Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 527 of 547

Mysterious New Jersey drone sightings prompt call for 'state of emergency'

Nature of the sightings & available evidence

  • Reports describe large “SUV‑sized” drones over NJ (and some other states), often at night, loitering for hours near military bases, ports, and infrastructure, sometimes supposedly coming from/returning to the sea.
  • Multiple commenters say the widely circulated photos and many videos look very clearly like normal commercial airliners or helicopters with standard navigation/landing lights.
  • Others in NJ insist what they saw were low, loud, highly maneuverable drones unlike planes or helicopters, but admit phone footage at night is poor.
  • Several note that judging altitude, speed, and size of a light in the sky—especially at night—is effectively impossible without instruments.

Proposed explanations

  • Benign / mundane:
    • Misidentified commercial aircraft and helicopters, amplified by media and social media.
    • Legal or semi‑legal drones: police, mapping/LIDAR, utility or logistics trials, medical flights, hobbyists, pranksters.
    • Defense‑contractor tests (e.g. large VTOL / “transwing” craft; PteroDynamics XP‑4, BlackFly, similar eVTOLs) around NJ’s dense military and research facilities.
  • More serious:
    • US black / intel programs testing swarms, counter‑drone, nuclear‑sniffer, or surveillance tech over real terrain and responses.
    • Foreign adversary ISR or “red‑team” probing of defenses; some politicians specifically blame Iran with an offshore “mothership,” which many in the thread find implausible or politically motivated.
    • A minority raise UAP / non‑human intelligence theories.

Government statements & legal context

  • Pentagon spokespeople say:
    • They are not US military drones.
    • There is no evidence they’re from a foreign entity or adversary.
    • No military installations or personnel have been threatened.
  • FBI says they have thousands of reports, describing both rotary and fixed‑wing drones, but no clear attribution.
  • Commenters point out:
    • FAA rules on drones (Remote ID, altitude limits, night ops) exist but enforcement and wide‑area tracking are weak.
    • Only federal authorities can legally disable aircraft; shooting at drones or aircraft is a serious crime and a safety risk.

Risk, response, and countermeasures

  • Many stress that drones near medevac helicopters, airports, and bases can be dangerous even if not “hostile.”
  • Others argue the US has very limited, fragmented capability to detect and neutralize small drones domestically, especially without collateral damage.
  • Proposed responses range from “just follow them home with a helicopter or jet” to electronic warfare, counter‑drones, or using the situation as a training exercise.

Mass hysteria, media, and politics

  • A large faction frames this as a classic mass psychogenic episode:
    • Trigger: a few real or misinterpreted sightings.
    • Amplifier: viral social posts, local TV, partisan talk shows, and sensational headlines.
    • Result: people start calling ordinary planes “mystery drones,” and some demand drastic measures (grounding drones, shooting objects).
  • Others counter that dismissing everything as hysteria is premature; there may be both real unusual activity and a lot of noisy misreports.
  • Several see political opportunism: using the story to attack opponents, argue for war with Iran, or push for broader anti‑drone laws and funding.

2400 phone providers may be shut down by the FCC for failing to stop robocalls

Clarifying the FCC Action

  • Thread notes the official title is about removal from the Robocall Mitigation Database (RMD), not literally “shutting down” providers, but removal effectively blocks their outbound traffic because others must refuse it.
  • Some ambiguity remains over whether inbound calls/SMS will still work, but many expect affected providers to become unusable or shut down.

Who These Providers Are

  • “Voice service providers” here are mostly small VoIP/telecom outfits, SIP trunking, virtual PBX, local ISPs, CRMs with integrated calling, etc., not the big mobile carriers.
  • Many appear tiny or defunct; some likely exist primarily to support robocallers or as thin “wrapper” companies with upstream carriers handling real infrastructure.

Pace and Adequacy of Enforcement

  • Several commenters say the FCC is moving painfully slowly: companies missed a February 2024 deadline, got a second chance in April, and only now face removal.
  • Others argue regulators intentionally move slowly and procedurally to withstand legal challenges and accusations of overreach.
  • One telecom insider claims most “real” bad actors are absent from this list and that many listed companies already implemented rate limits but simply failed paperwork.

User Experiences with Robocalls and Text Spam

  • Experiences vary widely:
    • Some report dramatic drops in robocalls, but rises in spam SMS/iMessage.
    • Others still get multiple spam calls daily, often in waves or around elections and Medicare enrollment.
    • Many see spikes tied to specific scams (Medicare, parcel delivery, “pig butchering” crypto scams, fake collections).
  • A few users report almost no spam, particularly in some European countries.

Mitigation Tactics and Technology

  • Common strategies:
    • Only answer calls from contacts; send unknown numbers to voicemail.
    • Use carrier spam labels, smartphone features (Android spam folder, iOS silence unknown callers, Visual Voicemail/ live transcription), or Pixel’s automated call screening.
    • Reply “STOP” to SMS, though there’s disagreement: some say this reliably triggers opt-out; others worry it just confirms a live number.
    • Use carrier-lookup tools to identify the originating platform (e.g., Bandwidth, Sinch) and report to them, the FCC, the FTC, and via 7726 for SMS.
  • Some complain that certain platforms (especially Bandwidth and similar API-based carriers) are lax on abuse and hide behind “nothing illegal has been said yet.”
  • Discussion of STIR/SHAKEN:
    • Technically, modern calls can carry signed tokens (similar to JWTs) to authenticate caller ID.
    • Adoption is incomplete; signatures are lost when calls traverse legacy TDM networks, weakening effectiveness.
    • End-user visibility depends on the carrier; some only expose a “verified” icon or filter, not raw data.

International Comparisons and System Design

  • Several European and Nordic commenters report far less spam, credited to stricter regulation and active enforcement.
  • Examples:
    • France recently blocked spoofing of French numbers; spam reportedly dropped sharply.
    • Nordic regulators are praised for effective anti-spoofing and complaint handling.
    • Singapore uses registered SMS identifiers; commenters suggest extending this model to voice.
  • Some see the FCC’s move as the US belatedly converging with EU-style regulation.

Trust, Phone Culture, and Generational Shifts

  • Many people across ages now ignore all unknown numbers; expectation is that serious callers will leave voicemail or text.
  • Others argue this is impractical for parents, freelancers, deliveries, and medical calls; they need to answer unknown numbers or at least review them.
  • Debate over etiquette: some consider calling without prior text increasingly rude outside work contexts; others reject this.

Impact on Legitimate Small Providers

  • Thread notes potential “collateral damage”:
    • Some listed entities only got into the RMD because of a former upstream vendor’s requirements and now rely on another vendor that handles mitigation.
    • Opinions split: some accept collateral damage as acceptable to clean up spam; others warn that casual acceptance of “collateral damage” in regulation is dangerous.
  • General sentiment: enthusiasm that the FCC is finally doing something significant, tempered by skepticism about speed, completeness, and unintended side effects.

Review of Mullvad VPN

Scope of the Audit

  • Audit covers the Mullvad VPN app/client, not the whole VPN service or server infrastructure.
  • Some note this makes the original title misleading, but still relevant since the app is the main entrypoint for users.
  • Separate infrastructure audits (by other firms) were done earlier in the year.

