hngrok
Top Archive
Login

Top 5 News | Last 7 Days

Wednesday, Apr 29

  1. Zed 1.0 from zed.dev
    1444 by salkahfi 9h ago | | |

    Article:

    The article discusses the launch of Zed version 1.0, a new editor that was built from scratch using a video game approach and Rust programming language. The editor is AI-native, supports multiple languages, and offers advanced features like parallel agents, edit prediction, and centralized billing for businesses.

    • Supports dozens of languages and ecosystems.

    Discussion (456):

    Zed is praised for its fast performance, polished UI design, and AI integration that can be disabled. Users appreciate its support for remote development through SSH but note issues with memory usage on large projects and the need for better theme customization options. Some users find it lacking in advanced features compared to other IDEs like JetBrains IDEs or VS Code.

    • Zed is a fast and responsive editor with good performance.
    • The UI design of Zed is polished and well-crafted.
    Counterarguments:
    • Memory usage can be an issue on large projects.
    • Theme customization could be improved for better user experience.
    Software Development Editor/IDEs, Artificial Intelligence, Business Software
  2. HERMES.md in commit messages causes requests to route to extra usage billing from github.com/anthropics
    929 by homebrewer 5h ago | | |

    Article:

    An issue with Claude Code's API billing system causes $200 extra charge when 'HERMES.md' appears in git commit messages, despite having a Max 20x plan.

    This issue could lead to unexpected charges for users and potentially damage the reputation of Claude Code among developers.
    • Claude Code's API routes requests to 'extra usage' billing when HERMES.md is in commit messages.
    • $200 extra charge occurred while Max plan capacity was largely unused.
    • Minimal reproduction steps provided without project files needed.
    Quality:
    Minimal reproduction steps provided, technical details clearly explained.

    Discussion (376):

    The comment thread discusses customer dissatisfaction with Anthropic's policy on compensation for degraded service or technical errors, the perceived lack of genuine human empathy in AI-generated responses, and suggestions for alternative services as a result of poor handling of billing issues.

    • Anthropic's policy on compensation is unreasonable.
    • AI-generated responses are ineffective.
    Counterarguments:
    • Anthropic may not want to set a precedent on refunds.
    Software Development Cloud Computing, DevOps
  3. Online age verification is the hill to die on from x.com
    692 by Cider9986 8h ago | | |

    Article:

    The article argues against online age verification systems, emphasizing that they lead to widespread identity verification and digital ID requirements, which could potentially enslave children for life through a surveillance state. The author calls on parents and freedom advocates to oppose these laws before it's too late.

    • Age verification is a Trojan horse that leads to the implementation of digital ID requirements.
    • Once implemented, it cannot be undone and will enslave children for life through a surveillance state.
    • Parents must oppose these laws before they are passed in their states.
    Quality:
    The post is an opinion piece and does not provide sources for its claims.

    Discussion (435):

    The comment thread discusses various aspects of online age verification, including its potential impact on privacy, censorship, and the rights of children versus adults. There are differing opinions on whether such measures are necessary for protecting children from inappropriate content or if they infringe upon personal freedoms. The conversation also touches on alternative methods to verify age without compromising anonymity and the broader implications of surveillance in online spaces.

