onward are mentioned; standards exist but are only partially implemented by vendors due to weak demand and lack of modern test suites.
  • Comparisons are drawn to FORTRAN, PL/I, Ada, VHDL, SQL, and Algol-family languages, often around readability and English-like syntax.

Platforms, mainframes, and Docker

  • There is curiosity about whether the server could run on z/OS, with mentions of testing via Hercules or asking a mainframe sysprog.
  • Running it on zLinux is considered technically easier but less interesting.
  • A side thread debates Docker’s portability, with complaints about missing support on platforms like FreeBSD, Solaris, and Android, and workarounds like Podman.

Functionality and technical scope of the server

  • Readers look for redstone support and conclude it’s effectively unsupported; blocks with complex state or behavior are explicitly out of scope.
  • Lighting and full block behavior are recognized as major omitted features; implementing a complete Minecraft server is viewed as a multi‑year effort.
  • The presence of unit tests is appreciated.

COBOL jobs and legacy systems

  • The thread challenges the idea that COBOL programmers alone command high salaries.
  • Commenters argue the real scarcity is knowledge of legacy business logic and mainframe ecosystems; COBOL skills mainly provide an entry point to those domains.

Language design, simplicity, and project success

  • Some observe that many polished side projects are written in simple languages (C, COBOL), whereas modern languages (especially Rust) often appear in large but incomplete projects.
  • Theories offered:
    • Simple languages reduce cognitive load and “choice overload,” making it easier to ship messy but working prototypes.
    • Modern languages and frameworks encourage heavy abstractions, code generation, and “code that will last,” which can impede finishing hobby projects.
    • Hype attracts beginners to Rust and similar languages, leading to many ambitious but abandoned efforts.
  • Extended debate centers on Rust vs C++/C#/others in game development:
    • One side argues Rust’s focus on memory safety and strictness slows iteration and clashes with the rapid experimentation needed for games.
    • Others counter that C++’s ecosystem is also painful, and Rust’s smaller community and immature game tooling are bigger issues than the language itself.

Nostalgia and personal COBOL experiences

  • Several share memories of learning or working in COBOL decades ago, often in batch financial systems, emphasizing how readability helped with maintenance and production support.
  • Some express humorous reluctance to revisit COBOL, while still acknowledging the achievement of this project.

Minecraft hosting and cross‑play tangent

  • A sizable subthread discusses how to host Minecraft servers for kids across PC, Switch, Xbox, and mobile.
  • Key points:
    • Java and Bedrock editions are distinct and normally can’t cross‑play.
    • Official Bedrock server binaries exist for Windows and Linux.
    • Tools like Geyser/Floodgate can bridge Java and Bedrock with some feature limitations.
    • Switch/console clients are more locked down, often requiring Realms or workarounds; paid console online services are typically needed.
  • Alternatives like Minetest/Luanti are briefly mentioned as open‑source, Minecraft‑like options.

Blackcandy: Self hosted music streaming server

Overall themes

  • Thread centers less on Blackcandy itself and more on the broader landscape of self‑hosted music servers, how people assemble full stacks (server + clients + metadata tools), and why they self‑host instead of using commercial streaming services.

Why self-host music?

  • Desire to own collections rather than “rent” via Spotify/Apple Music.
  • Avoid disappearing tracks, regional restrictions, algorithmic recommendation bias, and corporate behavior seen as unethical.
  • Need support for rare material (demos, bootlegs, out‑of‑print albums) and exact releases/masters.
  • Many enjoy curating a library, doing metadata work, and treating music as a hobby.
  • Some still subscribe to streaming but use self‑hosting for gaps and long‑term control.

Blackcandy vs existing servers

  • People compare Blackcandy mostly to Navidrome, Jellyfin, Subsonic/Airsonic, Gonic, Funkwhale, Lyrion (Logitech Media Server), and Plex.
  • Interest in Blackcandy’s polished UI and custom mobile player; questions about offline downloads and CarPlay remain unclear.
  • Lack of mention of OpenSubsonic/Subsonic API support is a concern for those who rely on that ecosystem of clients.
  • Some dislike its tech stack (Ruby + Node + Docker) and prefer simpler/bare‑metal solutions.