Key Findings in the Report

  • Issues found include: unsafe signal handling (too-small alt stack, non–async-safe functions), IP leaks via ARP, deanonymization via NAT/MTU behaviors, and a sideloading risk in the setup process.
  • Commenters view these as “straightforward” and mostly low-to-moderate risk, with sideloading called the most concerning but not standalone-exploitable.
  • Deanonymization vectors are said to apply broadly to VPNs, not just Mullvad.

Deep Dive: Signal Handling

  • Large subthread debates how hard it is to write correct POSIX signal handlers.
  • Points raised:
    • Signal handlers can interrupt code in critical sections; they must not wait on locks or shared resources.
    • Very small set of async-signal-safe operations is allowed.
    • Languages/runtimes (C, Rust, Haskell, etc.) struggle to provide safe abstractions; ideas like function “coloring”, monads, or dedicated signal threads are discussed.
  • Consensus: safe signal handling is extremely tricky; Mullvad’s issues here are understandable but real.

Threat Models and Value of Audits

  • Several comments praise this report for explicitly stating its threat model.
  • Debate over whether customer-defined scope weakens audits; counterargument is that every audit must target a defined model and constraints of time/budget.
  • Users are encouraged to compare their own threat model (e.g., unprivileged local attacker vs. admin/nation-state) to the one used in the audit.

Mullvad’s Reputation and Business Model

  • Many express strong trust in Mullvad relative to other VPNs: no-logs policy, multiple public audits, RAM-only infrastructure, simple flat pricing, and anonymous payment options (cash, crypto, Monero).
  • Others worry about the general VPN industry’s marketing and snake-oil tendencies, but often exempt Mullvad as “one of the better ones.”

Usage, Limitations, and Ecosystem Issues

  • Practical complaints:
    • Removal of port forwarding significantly hurts torrenting and private tracker seeding.
    • Planned deprecation of OpenVPN pushes some to consider other providers.
    • Mullvad endpoints often hit CAPTCHAs or blocks (especially on YouTube/Reddit), possibly because of known hosting ASNs and anti-tracking incentives.
  • VPNs seen as most valuable for ISP privacy and censorship circumvention; some argue they are over-marketed for broad “anonymity.”

FCC opens entire 6 GHz band to low power device operations

Regulatory details and power limits

  • “Very Low Power” (VLP) devices are defined for parts of 5.9–7.1 GHz with integrated antennas and no AP control requirement.
  • New rules set VLP at 14 dBm EIRP (~25 mW) with a power spectral density of –5 dBm/MHz, spread over wide channels (e.g., 80 MHz).
  • Commenters note modern regs use EIRP and spectral masks rather than raw transmitter wattage.
  • 6 GHz now has three regimes:
    • VLP: very low power, indoor/outdoor, now across full 1,200 MHz.
    • Low Power Indoor (LPI): up to 1 W for indoor APs, already across full band.
    • Standard Power (SP): up to 4 W EIRP with cloud‑based frequency coordination, only in 850 MHz subset.

Implications for Wi‑Fi and devices

  • No new 6 GHz channels for regular Wi‑Fi routers; change is only for VLP.
  • Enables more and wider (e.g., 320 MHz) channels for short‑range links like AR/VR, wearables, phone‑to‑laptop, in‑vehicle systems.
  • Some hope this will boost Bluetooth‑like and UWB‑style high‑bandwidth personal‑area links.

Propagation and range

  • 6 GHz behavior seen as similar to 5 GHz: good for line‑of‑sight, easily attenuated by walls, unsuitable for long‑range except with directional links.
  • “Fragility” is seen as a feature in dense environments because it limits interference; multiple low‑power APs per home are suggested over one high‑power unit.
  • Multi‑hop wireless backhaul adds significant latency; Ethernet to APs remains preferred for low‑latency.

Spectrum allocation context

  • 6 GHz incumbents include satellite and point‑to‑point microwave; some radar usage is mentioned.
  • Comparisons made to heavily fragmented, much narrower bands (AM/FM, TV, amateur); commenters argue those are too narrow or low‑frequency to be as useful for high‑throughput unlicensed systems.
  • Some express hope other jurisdictions mirror the FCC to enable cheaper global hardware.

Enforcement, hacking culture, and compliance

  • Debate over cranking up Wi‑Fi power:
    • One side: “real limit” is when someone complains; FCC vans respond mainly to interference reports.
    • Others emphasize lab certification, existing enforcement (pirate radio, cell jammers), and ethical responsibility to follow limits to preserve shared spectrum and avoid pushing regulators toward locked‑down firmware.

Health and biological effects

  • Consensus from several commenters: at these non‑ionizing frequencies and very low powers, main risk is tissue heating, and 25 mW is far below levels of concern.
  • Others cite papers on polarization, ion channels, TRPV1, and DNA dynamics to argue possible non‑thermal biological effects are not fully ruled out; responses range from strong skepticism to “needs more research.”
  • Overall, no agreement; thread notes that safety standards focus on heating because that’s what is well‑characterized.

Other bands and related proposals

  • Discussion of existing 5.9 GHz vehicle‑to‑vehicle (DSRC, C‑V2X) spectrum and why V2V hasn’t taken off (security, reliance on cellular gatekeepers).
  • Concern about proposals to reorganize 900 MHz, potentially displacing LoRa, RFID, tolling, and amateur uses; some see it as a corporate land‑grab, others as part of broader spectrum‑security concerns.

Beamforming and EIRP debate

  • Some argue EIRP‑based limits discourage phased arrays and spatial selectivity; they’d prefer limits on total radiated power.
  • Counterargument: EIRP is what matters for interference and safety; concentrated beams from high‑gain antennas could “blind” nearby receivers even at low total power, so EIRP limits are appropriate.

OnlyFans models are using AI impersonators to keep up with their DMs

Existing practice vs “new” AI angle

  • Many note that top OnlyFans creators have long outsourced DMs to human “chatters” or agencies, often in low‑wage countries.
  • AI is seen as simply replacing those workers: cheaper, more scalable, more consistent with the persona.
  • Several point out similar trends on YouTube, Instagram, Weibo etc., where platforms offer LLM‑generated replies and content ideas.

Fraud, disclosure, and legal risk

  • One camp argues this is clear deception: users pay for “chat with X” but get neither X nor any human, which fits common‑sense notions of fraud.
  • Others reply that the whole industry has always been illusion and performance (phone sex lines, strip clubs, influencer “community”), so AI doesn’t change the underlying ethics much.
  • There is mention of existing lawsuits over human chatters impersonating creators; some expect more class actions if AI use stays undisclosed.
  • Several propose mandatory labeling of AI‑generated interactions; skeptics note creators could just use external tools and avoid platform rules.

Parasocial relationships, loneliness, and harm

  • Strong concern that lonely, often socially isolated men are being systematically exploited through manufactured intimacy and upsell funnels.
  • Disagreement over whether this “sedates” a potentially angry underclass (male‑sedation hypothesis) or simply gives them harmless comfort.
  • Some see AI companions as similar to paid chatbots like Replika: many users knowingly choose the illusion and still get emotionally attached.