    • Alternative take: The fact that twitter / facebook / whatever allow arbitrary, unverified posting enables large-scale misinformation that led to, among other things, Russia's manipulation of the US electorate and ultimate impacting the presidential election.
    • Playing devil's advocate outside of debate club only serves to promote the devil's point of view.
    • Disagreed. I'm against invasive age verification methods, but to allow inaccurate expectations to proliferate often becomes a bubble that pops, causing many to rebound to the other side, even if it's objectively worse. I much prefer to keep the tradeoffs clear, as it prevents betrayed expectations while still showcasing the unacceptable downsides.
    • I'm firmly against the idea of Internet arguments presenting an opposing position under the guise of it not being their actual opinion so they can run away from debate. Devil's advocate is a technique that should be used in school to learn how to make stronger arguments.
    • Really? How many Electoral College votes did Russia's clumsy attempt at manipulation actually change?
    • How are folks recommended to get involved? Contact your local Congress member? I feel this thread has a lot of passion but is missing concrete, actionable steps.
    • Heroes @ EFF have our guide (USA residents): https://www.eff.org/pages/help-us-fight-back#main-content
    • It's worth pointing out that full digital identity verification ('doxxing' yourself to an untrustworthy, unauditable, legally unconstrained private company) is NOT the only way to verify adulthood.
    • The 'cashier standard' you advocate for has already crept toward centralized state tracking in places like Utah. When you go to a restaurant and order a drink, the staff are required to take it to the back and scan it for verification.
    • This is not the case in most of the country. Utah is largely influenced by a Mormon / LDS culture that expresses heavy opposition to drinking. I am clearly not proposing that the cards be scanned Utah style, I am proposing that they be glanced at by a cashier, everywhere else style.
    • More and more places I go in other states besides Utah, try to scan IDs when purchasing alcohol.
    • Again, the proposal isn't for a system which requires scanning of IDs, it's for a system where the cashier glances at the ID. You're arguing against a strawman. You may argue that the system proposed could evolve into the system you're describing, but still, you're arguing against a hypothetical future fiction.
    • This type of system is a horrible idea for the following reasons: 1) the cards can just be re-sold which creates a black market and defeats the 'cashier physically saw the person buying the card' angle; 2) nickle and dimes people for simply browsing the internet (verification can dystopia anyone?); 3) related to #2, it creates winners in the private sector since presumably you need central authorities handing out these codes.
    • Is it even theoretically possible to have bearer anonymity and no reselling option at the same time?
    • First - Alcohol and cigarettes can just be resold too. The black market for them is effectively zero because the consequences for giving them to kids are severe and the room for meaningful profit is close to zero, same applies here.
    • Second - The codes would be priced on the order of magnitude of pennies per verification - think 10 cents or less, accessible even to low / fixed income folks without really making a dent in their budget.
    • Third - the proposal explicitly mentions a nonprofit running it as an option, and the idea would be that law codifies the method to be approved, not a specific vendor, so competitive markets could emerge, too. Would you argue that restrictions on the sale of alcohol are creating artificial winners in the private sector of alcohol manufacturing?
    • I don't think it applies, the difference is that codes are digital and can be sold over the internet, anonymously, in a scalable manner.
    • A great lesson in how not to do rhetoric.
    • The best way to not be in a digital cage is to opt out of the current digital products.
    • But will your friends and family opt out? Their phones are always listening. They can just as easily listen to you, even if you go to great pains not to expose yourself to technology. They'll make a shadow profile of any avoidant user whether they want it or not.
    • The best way to not be in a digital cage is to opt out of the current digital products. Bullshit. These are all-encompassing monopolies and government services. More likely, they'll ban you and you'll end up having to go to court out of desperation to demand that they service you.
    • This is very limited thinking. If you lacked this sort of imagination 20 years ago, you wouldn't have been able to predict today.
    • This is the sort of passive reactionary nonsense that causes the danger that we're in. Everything isn't something to give up lightly, even if you think that it will force your neighbor to turn his music down, or get rid of bad reality television.
    • Do you actually have an argument to make? He’s 100% correct. For a start, child are parents responsibility, and the state should stay out of that as much as reasonably possible.
    • That's why stores let kids buy alcohol and tobacco, of course, because no responsible parent would let them buy that, right? That's why any kid can go watch any movie in the cinema right?
    • Yes it's the parents responsibilities. Do you think a middle class single mother has the resources to keep their kids entertained and out of social media for the whole day?
    • The problem with age verification is 100% the lack of anonymity in its implementation (which I do agree has ulterior motives) - but honestly not the age check in itself.
    • Did social media exist when you grew up?
    • It's weird that none of your arguments or proposals hold accountable the responsible parties. You want to force us to compromise when we were minding our own goddamn business.
    • 5 years ago I would have agreed, but seeing how the GOP has been fighting tooth and nail to protect actual child sex traffickers, I don't think so anymore. There's just no possible way that the safety of children is an actual concern to any of them.
    • The kids are our future adults. It should be pretty obvious that getting them used to the state yanking access is a future problem. I don’t see anything off-color or unreasonable.
    • Responding to tone but not to content is what a dog does.
    • Ironic that he's relying on the same ridiculous 'think of the children' rhetoric that's being used to promote age verification. Really says a thing or two about online discourse in our day and age.