Stacks, clients, and protocols

  • Common stacks:
    • Navidrome + Subsonic/OpenSubsonic clients (play:Sub, Symfonium, Substreamer, Amperfy, Supersonic).
    • Jellyfin + Finamp or Symfonium, sometimes plus Audiobookshelf and video via Jellyfin/Plex.
    • Gonic for directory‑based browsing and gapless playback cases.
    • Lyrion/Logitech Media Server and Squeezelite‑style players for multi‑room.
    • Icecast/mpd/Snapcast/OwnTone for radio‑like or multi‑room setups.
  • Protocols/“standards” discussed: OpenSubsonic/Subsonic, UPnP/DLNA, DAAP, AirPlay, Chromecast.
  • Many report that the weakest link tends to be clients (CarPlay, Alexa/Sonos, watch apps, gapless playback, codec support).

Metadata, organization, and discovery

  • Most servers rely heavily on file tags; users emphasize tagging with MusicBrainz tools or beets.
  • Debate over folder‑based browsing vs purely tag‑based UIs; some choose Gonic/Jellyfin specifically for directory browsing.
  • Several want better discovery on self‑hosted setups; ideas include using Discogs/MusicBrainz datasets, last.fm/ListenBrainz, or even local LLMs to build playlists.

Infrastructure and alternatives

  • Typical deployments: low‑power NAS or mini‑PCs (TrueNAS, Debian, Synology, TerraMaster), Raspberry Pis, plus Docker/Proxmox.
  • Access via Tailscale, WireGuard, Cloudflare Tunnel, or traditional reverse proxies (nginx, Traefik, Caddy) with per‑service subdomains.
  • Some argue streaming servers are overkill: they just sync the whole library to phone via Syncthing or SD cards, or use simple web playlists or network shares + VPN.

Siyuan: Privacy-first, self-hosted personal knowledge management software

Comparisons to Obsidian, Notion, and others

  • Many see SiYuan as very similar to Obsidian; some call it an Obsidian/Notion/RemNote hybrid.
  • Key perceived advantages over Obsidian: open source (AGPL), fully WYSIWYG editor, first‑class web interface, self‑hostable sync, built‑in databases and spaced repetition.
  • Obsidian is praised for:
    • “File over app” philosophy with plain Markdown vaults.
    • Strong plugin ecosystem (Dataview, spaced repetition, Excalidraw, etc.), graph view, search/navigation.
    • Flexible sync via Git, Syncthing, cloud storage; paid but optional official sync.
  • Several argue Obsidian still feels more powerful/flexible, especially via plugins, and better as a no‑code platform.

Data Format, Openness, and Lock‑in

  • SiYuan stores notes in its own JSON format (often encrypted).
  • Concerns:
    • Not plain Markdown; feels like vendor/project lock‑in vs Obsidian’s directory of Markdown files.
  • Counterpoints:
    • It’s open source; internal parsers exist and full Markdown export is supported.
    • Existing installs or Docker images can keep reading data even if development stops.

Licensing and Business Model

  • Entire codebase, including license checks for “Pro” features (e.g., some exports, self‑hosted sync), is AGPL.
  • Commenters note this makes patching out license checks legally possible, though seen by some as unethical.
  • Project maintainers confirm the intention is to sell convenience (prebuilt binaries, cloud services), not restrict freedoms.
  • Similar models are discussed (e.g., paid builds or plugins on top of GPL/LGPL projects); some doubt long‑term sustainability, others like the “pay once, lifetime” approach.

Self‑hosting, Sync, and Collaboration

  • Multiple users report stable self‑hosting via Docker and syncing across devices (including via self‑hosted S3).
  • One tradeoff vs some desktop apps: depending on setup, offline access can be weaker.
  • Multi‑user real‑time collaboration is not yet available; it appears only on the public roadmap.

UX, Features, and Scope

  • Praised as “expressive” and feature‑rich: databases/tables, flashcards, AI, advanced layout, many export formats (including Org‑mode).
  • Some find it overwhelming/noisy compared to more focused tools.
  • Others explicitly wanted a browser‑accessible, self‑hosted Notion‑like tool and say SiYuan fits that niche well.