Future of porn, dating, and relationships

  • Many expect the stack to go fully synthetic: AI models for images/video + AI chat for “personality,” potentially outcompeting human creators at the low and mid tiers.
  • Others think the novelty will fade and real human connection, especially in marriage or serious relationships, will retain unique value.
  • Debate over broader social effects: predictions of falling marriage rates, more incels, deeper gender tensions, vs. counter‑claims that humans will adapt and new norms will emerge.

Platforms, capitalism, and enshittification

  • Repeated framing: this is “deception as a service” and another stage of platforms optimizing engagement and profit over authenticity.
  • Some argue AI tools “democratize assistants” for small creators; others say they further commoditize and hollow out already‑thin human interaction online.

Dear OAuth Providers

Spec compliance and interoperability

  • Many commenters stress that OAuth/OIDC specs clearly define error formats and allowed error codes; providers that diverge (e.g., custom error strings, wrong types) break interoperability.
  • Others argue that in practice each provider behaves differently, making OAuth feel like a “skeleton” protocol where every integration is bespoke.
  • Some note that most problems described stem from providers ignoring, not misunderstanding, the spec. Others counter that if so many get it wrong, the spec may not be as “clear” as claimed.

UX issues: multiple providers and account confusion

  • Common frustration: users forget whether they signed up with email or which OAuth provider, accidentally creating duplicate accounts.
  • Workarounds: password manager notes (“OAuth: use Google”), services that auto-link by matching email, or offering explicit account-merging flows.
  • Several participants warn that auto-linking purely on email is dangerous; recommended best practice is to require existing credentials or extra verification before merging.

Security and trust in OAuth vs email

  • Debate over trusting emails from OAuth providers:
    • One side: never trust them, except possibly when the provider controls the domain (e.g., large webmail) and guarantees no reuse.
    • Others: even then, account compromise and weak verification flows make this fragile; but if password reset uses email anyway, additional risk may be marginal.
  • Some prefer plain email+password with password managers to avoid dependency, tracking, and lock-in to large identity providers.
  • Counterpoint: federated login brings strong MFA and verified identities, and empirically boosts sign-up conversion for businesses.

API design and HTTP semantics

  • Complaints about APIs returning HTTP 200 for errors instead of appropriate status codes; others argue this is a deliberate “HTTP as pure transport” philosophy.
  • OAuth RFC allows some leeway on HTTP codes, which may contribute to inconsistency.

Complexity and ecosystem problems

  • Commenters note dozens of OAuth-related RFCs and revisions; implementing “to spec” is hard, especially for smaller teams.
  • Integrators report that each provider (social networks, clouds, etc.) has unique quirks, often poorly documented, requiring per-provider special-case code.
  • Calls for official conformance test suites and certified libraries to reduce divergence and “roll-your-own” mistakes.

Provider-specific oddities

  • Examples include nonstandard token endpoints (separate refresh endpoint), string-encoded expiration times, Azure AD requiring client_id in scope, Discord not working with some OIDC clients, and AWS using ID tokens where access tokens are expected.

Gemini 2.0: our new AI model for the agentic era

Model capabilities & demos

  • Gemini 2.0 Flash adds native multimodality (text, images, audio; video via Multimodal Live) with low latency.
  • Native image and audio output are delayed to early next year; current image generation routes through Imagen 3.
  • The Multimodal Live API and AI Studio “Live” UI impress many: real‑time voice plus camera/screen sharing can identify objects, read text, critique physical movement, and tutor in tools like Blender.
  • Code execution inside the model sandbox works for local Python but has no outbound network access and runs into missing package issues.

Benchmarks, quality & comparisons

  • Google claims Gemini 2.0 Flash beats 1.5 Pro on most benchmarks; some users see Flash ≈ old Pro, others say experimental 1206 is stronger.
  • On community leaderboards (e.g., LM Arena), Gemini 2.0 Flash ranks near GPT‑4o and other top models, but many distrust benchmarks as over‑optimized.
  • One hallucination benchmark shows a very low hallucination rate for 2.0 Flash, but several hands‑on reports still see confident errors and verbose “reasoning” that can mislead.
  • Mixed anecdotes: some say coding, Advent of Code, and vision tasks are now competitive with GPT‑4o / Claude; others find GPT‑4o or o1 clearly superior for reasoning and hard debugging.

Search integration & hallucinations

  • Strong disagreement about Gemini in Search: some find it increasingly useful; others report frequent factual errors (locations, chemistry definitions, counts of islands, corporate facts) presented as authoritative.
  • A few note that some failures are likely inherited from underlying web search, not just the model.

Pricing, access & quotas

  • Gemini Advanced subscription is ~£18/month.
  • API usage for Flash 2.0 is currently free in preview with 10 RPM limits and ~1,500 requests/day; developers complain this is too low for “agentic” workloads.
  • Multimodal Live API is free during preview; many hope production pricing will undercut OpenAI’s relatively expensive audio I/O.

On‑device vs cloud, hardware & economics

  • Long debate on whether training or inference is the real moat:
    • One side: training compute (TPUs, data) is the scarce asset; inference is a commodity many hardware vendors can provide.
    • Other side: at scale, inference costs dominate; without cheap inference or good on‑device performance, economics and adoption suffer.
  • Discussion about whether on‑device models (Apple, Android Tensor chips) will become “good enough” to erode demand for paid cloud services.
  • Several argue Google doesn’t need to “win” on‑device if cloud inference remains cheap and fast; others think Apple’s eventual strong on‑device AI will force Android to respond.

“Agentic” models & terminology

  • “Agentic” is widely mocked as vague marketing jargon; people prefer plain terms like “autonomous” or “tool‑using.”
  • Some insist most “agents” are just LLMs plus tools and static workflows; complex multi‑agent handoff systems often underperform a single strong model with tools and long context.
  • Others see real promise in browser‑control projects (e.g., Project Mariner) and live multimodal agents, but think the term is over‑applied.

Trust, product longevity & ecosystem

  • Persistent concern about Google’s habit of killing or deprecating products and APIs (Reader, messaging apps, Stadia, GCP deprecations).
  • Some organizations explicitly avoid Google for core infra, preferring AWS/Anthropic due to perceived stability and clearer long‑term support.
  • Fears that violations of vaguely defined AI terms of service could trigger bans affecting entire Google accounts (Gmail, Docs, Photos), with little recourse.
  • Counterpoint: core products like Search, Gmail, and Workspace are long‑lived and widely relied upon; AI is seen as strategically central and unlikely to be abandoned.

Developer tooling & practical use

  • New Python SDK (googleapis/python‑genai) is praised as more modern; supports structured outputs via schemas (including Pydantic).
  • Developers like Gemini’s large context windows for RAG and dumping big docs; also note good speed vs GPT‑4o’s “dog slow” feel.
  • Some find Gemini’s web UI weaker than its raw API, which can integrate well into tools (VS Code via Cline, CLI tools like llm, custom MCP/agent setups).