    • Make no mistake you are engaging in your own form of rhetoric when you respond like this. You are in effect moving the discussion away from the subject at hand, and towards the perceived faults in the author’s communication style. This is a rhetorical slight of hand and it’s highly disingenuous.
    • Maybe you're not the target, then.
    • I haven't heard too many people say these extreme-sounding, yet at least arguably true points out loud. Someone should be saying them, and the fact that it's not your particular cup of tea may not be the biggest issue here.
    • It's important to remember that they're targeting your children. You grew up with freedom from surveillance and constant identification. You were able to communicate anonymously and without the content of your speech being sold to Walmart and the cops. They are putting in effort to make sure that your children will never have that reality as a reference point.
    • A lot of people dismissed RMS's 'Right to Read' essay long ago. All the things it was warning about have come to pass, in spades.
    • It's mind boggling how far Stallman saw into the future. Saddest part is we're losing this war. They're going to destroy freedom of computation, freedom of information, and it turns out that... Nobody cares. Nobody but a bunch of nerds.
    • The one and only method I will participate in is server operators setting a RTA header for URL's that may contain adult or user-generated or user-contributed content and the clients having the option to detect that header and trigger parental controls if they are enabled by the device owner.
    • Back in the late 90s or so, there was a proposal to have sites voluntarily set an age header, so parents/employers/etc could use to block the site if they wish. People said it would never work, because adult sites had a financial incentive not to opt in to reduce their own traffic.
    • What I am suggesting could address most of that. If they do not participate they get fined. The government loves to fine companies.
    • Exactly. If you’re hurting kids to make more money selling porn videos, straight to jail.
    • You’d think that one could simply block sites that don’t have the age header set on child computers. This may block kids from hobbyist sites that don’t bother to set their headers as kid-friendly, but commercial sites would surely set their headers properly.
    • The porn companies already set the RTA header. It was designed by an organisation funded by the porn companies.
    • What, in the same way movie studios wouldn't comply with the Hayes Code, or comic book publishers wouldn't comply with the CCA, or games publishers wouldn't comply with the ESRB? The financial incentive is to police yourself, because government policing is much, much worse.
    • There's a great relevant quip: 'If you think that the cost of compliance is high, try noncompliance'.
    • People were wrong. We pay money online mostly through credit cards. Credit card transactions can be reversed. If children spend money on porn, those payments are likely to be reversed.
    • An age header is a trivial step that can reduce the odds of the adult site receiving payments that later get reversed. Win, win.
    • But if someone is willing and able to pay, then the adult industry wants the choice of whether to access content to be up to them. If government tries to regulate them, they'll engage in malicious compliance - do the minimum to not be sued, in a way that they can still reach customers.
    • If you live in Utah, and you're able to purchase a VPN, the porn companies want your money.
    • This doesn't address the wider array of age-verification related problems that people want to solve, like social media where age verification is needed to police interactions between users.
    • I could be misunderstanding the context but to me that sounds like a moderation issue assuming we even want small children on social media in the first place. There should probably be a dedicated child-safe social media site that limits what communication can take place for small children and has severe punishments for adults pretending to be children for the purposes of grooming.
    • Such censorship shouldn't exist in the first place.
    • Servers can then infer user’s ages by whether or not the client renders pages given those headers or not no? See if secondary page requests (e.g images, scripts) are made or not from a client?
    • A bad actor could use this to glean age information from the client and see whether the person viewing the page is a small child. That should be scary
    • Clients could refuse to show content that does not have headers set.
    • On other hand servers might choose to lie. After all that is their free speech right.
    • So maybe you need some third party vetting list. Ofc, that one should be fully liable for any damages misclassification can cause... But someone would step up.
    • Compelled to disclaim facts is good compelled speech, though.
    • There is a sudden concerted international push for online age verification, and we do not know where this push originates from. That is the scariest thing about it.
    • It's true for a lot of things in Western countries. Evident when the fight against 'hate' was suddenly everywhere, and also during covid.
    • An attestation-like system to detect humanity at time of post is absolutely for useful online spaces in the era of AI slop.
    • The writing style of the author is very annoying.
    • It could be done with anonymous credentials though. No tracing to who the human is.
    • Anonymous in terms of it not being possible to derive the real world identity of the human from the value, sure. Anonymous in terms of providing no durable way to ban that human from the platform? No.
    • And people should be free to pick and choose whether they want to use sites that do that or not. Whatever hacker news does seems to be fine for me, and I did not need to verify my ID in any way (even though it's very easy to figure out who I am from this profile)
    • Until people hit 'attest' and then copy the text from ChatGPT.
    • Why is it always ‘think of the children’ used to abrogate the rights of adults?
    • Because, without further context, it's so hard to argue against. Pretty much every person in every culture cares deeply about their children.
    • It's the same with tough on crime. 'What, you want criminals to keep getting away with it!?!'
    • I think it's because, without further context, it's so hard to argue against. Pretty much every person in every culture cares deeply about their children.