Trust, Origin, and Transparency

  • Some express discomfort with a China‑based project or with limited information about the company.
  • Others counter that:
    • Maintainers and corporate details are easily discoverable in Chinese‑language sources (though some corporate info sites are geoblocked outside China).
    • Open source code is a stronger basis for trust than geography.

Broader Note‑Taking Philosophies and Alternatives

  • Several participants use the thread to argue for “files over apps”:
    • Plain text/Markdown or Org‑mode in directories, managed with Unix tools (git, grep, fzf, etc.).
    • Backlinks can be implemented via small helper scripts.
  • Others highlight alternative tools (Obsidian, Logseq, Trilium/TriliumNext, org‑roam, Zim, Flatnotes) and emphasize that personal workflow and comfort often matter more than any single app’s feature list.

Egui – An immediate mode GUI written in Rust

Use cases and strengths

  • Used for a wide range of tools: data viewers, scientific sims, CAD-like tools, photo/glitch art editors, plasmid editors, embedded-device configuration UIs, and game overlays.
  • Integrates with game engines (e.g., via Bevy bindings) and is seen as especially suitable for in-game/2D overlays on 3D rendering.
  • Popular for “scrappy prototypes” and small cross‑platform utilities, including browser builds via WebAssembly.
  • Many commenters report using it daily and consider it their default choice for quick, functional desktop GUIs.

Immediate‑mode model, layout, and redraw behavior

  • Core model: UI code runs each frame; widgets are rebuilt from state instead of being retained.
  • Debate over whether it “redraws everything all the time”: some say that in native setups you can tie redraws to events; others point to cases where network or other external events require manually triggering redraws.
  • Single‑pass layout works well for straightforward top‑to‑bottom, left‑to‑right layouts; more complex dependent layouts can cause mispositioning or jitter across frames.
  • Two‑phase layout is approximated by discarding a frame and recomputing, which can work but leads to edge cases like briefly displaying out‑of‑bounds values.
  • Several reports of window resizing quirks and difficulty expressing proportional layouts (e.g., 60/25/15% width splits).

Performance and platform behavior

  • Some find demos extremely snappy on mobile; others see high CPU usage even when idle, slow text input on phones, and various mobile browser errors (missing WASM, runtime panics, blank page on iOS Safari).
  • Concerns about power usage if redrawing at high FPS for non‑game apps; others argue you can and should gate redraws.

Text, internationalization, and accessibility

  • Current internationalization is limited: Arabic text becomes tofu; text shaping work is in progress via Rust bindings to HarfBuzz‑style libraries.
  • Font rendering can look blurry on low‑DPI displays; canvas/WebGL UIs lack subpixel rendering that DOM text enjoys.
  • Inability to select/copy text on mobile (and in many canvas/native UIs generally) is a major complaint, especially versus HTML’s text‑first model.
  • This also raises accessibility and automation concerns; workarounds rely on OS‑level OCR features.

Developer experience and tooling

  • Rust compile/link times can make rapid UI iteration feel slow; suggestions include faster linkers and hot‑reloading, though the latter is described as immature.
  • Version lockstep between egui, winit, wgpu, etc., causes friction when APIs break.
  • Requests for higher‑level tooling: dialog/WYSIWYG builders, global font‑size and high‑contrast options, and easier “serious”/pixel‑perfect design support.
  • Some view egui as excellent for functional UIs and prototypes but not ideal for complex, highly polished visual design.

Seconds Since the Epoch

What POSIX / Unix Time Actually Represents

  • Many assumed “Unix time = seconds since 1970-01-01 00:00:00 UTC.”
  • Commenters clarify POSIX more precisely as:
    • 86400 * (number of UTC midnights since epoch) + (seconds since last UTC midnight),
    • which ignores leap seconds by treating every UTC day as 86400 seconds.
  • Result: Unix time is effectively “seconds since epoch, minus leap seconds” and is off by ~27–29 seconds compared with true elapsed SI seconds, depending on how you count.