Dioxus 0.6 – Crossplatform apps with Rust

Positioning vs Other Frameworks

  • Frequently compared to Tauri, Electron, Flutter, React Native, Leptos, egui, iced, and Qt.
  • Consensus: Tauri/Electron are app shells for web tech; Dioxus is a full UI framework written in Rust, more like React/Next.js on web and React Native on native.
  • Dioxus markets itself as “Flutter-like but web-first,” which causes confusion because people import Flutter’s drawbacks; maintainers stress DOM-first web support.
  • Leptos is often mentioned as the closest Rust-web competitor (web-only vs Dioxus web+desktop+mobile).

Architecture & Rendering Model

  • On web: Rust compiled to WASM, writing directly to the DOM (no canvas-only rendering). Supports SSR, hydration, streaming HTML, and a Next.js-like fullstack story.
  • On native: Rust code runs directly (no JS VM), can call JNI/Objective‑C/FFI, and currently uses system webviews via wry; a standalone HTML/CSS engine (“Blitz”) and a GPU/Skia-based renderer are under active development.
  • Layout and APIs are intentionally web-like even on native, but plan to integrate with system accessibility APIs.

Performance & Hot Reloading

  • Strong emphasis on performance; internal benchmarks claim very fast DOM diffing and Rust↔JS bindings, though bundle size and memory are acknowledged as worse than top JS frameworks.
  • Uses batching and string interning across the WASM/JS boundary; future WebAssembly features (direct DOM access, better string support) are expected to help.
  • New release substantially improves hot reloading; can reload most RSX and some simple Rust expressions, though not arbitrary Rust code.

Cross‑Platform Ambitions

  • Goal: one Rust codebase targeting web, desktop, mobile, and embedded.
  • Some commenters see this as uniquely promising; others argue serious apps still require platform-specific UIs and many if os == ... branches.
  • Plans for GPU rendering plus native system widgets aim to keep look consistent while interactions feel native.

Ecosystem, Tooling & Maturity

  • Ecosystem seen as early but improving: component libraries and a query-style data library exist, though not yet rich.
  • CLI (dx) and dev tooling still rough: some users hit opaque build failures and system dependency issues (e.g., specific webkit2gtk versions, xdotool on Linux).
  • Rust compile times and hot-reload speed are pain points compared to JS; users discuss workarounds (workspace splits, profile settings).
  • Versioning remains 0.x; maintainers attribute this partly to Rust culture and expect a 1.0 after some API cleanup.

Funding, Governance & Risk

  • Dioxus is a VC-backed company (including YC), which raises concerns about long-term openness and potential “rug pulls.”
  • Project is MIT/Apache-2 and does not require a CLA; maintainers say OSS donations aren’t critical and even plan to redirect remaining funds into the Rust ecosystem.
  • Some worry about bus factor and team size; others argue funding and full-time work improve long-term viability.

Developer Experience & Syntax

  • UI written in an rsx!{} macro DSL, deliberately React/JSX-like and similar to SwiftUI/Jetpack Compose/JSON-style structs.
  • Supporters praise it for ergonomics, hot reload, and static HTML templating; critics find it unreadable and harder to reason about than plain HTML/JSX.
  • Managing shared state across contexts is reported as tricky; some prefer Elm/TEA-style architectures (e.g., in iced, Lustre, Leptos) for more structured state management.

PeerTube mobile app: discover videos while caring for your attention

What PeerTube Is and Isn’t

  • Many readers initially assumed “PeerTube app” was a YouTube client; thread clarifies it’s a federated video platform using ActivityPub, more “software to run YouTube-like sites” than a single centralized service.
  • Some argue this dual identity (server software + user platform) makes a coherent landing page and onboarding difficult.

Website, App UX, and Onboarding

  • Strong criticism that the announcement and main site bury basic CTAs (download buttons, instance browsing) far below the fold, despite bold headlines about the mobile app that aren’t links.
  • Several people report struggling to find the app links even after being told they exist; calls for a clear “Download app” and “Browse videos” at the top, plus a simple “TL;DR.”
  • Others note navigation options exist (“What is PeerTube / Browse Content / Upload video”) but concede they’re not prominent or user-oriented enough.
  • Some defend the current emphasis on explaining federation and software over “growth hacking,” but many see this as “programmer design” and a core reason fediverse projects stay niche.

Discovery, Content, and Recommendations

  • Multiple users report poor search and recommendation quality: irrelevant languages, heavy bias toward PeerTube’s own explainer videos, and no apparent effect from interest filters.
  • SepiaSearch is seen as confusing and weak; some long-time users say it’s almost impossible to get non-technical or current-events content discovered.
  • A few see the underlying streaming tech as solid but believe curation, UX, and branding are the real blockers versus YouTube.

Open Source Culture, Goals, and Branding

  • Debate over whether “being libre” or open source is a sufficient goal; some say that without serious UX, marketing, and user acquisition, projects like PeerTube remain “empty shells.”
  • Others argue many open-source developers simply want to build software, not win markets, and that smaller, high-quality communities are acceptable outcomes.
  • Fediverse projects in general are criticized as obsessed with technical/ideological purity and “inside baseball” rather than mainstream usability; Mastodon is cited as having improved but still difficult for newcomers.

App Stores and Platform Power

  • iOS App Store restrictions reportedly forced a curated instance list and limited donation links; some see this as censorship and an argument for regulating app-store monopolies.
  • Later comments note that the app does allow manually adding instances if they run a recent PeerTube version, partially mitigating the “whitelist-only” concern.

Moderation and Governance

  • Moderation is instance-based; users must pick servers whose policies they like.
  • One commenter claims PeerTube has “no defenses” against abuse or DoS and is unsuitable for large-scale public video distribution; others don’t directly confirm or refute this, leaving effectiveness unclear.

Don't Get Distracted (2017)

Professional Guilds and Collective Ethics

  • Some argue for a software “guild” or union (inspired by actors’ unions) to set ethical guardrails, minimum rates, and constrain employers, especially around surveillance and dark patterns.
  • Others note IEEE/ACM exist but lack “teeth”; they regulate members, not employers.
  • Skeptics think any guild would be co‑opted, especially by the military, and that high pay will always attract engineers around restrictions.

Individual Responsibility and Moral Agency

  • Many emphasize that individual engineers are the last line of defense and should say no to tracking, dark patterns, or weaponized code.
  • Others push back: tools and money are morally diffuse; responsibility lies mainly with decision‑makers, not every contributor in the chain.
  • There is disagreement over how far indirect responsibility extends (e.g., from Vim authors to weapons coders).

Military, Defense Work, and Geopolitics

  • Strong divide: some refuse any work that directly enables killing; others see military tech as sometimes necessary for defense or deterrence.
  • Several note dual‑use scenarios (earthquake survivor detection vs. urban targeting; E911 vs. authoritarian tracking).
  • Some argue that refusing to support one’s military is naive or hypocritical, given the security it provides; others cite unjust wars, surveillance, and war crimes as reasons to abstain.
  • Mandatory conscription contexts are raised to contrast voluntary ethical stances.

Ad-Tech, Surveillance, and Dual-Use Tech

  • Multiple anecdotes of being “nerd‑sniped” into ad‑tech, big‑data targeting, facial recognition, and then feeling complicit or “icky” once consequences were clear.
  • Concern that tools built for humanitarian or safety use are later sold for repression or mass surveillance.
  • Debate over whether phones or devices are “listening” for ads; some point to sophisticated tracking without microphones, others cite ad products that do use voice data.