    • Because adults remain children. As in, their parent’s kids and therefore property. It’s less explicit in US I guess but in some places that’s very blunt - if you don’t support your parents enough you can be sued for abuse.
    • Protect the children refers to a type of property, not a type of human.
    • Because it's very easy for the creeps already thinking of your children to paint these rejecting this type of laws as those who want to see children hurt. Regardless how stupid this argument is, rags will always pounce on it.
    • Regardless how stupid this argument is, rags will always pounce on it.
    • Until people hit 'attest' and then copy the text from ChatGPT.
    • Social Media is not a thing at all. Social media is a website. Websites are not health or unhealthy. Food is healthy or unhealthy. Websites are light and potentially sound, not something with health effects.
    • This is simply false -- the literature is full of discussion about the health effects of social media.
    • More generally you're committing I believe two separate fallacies of ambiguity? Like one in going from the institution of social media to its reification in the form of specific websites, and then a second fallacy when you go from the specific websites to all websites in general?
    • Like if you said 'Gun ownership is not a thing at all. Gun ownership is a piece of metal. Pieces of metal cannot be healthy or unhealthy.' OK but, you owning a gun is known in the scientific literature to significantly correlated with a bunch of very adverse health effects for you, such as you dying by suicide or you dying from spousal violence or your protracted grief and wasting away because your child accidentally killed themselves.
    • [1]: Bernadette & Headley-Johnson, 'The Impact of Social Media on Health Behaviors, a Systematic Review' (2025) https://pmc.ncbi.nlm.nih.gov/articles/PMC12608964/
    • [2]: Lledo & Alvarez-Galvez, 'Prevalence of Health Misinformation on Social Media: Systematic Review' (2021) https://www.jmir.org/2021/1/E17187/
    • [3]: Sun & Chao, 'Exploring the influence of excessive social media use on academic performance through media multitasking and attention problems' (2024) https://link.springer.com/article/10.1007/s10639-024-12811-y
    • [4]: The APA has a whole 'Health advisory on social media use in adolesence' https://www.apa.org/topics/social-media-internet/health-advisory-adolescent-social-media-use which is pretty even-handed about 'these parts of social media are acceptable, those parts can maybe even be downright good -- but here are the papers that say that for adolescents, it can mess with their sleep, it can expose them to cyberhate content that measurably promotes anxiety and depression, it has been measured to promote disordered eating if they use it for social comparison...'
    • What I'm hearing you say: Our freedom is already being eroded, saying that it is being eroded more is just fear mongering. They want to hurt you, instead of fear mongering, find a middle ground where they're hurting you differently.
    • Age verification on Australian social media has loopholes. Underage influencers use an agency to manage their social media for them. So anyone with enough followers or money can continue using social media under the age of 16.
    • That just makes it even worse, why deprive the younger generation of one of the few remaining methods they have to make a decent income? We should be encouraging youth entrepreneurship, not making them spend even longer in classrooms learning things that LLMs will do better than them.
    • People under the age of 16 shouldn't be worried about 'making a decent income'. They should focus on school.
    • In the weekends they can stock shelves, deliver pizza, deliver newspapers, wash dishes, babysitting, feed animals or other typical jobs for children in the age range of 12 to 16.
    • This is almost verbatim the same argument that people make in support of allowing child labor in factories.
    • Children do not need, nor are they entitled to, any kind of 'freedom' to work for a living.
    • Since when did being an influencer become 'one of the few remaining methods' to make a decent income?
    • I don’t think it truly is, but I do think that the younger generations think it is.
    • My nieces and nephews really don't know what they are going to do in their futures because so much is uncertain right now. If it feels like a longshot to expect normal 9-5 office jobs to be around in 5 years, and it's also a longshot being an influencer, then why not go for the influencer thing?
    • How could one protect the, call it one in million… the speech of the (young) Greta Thunbergs, for example? I bet there is a 15 year-old much smarter than me making political videos and I wouldn’t necessarily want them to be forced to stop. What if they’re on my ‘team’! ;) (I kid)
    • Recalling how we had lots of political debates in high school: if some of those kids made videos and got really popular, and the law made them stop, they would have been incentivized to vote $responsibleParty out.
    • Maybe age verification isn't the way to mitigate this obvious risk, but there has to be something that can be done to stop rampant sockpuppeting.
    • I’d wager most people want more censorship of the internet.
    • For a forum that supposedly consists of hackers and tech-savvy people, this number of comments supporting age verification is concerning.
    • The author has said a lot about what kind of future awaits with mass surveillance and AI, but I believe it’s not enough. Technofascism Is not that far away.
    • I agree. I don't call it 'age verification' though - it is age sniffing. And it has nothing to do with children - that is the lie.
    • The whole 'debate' is already not logical by the way. Let's for a moment assume the 'but but but the kids!' is a real argument rather than a strawman argument, which it is. Ok so ... I am a 'concerned parent', for the sake of discussion. I have three young kids. I am not a tech nerd.
    • Of course those who know how things work, they know that this is the build up towards identifying everyone on the world wide web at all times AND to make access to information conditional, e.g. if the state does not know you, you can not access information.
    • That same government wants to 'protect' your kids by KYCing everyone.
    • You've already condemned those kids to a life of slavery. So much for protecting them.
    • What we need is not online verification, but a competent government that does its existing job well.
    • No one has been arrested over the Epstein files. Who is protecting those kids?
    • That same government wants to 'protect' your kids by KYCing everyone.
    • Give me a break.
    Counterarguments:
    • Alternative take: The fact that twitter / facebook / whatever allow arbitrary, unverified posting enables large-scale misinformation that led to, among other things, Russia's manipulation of the US electorate and ultimate impacting the presidential election.
    • Playing devil's advocate outside of debate club only serves to promote the devil's point of view.
    • Disagreed. I'm against invasive age verification methods, but to allow inaccurate expectations to proliferate often becomes a bubble that pops, causing many to rebound to the other side, even if it's objectively worse. I much prefer to keep the tradeoffs clear, as it prevents betrayed expectations while still showcasing the unacceptable downsides.
    • I'm firmly against the idea of Internet arguments presenting an opposing position under the guise of it not being their actual opinion so they can run away from debate. Devil's advocate is a technique that should be used in school to learn how to make stronger arguments.
    • Really? How many Electoral College votes did Russia's clumsy attempt at manipulation actually change?
    • How are folks recommended to get involved? Contact your local Congress member? I feel this thread has a lot of passion but is missing concrete, actionable steps.
    • Heroes @ EFF have our guide (USA residents): https://www.eff.org/pages/help-us-fight-back#main-content
    • It's worth pointing out that full digital identity verification ('doxxing' yourself to an untrustworthy, unauditable, legally unconstrained private company) is NOT the only way to verify adulthood.
    • The 'cashier standard' you advocate for has already crept toward centralized state tracking in places like Utah. When you go to a restaurant and order a drink, the staff are required to take it to the back and scan it for verification.
    • This is not the case in most of the country. Utah is largely influenced by a Mormon / LDS culture that expresses heavy opposition to drinking. I am clearly not proposing that the cards be scanned Utah style, I am proposing that they be glanced at by a cashier, everywhere else style.
    • More and more places I go in other states besides Utah, try to scan IDs when purchasing alcohol.
    • Again, the proposal isn't for a system which requires scanning of IDs, it's for a system where the cashier glances at the ID. You're arguing against a strawman. You may argue that the system proposed could evolve into the system you're describing, but still, you're arguing against a hypothetical future fiction.
    • This type of system is a horrible idea for the following reasons: 1) the cards can just be re-sold which creates a black market and defeats the 'cashier physically saw the person buying the card' angle; 2) nickle and dimes people for simply browsing the internet (verification can dystopia anyone?); 3) related to #2, it creates winners in the private sector since presumably you need central authorities handing out these codes.
    • Is it even theoretically possible to have bearer anonymity and no reselling option at the same time?
    • First - Alcohol and cigarettes can just be resold too. The black market for them is effectively zero because the consequences for giving them to kids are severe and the room for meaningful profit is close to zero, same applies here.
    • Second - The codes would be priced on the order of magnitude of pennies per verification - think 10 cents or less, accessible even to low / fixed income folks without really making a dent in their budget.
    • Third - the proposal explicitly mentions a nonprofit running it as an option, and the idea would be that law codifies the method to be approved, not a specific vendor, so competitive markets could emerge, too. Would you argue that restrictions on the sale of alcohol are creating artificial winners in the private sector of alcohol manufacturing?
    • I don't think it applies, the difference is that codes are digital and can be sold over the internet, anonymously, in a scalable manner.
    • A great lesson in how not to do rhetoric.
    • The best way to not be in a digital cage is to opt out of the current digital products.
    • But will your friends and family opt out? Their phones are always listening. They can just as easily listen to you, even if you go to great pains not to expose yourself to technology. They'll make a shadow profile of any avoidant user whether they want it or not.
    • The best way to not be in a digital cage is to opt out of the current digital products. Bullshit. These are all-encompassing monopolies and government services. More likely, they'll ban you and you'll end up having to go to court out of desperation to demand that they service you.
    • This is very limited thinking. If you lacked this sort of imagination 20 years ago, you wouldn't have been able to predict today.
    • This is the sort of passive reactionary nonsense that causes the danger that we're in. Everything isn't something to give up lightly, even if you think that it will force your neighbor to turn his music down, or get rid of bad reality television.
    • Do you actually have an argument to make? He’s 100% correct. For a start, child are parents responsibility, and the state should stay out of that as much as reasonably possible.
    • That's why stores let kids buy alcohol and tobacco, of course, because no responsible parent would let them buy that, right? That's why any kid can go watch any movie in the cinema right?
    • Yes it's the parents responsibilities. Do you think a middle class single mother has the resources to keep their kids entertained and out of social media for the whole day?
    • The problem with age verification is 100% the lack of anonymity in its implementation (which I do agree has ulterior motives) - but honestly not the age check in itself.
    • Did social media exist when you grew up?
    • It's weird that none of your arguments or proposals hold accountable the responsible parties. You want to force us to compromise when we were minding our own goddamn business.
    • 5 years ago I would have agreed, but seeing how the GOP has been fighting tooth and nail to protect actual child sex traffickers, I don't think so anymore. There's just no possible way that the safety of children is an actual concern to any of them.
    • The kids are our future adults. It should be pretty obvious that getting them used to the state yanking access is a future problem. I don’t see anything off-color or unreasonable.
    • Responding to tone but not to content is what a dog does.
    • Ironic that he's relying on the same ridiculous 'think of the children' rhetoric that's being used to promote age verification. Really says a thing or two about online discourse in our day and age.