Leap Seconds: Behavior and Confusion

  • On positive leap seconds, many systems repeat a timestamp: e.g. ...799 → 800 → 800 → 801.
  • This means:
    • Some real instants have no POSIX timestamp (during smeared or skipped behavior).
    • Some timestamps correspond to two distinct real instants.
  • There is confusion in the thread about whether leap seconds are “real seconds,” whether they’re inserted or smeared, and how many there have been since 1970.
  • Negative leap seconds (removing a second) are theoretically possible and largely unhandled.

Monotonicity, Synchronization, and Precision

  • Unix time is not strictly increasing in UTC terms (due to repeated seconds); some argue this breaks the idea of a monotonic counter.
  • High-precision synchronization examples are discussed:
    • GNSS/GPS, GPSDOs, PTP, and WhiteRabbit (sub-nanosecond sync) vs. typical NTP (millisecond-level).
  • Others note real-world constraints: clock drift, network latency, spoofing/jamming, and the difficulty of relying on wall-clock time for distributed ordering.

Storing and Representing Time

  • Common practice: store timestamps as Unix epoch seconds (often UTC) and keep timezone separately.
  • Some argue systems should instead store TAI-like monotonic time and convert to UTC/time zones only at the edges.
  • Others warn that deviating from widely used Unix/UTC conventions is costly and most apps don’t care about ±1 second over decades.
  • Databases differ: many “timestamp with time zone” types actually store instants in UTC and discard original zone; true zone round-tripping is rare and debated.

Human vs Machine Time & Future Changes

  • Thread distinguishes:
    • Machine time: monotonic counters for intervals and ordering.
    • Human time: calendars, time zones, DST, solar alignment.
  • Future calendar arithmetic is inherently uncertain (DST and legal changes). Storing user intent (local date+time+zone) is often recommended.
  • There is an ongoing plan to abolish new leap seconds by ~2035; some see this as pragmatic, others dislike drifting away from mean solar time and argue we should then just adopt TAI explicitly.

Server-Sent Events (SSE) Are Underrated

Use cases and libraries

  • Used for streaming hypermedia UIs, chatbots/LLMs, log tailing, hot reloading, and CLI “auto-restart on config change”.
  • Several dedicated systems built around SSE: frontend frameworks, pub/sub hubs, and realtime servers that support multiple transports (SSE, HTTP streaming, WebSockets, gRPC).
  • SSE often chosen when only server→client updates are needed, especially in stacks where WebSockets are heavier to integrate.

Perceived advantages

  • Very simple to set up on the server; often “a few lines” in common web frameworks.
  • Browser EventSource API provides automatic reconnection and ID-based resumption.
  • Plays well with HTTP/2 and HTTP/3, giving efficient multiplexing and avoiding connection limits.
  • Often works better than WebSockets through corporate proxies/firewalls and some network middleboxes.
  • More bandwidth- and battery-efficient than polling, since it avoids repeated HTTP headers and connections.

Major limitations and ecosystem issues

  • On HTTP/1.1, browsers cap open SSE connections per origin (~6), causing failures with many tabs; no clean client-side way to detect hitting the limit.
  • Some corporate networks downgrade or MITM TLS and only support HTTP/1.1, breaking the “just use HTTP/2” fix.
  • Some load balancers, proxies, tunnels, and FaaS platforms buffer or time out long-lived HTTP responses, making SSE unreliable unless tuned (pings, timeouts, flush behavior).
  • No binary framing; everything is text. Newline-based framing and the data: prefix can conflict with raw text payloads, requiring encoding and robust parsers.
  • Native browser EventSource lacks Authorization header support, pushing people to polyfills or custom streaming clients.
  • Mobile/background behavior and battery cost of frequent pings are problematic and not fully resolved.

Patterns and workarounds

  • Use a single SSE connection per origin and multiplex logical channels over it.
  • Coordinate multiple tabs via BroadcastChannel or Web Locks; possibly centralize the SSE connection in a worker.
  • Some prefer generic HTTP streaming with ReadableStream and custom length-prefixed or ndjson framing over SSE’s fixed format.