Activist Engineers, Codes, and Processes

  • Suggestions include a software “Hippocratic Oath,” ethics courses, and company‑wide lines in the sand (e.g., no weapons or “destructive financial systems”).
  • Others warn that overtly activist engineering could erode public trust, as some believe happened with journalism.
  • Several advocate personal periodic ethics reviews and quitting when alignment breaks, while noting quitting is harder in a weak job market.

Where to Draw the Line & Structural Constraints

  • Thread wrestles with spectrum cases: food preservation vs. weapons, hospital janitors vs. weapons coders, proximity fuzes vs. general tools.
  • Some argue capitalism structurally limits worker choice; real power would require collective action to control the “why” of production.
  • Others defend markets but criticize “late‑stage” shareholder dominance, seeing current problems as feudalism rather than inherent to markets.

Django and Postgres for the Busy Rails Developer

Project and models structure in Django

  • Concern raised about the article implying all models live in a single models.py; several posters say that’s only for small apps.
  • Common patterns: multiple apps each with their own models.py, or a models/ package with one model per file and an __init__.py “barrel” that re-exports them.
  • Some see Django’s app vs project distinction as confusing; others simplify by putting everything in a single “core” app.

Django vs Rails: developer experience

  • Multiple commenters strongly prefer Rails, citing:
    • Better defaults, scaffolding, deployment story (Capistrano), and Hotwire/Turbo integration.
    • More consistent project structure, making it easier to move between codebases.
  • Others prefer Django/Python, emphasizing:
    • Batteries-included approach, especially the built-in admin.
    • Ability to swap components (templating engine, DB, management commands).
  • Some argue big projects in any framework get messy; others insist language/framework choice heavily affects how long they stay manageable.

Templating and front-end approaches

  • Django’s template language is heavily criticized as slow, restrictive, and dated; some want something closer to ERB/React or LiveView/Blazor.
  • Others defend it as intentionally limited for safety and separation of concerns, while acknowledging it’s overkill for simple logic.
  • Alternatives mentioned: Jinja2, Python-based HTML builders (htpy, htmy), React-based server-side rendering for Django, Hotwire/Stimulus with Django, PEP 750 proposals for “native” templating.

ORMs and querying

  • Rails’ ActiveRecord is widely praised as the most natural and productive; several find Django ORM and SQLAlchemy more verbose or awkward.
  • Counterpoint: many Python devs strongly like Django ORM; some call it a “work of art” and main reason to use Django.
  • Debate over readability of Django’s double-underscore joins vs nested data structures, and over unit-of-work capabilities (SQLAlchemy praised; Django seen as per-object).
  • Discussion of architectural patterns: ActiveRecord vs data mapper, domain logic entangled with persistence, N+1 query risk in Rails, and the value of keeping business logic separate from the ORM.

Migrations and schema management in Django

  • Django migrations are a major pain point for some:
    • Not-null-by-default plus Python-level default vs SQL db_default can cause deployment-time crashes.
    • on_delete and some defaults enforced in Python rather than as DB constraints surprise people.
    • Auto-generated AlterField SQL can be slow or dangerous (dropping/recreating constraints, undoing manual tweaks).
    • makemigrations historically created noisy, no-op migrations (partly improved in newer versions).
  • A few advocate hand-written SQL migrations only, or careful use of RunSQL and SeparateDatabaseAndState.

Ecosystem, hiring, and language choice

  • Python is seen as more broadly useful beyond web (ML/AI, data science), giving Django higher perceived ROI for some.
  • Others argue framework learning dominates language learning; switching between Ruby and Python later isn’t hard.
  • Several note it’s much easier to hire experienced Python devs than Ruby devs. Ruby is described as delightful but more “clever”; Python as “boring” but large and pragmatic.

Use cases and ecosystem strengths

  • Django + GeoDjango + PostGIS + Python geospatial libs (GDAL, shapely, etc.) are praised as uniquely strong for GIS-heavy stacks.
  • Django is also favored for internal tools and data-heavy apps where Python’s scientific ecosystem matters.
  • Rails is preferred for fast-moving, customer-facing products needing rich interactivity (Hotwire, Turbo, strong scaffolding).
  • Some dislike Django so much they recommend composing Flask/SQLAlchemy/Jinja2 instead; others who’ve inherited Flask systems trying to match Django’s “full stack” regret that choice.

Being overweight overtakes tobacco smoking as the leading disease risk factor

Obesity trends and GLP‑1 drugs

  • Several commenters link recent small declines in obesity to GLP‑1 drugs (Ozempic, Mounjaro, etc.), though access is limited by high US prices and patchy insurance coverage.
  • Telehealth + compounded semaglutide are described as relatively cheap and easy to obtain, sometimes via “fudged” BMI data, raising safety and ethics concerns.
  • Users report large, previously unattainable weight loss, reduced “food noise,” improved blood sugar, and even remission of IBS‑type symptoms. Others ask about long‑term effects on strength gains and whether benefits persist after tapering.
  • Some argue GLP‑1s put healthy eating on “autopilot” vs. years of failed dieting; skeptics say consistent calorie control should be enough and question the need for drugs.

BMI, health risk, and measurement

  • Linked Lancet work suggests lowest all‑cause mortality around BMI ~25; cancer mortality minimum is lower, communicable disease minimum slightly higher.
  • Some infer “overweight but not obese” might not be very harmful; others counter that overweight still raises risk of quality‑of‑life–reducing conditions (e.g., type 2 diabetes) even if mortality curves are shallow.
  • Strong debate over BMI: defenders emphasize it’s cheap, robust at population scale, especially when combined with waist circumference; critics call it crude and misleading for muscular or “jacked” individuals.
  • Several note ethnic differences in diabetes risk at “normal” BMI, complicating simple BMI cutoffs.

Diet, sugar, and cancer/metabolism

  • Discussion of high‑fructose diets, cancer growth, and whether fruit sugar is problematic; some cite mouse studies on sugar water and rough thresholds for human fructose tolerance.
  • Others argue the real issue is cheap, abundant sugar (HFCS or otherwise) and ultra‑processed foods, not fruit.
  • Conflicting anecdotes around keto: some see it as cancer‑protective; others describe potential tumor‑promoting effects in specific mutations and warn against simplistic “starve cancer with ketones” claims.

Social attitudes, stigma, and mental health

  • Tension between body‑positivity (reduce bullying, accept diverse bodies) and concern that “fat acceptance” normalizes unhealthy weights or deters medical conversations.
  • Multiple people stress that shaming is already pervasive, often worsens stress, depression, and disordered eating, and appears ineffective as a population intervention.
  • Others credit strong social stigma (e.g., against smoking) with helping them change behavior and question whether we’ve overcorrected on weight stigma.

Policy, economics, and responsibility

  • Proposals include: sugar or junk‑food taxes, stricter labelling, limits on advertising to children, and improving food quality in schools/hospitals.
  • Counter‑proposals focus on cutting agricultural subsidies (especially for corn) that make simple carbs artificially cheap; there’s extended debate about second‑order effects (fuel, feedstock, price volatility).
  • Some suggest obesity‑related insurance surcharges or GLP‑1 coverage if cost‑saving; others denounce this as cruel or note that many weight changes stem from disease or medication, not “choice” alone.
  • A recurring theme: overeating is often a symptom of broader structural and psychological issues (stress, despair, sedentary work, poor food environments) rather than just personal failure.