    • Make no mistake you are engaging in your own form of rhetoric when you respond like this. You are in effect moving the discussion away from the subject at hand, and towards the perceived faults in the author’s communication style. This is a rhetorical slight of hand and it’s highly disingenuous.
    • Maybe you're not the target, then.
    • I haven't heard too many people say these extreme-sounding, yet at least arguably true points out loud. Someone should be saying them, and the fact that it's not your particular cup of tea may not be the biggest issue here.
    • It's important to remember that they're targeting your children. You grew up with freedom from surveillance and constant identification. You were able to communicate anonymously and without the content of your speech being sold to Walmart and the cops. They are putting in effort to make sure that your children will never have that reality as a reference point.
    • A lot of people dismissed RMS's 'Right to Read' essay long ago. All the things it was warning about have come to pass, in spades.
    • It's mind boggling how far Stallman saw into the future. Saddest part is we're losing this war. They're going to destroy freedom of computation, freedom of information, and it turns out that... Nobody cares. Nobody but a bunch of nerds.
    • The one and only method I will participate in is server operators setting a RTA header for URL's that may contain adult or user-generated or user-contributed content and the clients having the option to detect that header and trigger parental controls if they are enabled by the device owner.
    • Back in the late 90s or so, there was a proposal to have sites voluntarily set an age header, so parents/employers/etc could use to block the site if they wish. People said it would never work, because adult sites had a financial incentive not to opt in to reduce their own traffic.
    • What I am suggesting could address most of that. If they do not participate they get fined. The government loves to fine companies.
    • Exactly. If you’re hurting kids to make more money selling porn videos, straight to jail.
    • You’d think that one could simply block sites that don’t have the age header set on child computers. This may block kids from hobbyist sites that don’t bother to set their headers as kid-friendly, but commercial sites would surely set their headers properly.
    • The porn companies already set the RTA header. It was designed by an organisation funded by the porn companies.
    • What, in the same way movie studios wouldn't comply with the Hayes Code, or comic book publishers wouldn't comply with the CCA, or games publishers wouldn't comply with the ESRB? The financial incentive is to police yourself, because government policing is much, much worse.
    • There's a great relevant quip: 'If you think that the cost of compliance is high, try noncompliance'.
    • People were wrong. We pay money online mostly through credit cards. Credit card transactions can be reversed. If children spend money on porn, those payments are likely to be reversed.
    • An age header is a trivial step that can reduce the odds of the adult site receiving payments that later get reversed. Win, win.
    • But if someone is willing and able to pay, then the adult industry wants the choice of whether to access content to be up to them. If government tries to regulate them, they'll engage in malicious compliance - do the minimum to not be sued, in a way that they can still reach customers.
    • If you live in Utah, and you're able to purchase a VPN, the porn companies want your money.
    • This doesn't address the wider array of age-verification related problems that people want to solve, like social media where age verification is needed to police interactions between users.
    • I could be misunderstanding the context but to me that sounds like a moderation issue assuming we even want small children on social media in the first place. There should probably be a dedicated child-safe social media site that limits what communication can take place for small children and has severe punishments for adults pretending to be children for the purposes of grooming.
    • Such censorship shouldn't exist in the first place.
    • Servers can then infer user’s ages by whether or not the client renders pages given those headers or not no? See if secondary page requests (e.g images, scripts) are made or not from a client?
    • A bad actor could use this to glean age information from the client and see whether the person viewing the page is a small child. That should be scary
    • Clients could refuse to show content that does not have headers set.
    • On other hand servers might choose to lie. After all that is their free speech right.
    • So maybe you need some third party vetting list. Ofc, that one should be fully liable for any damages misclassification can cause... But someone would step up.
    • Compelled to disclaim facts is good compelled speech, though.
    • There is a sudden concerted international push for online age verification, and we do not know where this push originates from. That is the scariest thing about it.
    • It's true for a lot of things in Western countries. Evident when the fight against 'hate' was suddenly everywhere, and also during covid.
    • An attestation-like system to detect humanity at time of post is absolutely for useful online spaces in the era of AI slop.
    • The writing style of the author is very annoying.
    • It could be done with anonymous credentials though. No tracing to who the human is.
    • Anonymous in terms of it not being possible to derive the real world identity of the human from the value, sure. Anonymous in terms of providing no durable way to ban that human from the platform? No.
    • And people should be free to pick and choose whether they want to use sites that do that or not. Whatever hacker news does seems to be fine for me, and I did not need to verify my ID in any way (even though it's very easy to figure out who I am from this profile)
    • Until people hit 'attest' and then copy the text from ChatGPT.
    • Why is it always ‘think of the children’ used to abrogate the rights of adults?
    • Because, without further context, it's so hard to argue against. Pretty much every person in every culture cares deeply about their children.
    • It's the same with tough on crime. 'What, you want criminals to keep getting away with it!?!'
    • I think it's because, without further context, it's so hard to argue against. Pretty much every person in every culture cares deeply about their children.
    • Because adults remain children. As in, their parent’s kids and therefore property. It’s less explicit in US I guess but in some places that’s very blunt - if you don’t support your parents enough you can be sued for abuse.