SSE vs WebSockets

  • Supporters argue SSE is simpler, more compatible with existing HTTP infra, and good enough for unidirectional updates.
  • Skeptics argue WebSockets are ubiquitous, easy to constrain to one direction, and that SSE’s edge cases (infra quirks, framing, limits) reduce its appeal.

Air missile accident emerges as probable cause of Azerbaijan E190tragedy

Evidence of External Explosion and Shrapnel

  • Multiple linked cabin videos reportedly show small holes and punctures in seats, clothing, passengers, and life vests consistent with shrapnel before the crash.
  • Photos and videos of the tail section show numerous perforations; commenters say metal is bent inward, implying an explosion outside the fuselage.
  • Several participants assert that shrapnel damage is “pretty much established” from visual evidence and survivor accounts of a loud external bang.

Competing Theories on Cause

  • One line of argument: a surface-to-air missile (SAM) with a blast-fragmentation or continuous-rod warhead, likened to systems such as Buk, S‑300, S‑400, or Pantsir, based on damage patterns similar to MH17 and other known SAM strikes.
  • Counterpoint: some initially suggest an uncontained engine (turbine blade) failure could create bomb-like shrapnel, but others note certification standards and the location of damage (tail) make this unlikely.
  • Russian-linked media narratives about an internal oxygen tank explosion are mentioned and widely viewed as disinformation or at least inconsistent with visible external blast signatures.
  • Consensus in the thread: external weapon strike is more plausible, but exact weapon type remains unclear.

Flight Path, Diversions, and ATC Behavior

  • Plane was diverted from Grozny due to fog, later suffering an explosion near Grozny during multiple landing attempts.
  • Reports in the thread claim the aircraft was denied emergency landings at Grozny, Makhachkala, and Mineralnye Vody, then diverted toward Aktau (Kazakhstan), potentially while being steered largely by thrust due to hydraulic loss.
  • Dual GPS failure and regional GPS jamming are mentioned; some suggest this, plus control damage and desire to avoid mountains or further attacks, may explain the route over the Caspian. Exact decision logic is unclear.

Responsibility, Drones, and Air Defense Context

  • Many commenters think Russian air defenses likely mistook the Embraer 190 for a Ukrainian drone or small manned aircraft converted to a kamikaze drone, amid active drone attacks on Grozny and other targets.
  • Others note that Kazakhstan also has air defenses, but given the reported hit over Russia and diversion sequence, the working assumption in the thread is a Russian SAM engagement; this is acknowledged as still unproven.
  • Discussion covers transponders, ADS‑B, and military IFF, with some arguing an airliner should have been clearly identifiable, while others point to jamming, operator competence, and radar limitations.

Survivability and Crew Performance

  • Commenters are struck by the violence of the crash and the number of survivors, crediting both modern airframe design and apparent skill of the flight crew using differential thrust with degraded controls.
  • The event is compared to past partial-control disasters (e.g., UA232) where pilots were seen as heroic.

Broader Political and Moral Debate

  • Thread references a history of civilian airliner shootdowns worldwide (including by Russia/USSR and the US) and debates whether such events are “accidents” versus negligent or reckless acts.
  • Some argue Russia is repeatedly irresponsible and deceptive regarding civilian casualties; others broaden criticism to other states’ military errors.
  • There is disagreement over how the international community “should” respond; options discussed range from doing little beyond rhetoric to substantially increasing military aid to Ukraine, with strong views but no consensus.

Portspoof: Emulate a valid service on all 65535 TCP ports

How Portspoof Works

  • Listens on a single TCP port and uses iptables NAT redirection so all unbound ports (1–65535) are forwarded to it.
  • Uses getsockopt to recover the originally requested destination port and returns protocol-appropriate fake banners/responses.
  • Intention: make every port appear to run a plausible service, slowing or confusing service/version detection.