Smoking, nicotine, and substitution effects

  • The ranking shift is partly attributed to a >40% fall in tobacco‑attributable burden since 2003 rather than a sudden surge in obesity alone.
  • Commenters discuss rising use of vaping and nicotine pouches (e.g., ZYN), with disagreement on how harmful pure nicotine is versus smoked tobacco.
  • Some note nicotine’s appetite‑suppressing role and speculate that declining smoking may indirectly raise weight, while warning that trading obesity risk for smoking risk is net harmful.

Individual experiences and strategies

  • Many share struggles with sustainable weight loss, the mental difficulty of long‑term 1,200–1,400 kcal diets, and the impact of work stress, parenting, depression, and medications.
  • Others report success with fasting (including multi‑day fasts), caloric tracking, resistance training, or strict avoidance of “trigger” junk foods rather than moderation.
  • There’s recurring skepticism that any purely behavioral approach has been proven to work at scale over the long term, hence interest in surgery and pharmacological options despite cost and side‑effect concerns.

The GPU is not always faster

When GPUs Lose to CPUs (Dot Products & Simple Ops)

  • Many note that for simple, low–compute-intensity ops like dot products, CPUs often win because memory bandwidth, not FLOPs, dominates.
  • If you must move data CPU↔GPU over PCIe for a single dot product, transfer cost dwarfs GPU compute advantages.
  • Several point out that in realistic GPU workflows (e.g., deep learning), model weights are kept on the GPU and only inputs/outputs move, dramatically changing the comparison.

Compute vs Communication & Roofline Thinking

  • Discussion repeatedly references the compute/communication ratio:
    • Dot products: O(N) data and O(N) compute → memory-bound.
    • Matrix multiply: O(N²) data and O(N³) compute → high data reuse and compute-bound.
  • Roofline and hierarchical roofline models are mentioned as good mental models, including adding PCIe bandwidth as another “roof.”
  • Batch processing in ML is cited as an example of turning memory-bound work into compute-bound work.

Matrix Multiplication Algorithms (Strassen, FFT, BLAS)

  • Multiple comments dispute the claim that “efficient matmuls” mainly use Strassen.
  • Consensus: high-performance BLAS/CUDA libraries mostly use carefully blocked O(N³) algorithms due to memory locality and numerical stability.
  • Strassen and FFT-based matmul are acknowledged as asymptotically better but with large constants, stability issues, and awkward constraints (e.g., power-of-two sizes).

Hardware, Bandwidth, and Unified Memory

  • Several criticize the article’s hardware: an old PCIe 3.0 GPU with low host-device bandwidth, making it effectively a PCIe benchmark.
  • Others note that modern GPUs with PCIe 4.0/5.0, NVLink, or Grace-Hopper-style setups dramatically reduce transfer bottlenecks.
  • Unified memory / integrated GPUs (Apple M-series, Intel iGPUs, mobile) are highlighted as making GPU use more viable for small or real-time tasks by avoiding explicit copies.

Practical Guidance and Critiques of the Article

  • Key lesson: only move data to GPUs when you can amortize transfer over many operations and keep subsequent computation on the device.
  • Several call the example “terrible” or “misleading,” arguing a simple CPU vs GPU+transfer comparison would have sufficed.
  • There’s also a correction that the original AVX CPU bandwidth was mis-measured and later revised downward.

The PayPal Mafia is taking over America's government

Democratic Legitimacy & “Takeover” Claims

  • Several commenters argue that unelected tech billionaires gaining major influence via appointments and special committees is worrying, even if it formally follows from an elected president’s victory (“you elect the person, you get their crew”).
  • Others counter that this is not new: cabinet members and advisors have always been unelected, and replacing one set of appointees with another is not inherently anti‑democratic.
  • Some think the novel part is the expectation of a bespoke, powerful new structure effectively built around a single billionaire; others reply that such committees are typically advisory and constitutionally weak, so the irregularity may be overstated.

Media, Free Press, and Information Environment

  • There is tension between supporting “free press” as a principle and deep distrust of contemporary journalism, which some see as sensationalist, partisan, and manipulative.
  • Defenders of right‑wing tech figures say hostility to legacy media is justified because those outlets spread disinformation, doxx people, and collaborated with prior censorship.
  • Critics respond that leading tech billionaires themselves are hostile to press freedom and transparency, and wield their own platforms to shape narratives and amplify conspiracy thinking.

Wealth, Power, and Oligarchy

  • Many see this as part of a larger pattern: extreme wealth concentration enabling outsized political power, moving the U.S. from “flawed democracy” toward “hybrid regime” or worse.
  • Others argue that some inequality metrics (especially “bottom 10%” wealth) are misleading due to debt and life‑stage; debates arise over income vs. wealth inequality and how either distorts democracy.
  • Several note that once individuals have more money than they can spend, motivations shift from money to power, status, or “high score” ego.

Quality and Substance of the Article

  • Multiple commenters find the article thin: more a headline plus scene‑setting about a party than serious analysis of policy implications.
  • Some say it reads like clickbait built on current dislike of specific tech figures.
  • Others note that the underlying dynamic—tech‑wealth networks shaping politics—has been documented for years and is not really “new.”

Meta: Hacker News Discourse

  • A visible subthread laments that HN political discussions now resemble Facebook/Reddit in polarization and quality, with fallacies (e.g., false dilemmas, whataboutism) and quick downvoting of dissent.

Making memcpy(NULL, NULL, 0) well-defined

Intuition vs. C Standard for memcpy(NULL, NULL, 0)

  • Many expect copying 0 bytes to be a no-op regardless of pointers.
  • The C standard historically made passing null pointers UB even when length is 0.
  • In practice, major libc implementations already treat length‑0 memcpy as a no-op, but the compiler is allowed to assume it never happens.
  • The C2y change is to make memcpy(NULL, NULL, 0) well‑defined to align spec with reality and remove surprising compiler behavior.

Undefined Behavior and Compiler Optimizations

  • UB lets compilers assume “this never happens” and thus remove branches, hoist or delete checks, and do aggressive alias and bounds reasoning.
  • Examples:
    • GCC removes dest == NULL branches after a memcpy(dest, ..., len) call, even if len is 0 or provably 0.
    • Dead code elimination and register allocation rely on assuming no out‑of‑bounds or invalid pointer access.
  • Some see this as necessary for performance; others see it as a major source of fragile miscompilations and hard‑to‑reason-about behavior.

Abstract Machine, Pointers, and Memory Model

  • The discussion stresses that C is defined on an abstract machine of “objects,” not a flat address space.
  • Treating pointers as mere integers would break many optimizations (e.g., assuming local variables are not modified via forged pointers).
  • Pointer provenance, null arithmetic, and cross‑object pointer comparisons/subtractions are all subtle UB areas that optimizers exploit.