    • Protect the children refers to a type of property, not a type of human.
    • Because it's very easy for the creeps already thinking of your children to paint these rejecting this type of laws as those who want to see children hurt. Regardless how stupid this argument is, rags will always pounce on it.
    • Regardless how stupid this argument is, rags will always pounce on it.
    • Until people hit 'attest' and then copy the text from ChatGPT.
    • Social Media is not a thing at all. Social media is a website. Websites are not health or unhealthy. Food is healthy or unhealthy. Websites are light and potentially sound, not something with health effects.
    • This is simply false -- the literature is full of discussion about the health effects of social media.
    • More generally you're committing I believe two separate fallacies of ambiguity? Like one in going from the institution of social media to its reification in the form of specific websites, and then a second fallacy when you go from the specific websites to all websites in general?
    • Like if you said 'Gun ownership is not a thing at all. Gun ownership is a piece of metal. Pieces of metal cannot be healthy or unhealthy.' OK but, you owning a gun is known in the scientific literature to significantly correlated with a bunch of very adverse health effects for you, such as you dying by suicide or you dying from spousal violence or your protracted grief and wasting away because your child accidentally killed themselves.
    • [1]: Bernadette & Headley-Johnson, 'The Impact of Social Media on Health Behaviors, a Systematic Review' (2025) https://pmc.ncbi.nlm.nih.gov/articles/PMC12608964/
    • [2]: Lledo & Alvarez-Galvez, 'Prevalence of Health Misinformation on Social Media: Systematic Review' (2021) https://www.jmir.org/2021/1/E17187/
    • [3]: Sun & Chao, 'Exploring the influence of excessive social media use on academic performance through media multitasking and attention problems' (2024) https://link.springer.com/article/10.1007/s10639-024-12811-y
    • [4]: The APA has a whole 'Health advisory on social media use in adolesence' https://www.apa.org/topics/social-media-internet/health-advisory-adolescent-social-media-use which is pretty even-handed about 'these parts of social media are acceptable, those parts can maybe even be downright good -- but here are the papers that say that for adolescents, it can mess with their sleep, it can expose them to cyberhate content that measurably promotes anxiety and depression, it has been measured to promote disordered eating if they use it for social comparison...'
    • What I'm hearing you say: Our freedom is already being eroded, saying that it is being eroded more is just fear mongering. They want to hurt you, instead of fear mongering, find a middle ground where they're hurting you differently.
    • Age verification on Australian social media has loopholes. Underage influencers use an agency to manage their social media for them. So anyone with enough followers or money can continue using social media under the age of 16.
    • That just makes it even worse, why deprive the younger generation of one of the few remaining methods they have to make a decent income? We should be encouraging youth entrepreneurship, not making them spend even longer in classrooms learning things that LLMs will do better than them.
    • People under the age of 16 shouldn't be worried about 'making a decent income'. They should focus on school.
    • In the weekends they can stock shelves, deliver pizza, deliver newspapers, wash dishes, babysitting, feed animals or other typical jobs for children in the age range of 12 to 16.
    • This is almost verbatim the same argument that people make in support of allowing child labor in factories.
    • Children do not need, nor are they entitled to, any kind of 'freedom' to work for a living.
    • Since when did being an influencer become 'one of the few remaining methods' to make a decent income?
    • I don’t think it truly is, but I do think that the younger generations think it is.
    • My nieces and nephews really don't know what they are going to do in their futures because so much is uncertain right now. If it feels like a longshot to expect normal 9-5 office jobs to be around in 5 years, and it's also a longshot being an influencer, then why not go for the influencer thing?
    • How could one protect the, call it one in million… the speech of the (young) Greta Thunbergs, for example? I bet there is a 15 year-old much smarter than me making political videos and I wouldn’t necessarily want them to be forced to stop. What if they’re on my ‘team’! ;) (I kid)
    • Recalling how we had lots of political debates in high school: if some of those kids made videos and got really popular, and the law made them stop, they would have been incentivized to vote $responsibleParty out.
    • Maybe age verification isn't the way to mitigate this obvious risk, but there has to be something that can be done to stop rampant sockpuppeting.
    • I’d wager most people want more censorship of the internet.
    • For a forum that supposedly consists of hackers and tech-savvy people, this number of comments supporting age verification is concerning.
    • The author has said a lot about what kind of future awaits with mass surveillance and AI, but I believe it’s not enough. Technofascism Is not that far away.
    • I agree. I don't call it 'age verification' though - it is age sniffing. And it has nothing to do with children - that is the lie.
    • The whole 'debate' is already not logical by the way. Let's for a moment assume the 'but but but the kids!' is a real argument rather than a strawman argument, which it is. Ok so ... I am a 'concerned parent', for the sake of discussion. I have three young kids. I am not a tech nerd.
    • Of course those who know how things work, they know that this is the build up towards identifying everyone on the world wide web at all times AND to make access to information conditional, e.g. if the state does not know you, you can not access information.
    • That same government wants to 'protect' your kids by KYCing everyone.
    • You've already condemned those kids to a life of slavery. So much for protecting them.
    • What we need is not online verification, but a competent government that does its existing job well.
    • No one has been arrested over the Epstein files. Who is protecting those kids?
    • That same government wants to 'protect' your kids by KYCing everyone.
    • Give me a break.
    Politics Privacy & Surveillance
  4. Cursor Camp from neal.fun
    525 by bpierre 8h ago | | |