Comparison to Tarpits and Honeypots

  • Tarpit: keeps connections half-open or very slow, tying up attackers’ resources but risking local conntrack exhaustion if misconfigured.
  • Portspoof: responds quickly and closes connections, using fewer resources than a tarpit but more than simply ignoring traffic.
  • Several commenters frame it as honeypot infrastructure: fake services, logging, and possible integration with exploit frameworks to attack scanners.
  • Others warn that too many open ports can itself signal “honeypot” to more sophisticated attackers.

Security Value and Threat Models

  • Supporters: raises attacker cost and time, especially for broad “spray-and-pray” scans; good as an extra “security-through-obscurity” layer.
  • Critics: if a real vulnerable service is exposed, Portspoof does not prevent exploitation; many attackers only scan specific known ports.
  • Debate on “security through obscurity”: some say it’s acceptable as one layer (like port knocking, ASLR, or delay after bad passwords); others think it mainly attracts more traffic and scrutiny.
  • Concern that it may generate bandwidth overhead (e.g., 200MB for full nmap -sV scan) and increase bug-bounty noise and false positives.

Implementation, Risks, and Variants

  • Uses iptables REDIRECT for all TCP ports to a single listening port; seen as a neat, simple design.
  • Risk: Portspoof itself becomes a large attack surface if it parses complex inputs; suggested to run it sandboxed, in DMZ/VM, or as part of honeypot research.
  • Some suggest combining with port knocking or only emulating a subset of ports/IPs to appear more realistic.
  • Ideas to integrate with SIEM for alerts when non-existent services are probed.

Licensing and Ecosystem Discussion

  • Project is GPLv2 but also asks commercial users to “contact the author,” leading to discussion of dual licensing and GPL commercialization.
  • Commenters note GPL already permits commercial use; author likely aims to sell proprietary licenses/exceptions.
  • Related mentions: older honeypot products, tarpits like Endlessh, and analogous “noise” ideas (e.g., infinite fake email lists, HTTP endpoints that always return 200).

‘Star Trek: Discovery’ Officially Erased From Canon

Debate over Discovery’s Canon Status

  • Many commenters call the article “clickbait” and say Discovery has not been erased from canon: it’s still streamable, has Blu-rays and merchandise, and is treated as part of the franchise.
  • Others want it gone and speak as if it has been “flushed” or “deleted,” but this is presented more as wishful thinking or headcanon.
  • Wikipedia and general practice are cited: all live‑action Trek plus Lower Decks/Prodigy are considered canon unless explicitly contradicted.

Canon, Continuity, and Corporate Control

  • Several argue “canon” in fiction is overblown, a holdover from religious concepts and now mainly a tool of copyright holders to define which stories are “valid.”
  • Counterpoint: canon is a practical tool for internal consistency, worldbuilding, and shared storytelling across decades and teams.
  • Some stress that canon decisions come from corporations, not original creators, using Star Wars’ “Legends” reclassification as an example.

Lower Decks, Multiverse, and Logic

  • Lower Decks shows Discovery-style Klingons in an alternate universe.
  • One side claims this supports a “Discovery is alternate timeline” theory; others argue it only proves those Klingons exist somewhere, not that Discovery is excluded from the prime universe.
  • Some highlight that Strange New Worlds spins out of Discovery and has a crossover with Lower Decks, complicating any clean “non-canon” or “other universe” claim.
  • Overall consensus: LD episode is playful fan service, not decisive canon surgery; whether timelines differ remains unclear.

Quality of Discovery and Other Trek

  • Discovery is widely criticized as poorly written, with unlikable characters and “cringe” moments, though a few seasons or arcs (e.g., S3, Jason Isaacs’ captain, some secondary characters) get praise.
  • Some argue that because Discovery made money and had fans, no rational executive would erase it purely for canon purity.
  • Other series: Lower Decks and Strange New Worlds are often praised as understanding “true Trek”; Picard is mixed (S3 liked, S2 widely panned); Voyager and Enterprise receive retrospective reevaluations, often improved by comparison to newer shows.

Fandom, Attachment, and “Woke” Debates

  • Several comments critique how deeply fans tie identity to franchises and canon, seeing them as “captured” by corporate IP.
  • Others defend caring about continuity as caring about good storytelling.
  • “Woke” discourse around Trek is mocked as inconsistent and subjective.