Static Analysis and the Proposed Change

  • Static analyzers previously could unconditionally flag passing NULL to memcpy as a bug.
  • With length‑0 calls now defined, analyzers must reason about the size argument, increasing complexity and risk of false positives/negatives.
  • Some argue this cost is acceptable to remove a surprising, widely ignored UB; others worry about weakening simple checks.

C Safety vs. Newer Languages and Tooling

  • One side argues C can be used safely with discipline, abstractions, sanitizers, and (often expensive) sound static analysis.
  • Another side claims humans consistently get C’s UB wrong, and memory‑safe languages (Rust, managed runtimes) are a better default, even if unsafe blocks and bugs still occur.
  • There is debate over whether tightening C’s semantics (less UB) would make it closer to a “high‑level assembler” but significantly slower, undermining its niche.

Evolving my ergonomic setup (or, my laptop with extra steps)

Ergonomic pointing devices

  • Strong interest in trackballs, especially Ploopy finger-operated models; users praise build quality and “luxury” feel, but some want wireless versions for “supine computing” and travel.
  • Some prefer thumb trackballs (Elecom, CST), others find thumb use less dexterous or cramping and prefer finger balls or central bar/rollermouse solutions.
  • Several report that non-Apple trackpads cause pain; others rely on a traditional mouse despite trackpad discomfort.

Exercise vs. hardware ergonomics

  • Many argue that modest, consistent strength and mobility work (squats, deadlifts, pushups, walking 8k+ steps) fixed or dramatically reduced chronic wrist, back, shoulder, and neck pain—often after expensive ergonomic gear failed.
  • Multiple anecdotes: wrist/forearm pain resolved by deadlifts; back and wrist pain eliminated by squats; nagging pain reduced by walking more.
  • Counterpoints: some people require extensive, time-consuming PT due to serious spinal injuries or other conditions; exercise helps but does not fully resolve issues.

Physical therapy and professional help

  • Strong recommendation to see physical or occupational therapists; they often identify root causes (e.g., hamstring or calf weakness) quickly and prescribe targeted exercises.
  • Advice includes: stand and walk a few minutes every hour; consider core engagement (exercise ball or similar, though safety and posture concerns raised).
  • Some describe intensive daily PT regimens plus in-person sessions, necessary to prevent further decline even when full recovery is unlikely.

Keyboards, layouts, and customization

  • Split and tiny keyboards (Corne, Lily58, Keyboardio, custom 3×5 grids) are popular for keeping hands on home row and reducing reach; users accept more chording and complex layer layouts.
  • Debate over cost: $300–400 split boards seem steep compared to $30 commodity keyboards, but defenders cite small-batch production, custom design, quality switches, and health benefits.
  • Custom 3D-printed ergonomic keyboards: main cost drivers are printed shells and PCBs, not labor.

Posture, laptops, and breaks

  • Many dislike fixed laptop ergonomics; prefer external keyboards, pointing devices, and stands or high-opening displays to align screen and neck.
  • Some users actually need to look down for comfort, underscoring that “standard” ergonomic advice is not universal.
  • Several emphasize that no setup replaces regular movement: frequent short breaks, changing positions, possibly avoiding prolonged chair sitting.

You need 4 colors

Visual quality & usability of the demo

  • Many describe the provided palettes as ugly, garish, or physically straining to look at, especially in light mode.
  • Some find a few specific hues acceptable, but “not the worst” is often the faint praise.
  • Common complaints: background too saturated, overall page feels “foggy,” poor hierarchy, and low contrast.
  • A few commenters do like certain ranges (e.g., around specific hue values) or the general idea of a 1‑D slider-driven palette.

“Four colors” as a design principle

  • Several argue that “you need 4 colors” is a misleading oversimplification.
  • Real interfaces need more colors/roles for errors, warnings, destructive actions, hover/focus/disabled states, borders, etc.
  • Others say you can make good UIs with fewer colors (even monochrome), citing early Mac interfaces.
  • The text itself is called self‑contradictory: it says you “need 4” but describes one as “optional.”

Accessibility and contrast

  • Multiple people note that many combinations fail standard contrast checks; some button text becomes nearly invisible.
  • There is consensus that color alone should not convey mission‑critical information; shape, position, and other cues are needed.
  • Debate appears on color‑blind operators: some argue systems must accommodate them; one voice suggests excluding them in certain safety‑critical roles.

Color tools, algorithms, and color spaces

  • Alternatives like uiColors, Huemint, and Material You / Android color utilities are cited as more practical or better‑looking.
  • Commenters note that simply rotating HSL hue is crude; perceptual spaces like OKLCH or HCT (CAM16‑based) behave better and can embed contrast guarantees.
  • There’s skepticism that any simple formula can always generate pleasing palettes given human and cultural variation.

Color systems, roles, and design tokens

  • One detailed thread distinguishes “brand” palettes (primary, secondary, accent, neutral) from “role” tokens (copy text, background, button states, etc.).
  • Claim: compressing everything into 3–4 “colors” for text/bg/button quickly breaks down; a proper system has more swatches plus mapping between layers.

Language/grammar digression

  • The site’s “How it works?” label triggers a long side discussion on English question formation.
  • Views range from strict prescriptivism (“wrong, distracting”) to tolerance (“language evolves,” “non‑native speakers”).
  • Some emphasize that even small grammatical slips can increase cognitive load, especially on UI copy.

Historical and meta observations

  • References to Amiga, CGA, four‑color theorem, and monochrome systems show that hard limits on colors are not new.
  • Some suspect the page partly exists to provoke opinionated debate.
  • A few users share personal color‑scheme generators (e.g., driven by current temperature or date).

Bankruptcy judge rejects sale of Infowars to The Onion

Judge’s Decision & Auction Process

  • Judge rejected the InfoWars sale to The Onion–backed entity, saying the sealed‑bid auction failed to maximize value for creditors and should have had more competitive rounds.
  • Some commenters say this is legally correct: bankruptcy courts must prioritize maximizing value to the estate, not “meta‑ethical” or symbolic outcomes.
  • Others argue the judge overstepped, substituting his own view for creditors’ preferences, and that sealed bids are a standard, defensible auction format.

Competing Bids & Creditor Economics

  • Two main bids:
    • The Onion/Global Tetrahedron: ~$1.75M in cash plus several million in debt forgiveness from the largest Sandy Hook creditor group, structured so minority creditors would receive more cash than under any other bid.
    • “First United American Companies” (described as a Jones‑affiliated vitamin company): $3.5M all‑cash.
  • One side argues: cash dominates; debt that will mostly never be collected is “imaginary”, so $3.5M > $1.75M.
  • The other side argues: when you include the voluntarily waived claims that shift more money to other creditors, the Onion structure is economically larger and better for minority creditors, and all main creditors consented.
  • Dispute over whether using debt forgiveness as bid value is normal but acceptable (analogized to banks bidding their own loans at foreclosure) or an unfair “sweetheart” deal that disadvantages other potential buyers.

Role and Aims of Sandy Hook Families

  • Large‑judgment families were willing to reduce their recovery to:
    • Give smaller‑judgment families a much higher payout, and
    • Transfer InfoWars to a hostile owner (The Onion) to neutralize Jones’s platform.
  • Some commenters say creditors should be allowed to sacrifice money for that moral outcome; others say bankruptcy must remain purely financial to avoid precedent that enables abusive, below‑market insider deals.

Jones, Assets, and Alleged Fraud

  • Many posts accuse Jones of moving assets to relatives and a vitamin company to evade the massive defamation judgment; some call this fraudulent conveyance or “mafia‑type” behavior, though others note not all of it is clearly illegal or adjudicated.
  • Strong concern that allowing a Jones‑linked entity to buy InfoWars lets him effectively “buy back” assets with money that should have gone to victims.

Defamation, Free Speech, and Damages Scale

  • One camp views the ~$1.5B judgment as an intentionally “nuclear” civil remedy for egregious, repeated defamation that incited harassment of bereaved families, compounded by Jones’s extreme discovery abuse and contempt for the courts.
  • Another camp sees it as politically driven “lawfare” and wildly disproportionate compared to corporate penalties for killings or environmental disasters; some frame it as an attack on speech rather than targeted defamation.

Politics, Musk, and Perceived Systemic Failure

  • A few tie the decision to the judge’s Trump‑era appointment or speculate that Elon Musk might later bid, though others call this unsupported.
  • Several express broader despair: that rich or well‑connected figures (including Jones) can use corporate structures, delays, and bankruptcy to escape full accountability, undermining trust in the legal system.
  • Some note surprise and dismay at how much sympathy or relativizing of Jones appears in the discussion.

The case against Google's claims of "quantum supremacy"

Context: Google’s “Supremacy” and Willow Claims

  • The blog post revisits Google’s 2019 random circuit sampling “quantum supremacy” result in light of the new Willow chip and a dramatic “septillion years” classical runtime claim.
  • Some see nothing fundamentally new: same benchmark, slightly larger circuits (53→67 qubits), and argue we could be repeating this cycle with larger devices in future years.

Verification, Benchmarks, and Hype

  • Core concern: random circuit sampling isn’t practically important and is hard to verify independently, since the whole point is to exceed classical simulation.
  • Earlier “billions of years” estimates were later challenged by better classical algorithms, suggesting the original gap was overstated.
  • Several commenters argue Google’s communication style is overly hyped compared to the underlying incremental technical progress.

Shor’s Algorithm and Actual Capability

  • Multiple comments note that genuine implementations of Shor’s algorithm haven’t gone beyond trivial numbers (15, 21), and even those used heavily simplified, “cheating” circuits.
  • This is contrasted with public perception that widespread cryptographic breakage is imminent.

Quantum Error Correction and Scalability

  • The blog author in-thread emphasizes statistical anomalies in Google’s 2019 fidelity modeling (too-perfect fit), not the existence of exponential decay per se.
  • Others counter that multiple independent experiments show the expected exponential fidelity falloff consistent with simple noise models, and view the critique as increasingly out of touch.
  • There is active disagreement over whether quantum error correction will scale or fundamentally break down.

Security, Intelligence Agencies, and Post‑Quantum Planning

  • Debate over whether intelligence agencies might already have secret, more powerful quantum machines; many doubt they could be dramatically ahead of large companies.
  • Some stress “store now, decrypt later” risks and blackmail value of old secrets; others argue the storage and collection costs at global scale are enormous.
  • On migration: centralized banks are seen as more able to coordinate a post‑quantum transition than decentralized cryptocurrencies, which face governance and overhead challenges.

Applications and Value Proposition

  • Mentioned potential uses: chemistry and materials simulation, optimization (e.g., logistics, rail networks), quantum networking (superdense coding, quantum key distribution).
  • Several commenters note many current industrial “use cases” look like PR toy problems rather than real business advantages.
  • A minority dismiss quantum computing as “vaporware,” while others argue progress is slow but real, comparable to long-running efforts like nuclear fusion.

Skepticism, Optimism, and the Role of Critics

  • Thread repeatedly returns to the value of informed skeptics: they may be wrong long‑term but help refine methods and temper overclaims.
  • Others warn against both nitpicky contrarianism and uncritical hype, emphasizing that extraordinary claims require robust, reproducible evidence.

Alzheimer's study shows ketone bodies help clear misfolded proteins

Mechanism and Findings Discussed

  • Study suggests ketone bodies may help clear misfolded proteins and improve proteostasis in aging and Alzheimer’s brains.
  • Commenters highlight that the animal work used ketone esters, implying a potential “drug-like” route rather than relying solely on diet/fasting.
  • Cited early human studies where ketogenic compounds improved cognitive scores in mild–moderate Alzheimer’s, but details and effect size are not deeply discussed.
  • Exogenous ketones (e.g., BHB salts) are mentioned as a possible way to raise ketones without strict diets; some users report cognitive benefits (e.g., for “brain fog”), but this is purely anecdotal.

Fasting, Ketosis, and Practical Questions

  • Strong interest in whether fasting can prevent/reduce Alzheimer’s risk and what schedule matters: daily 14–18h, 24–48h fasts, or multi‑day fasts.
  • Disagreement on how long it takes to produce ketones: some say “multi-day,” others claim nightly ketone production if evening eating is avoided or carbs are restricted.
  • Debate over whether intermittent fasting during Ramadan is enough; concerns that typical patterns (daytime fast, evening carb loading) may not induce ketosis.

Keto Diet: Experiences, Benefits, Risks

  • Many report improved focus, reduced hunger, anti‑inflammatory effects, and easier long‑term adherence than moderate-carb dieting.
  • Others find keto unsustainable socially or ethically (e.g., issues with meat sourcing) or psychologically (worsened mood, depression).
  • Short-term “keto flu” and temporary cognitive fuzziness are commonly reported.
  • Some long‑term users report worrying lab results, panic attacks, or problems potentially related to nutrient/omega‑6 imbalance, prompting caution about extreme or poorly planned keto.
  • Emphasis from some that electrolyte and micronutrient supplementation is necessary.

Alzheimer’s Etiology and Alternative Hypotheses

  • Several commenters frame Alzheimer’s as possibly linked to metabolic dysfunction (“type 3 diabetes”), insulin dysregulation, lipids, inflammation, or infections.
  • Mentions of associations with GLP‑1 drugs, nicotine, appetite suppressants, and even BCG vaccination, but all as tentative, competing hypotheses.
  • Significant skepticism about decades of amyloid‑centric research and known fraud, with concern the field may have chased the wrong target.

Patient Experience, Suffering, and Ethics

  • Intense debate on whether people with advanced Alzheimer’s “don’t suffer” versus being unable to communicate significant distress.
  • Multiple anecdotes of fear, confusion, panic attacks, attempts to “go home,” and unrecognized pain (e.g., untreated infections), suggesting suffering can be substantial.
  • Others report patients who appear content, joking, or unaware; caregivers stress variability and the importance of vigilance for nonverbal signs of pain.
  • Some see Alzheimer’s as a strong argument for assisted dying, given the prolonged decline and impact on families.

Meta: Research Access and Discussion Quality

  • Mixed views on Hacker News as a venue: some see it as one of the few usable lay forums; others recommend going straight to journals and tools like PubMed RSS.
  • Complaints about paywalls, difficulty interpreting primary literature, and limited access to knowledgeable clinicians for nuanced prevention discussions.