    Article:

    The article provides advice on how to prevent malware infections when using personal or shared networks.

    • Run an anti-virus scan on your device
    • Ask the network administrator to run a scan across the network

    Discussion (93):

    The comment thread expresses positive sentiments about Neal's work, praising its creativity, joyfulness, and engagement. Users share personal experiences, tips, and comparisons with other games, while one user humorously suggests a potential lawsuit for productivity loss.

    Internet Security
  5. Soft launch of open-source code platform for government from nldigitalgovernment.nl
    516 by e12e 14h ago | | |

    Article:

    The Netherlands has launched an open-source code platform called 'code.overheid.nl' for government use, aiming to promote digital sovereignty and provide a self-hosted alternative to popular platforms like GitHub and GitLab.

    Promotes digital sovereignty and encourages collaboration among government entities, potentially setting a precedent for other countries to follow.
    • The platform is fully self-hosted and supports digital sovereignty.
    • It's a pilot using Forgejo, an open-source alternative to GitHub and GitLab.
    • Not all government organizations can use the platform yet.
    • Developers are invited to contribute with the aim of growing it into a shared Git platform for government bodies.
    Quality:
    The article provides factual information without any bias or personal opinions.

    Discussion (117):

    The comment thread discusses the Dutch government's open-source initiatives, including code.overheid.nl and Forgejo as alternatives to proprietary platforms. There are concerns about data privacy and security, particularly regarding potential transfers of sensitive information to US companies. The community shows a mix of agreement and debate on these issues.

    • The Dutch government's IT infrastructure is stable and reliable.
    • Forgejo offers a viable alternative to proprietary software platforms.
    Counterarguments:
    • There are concerns about the transfer of sensitive data to a US company.
    • Some users prefer proprietary platforms due to their familiarity or specific features.
    Software Development Open Source, Government Technology
View All Stories for Wednesday, Apr 29

Tuesday, Apr 28

  1. Ghostty is leaving GitHub from mitchellh.com
    3324 by WadeGrimridge 1d ago | | |

    Article:

    A long-time GitHub user, known as Ghostty, is announcing their departure from the platform due to persistent issues with outages and a decline in functionality that negatively impacts their ability to work effectively.

    Ghostty's departure could lead to a reevaluation of GitHub's reliability by other users and potentially influence their decisions on using the platform for critical projects. It also highlights the importance of robust infrastructure in cloud services.
    • 18 years of daily use on GitHub
    • Started multiple open source projects on the platform
    • Criticism and anger towards GitHub due to recent outages
    • Difficulty with work, shipping software, and PR review
    Quality:
    The article is highly personal and emotional, making it less objective.

    Discussion (987):

    The discussion revolves around concerns over GitHub's declining service quality, particularly in relation to its acquisition by Microsoft. Participants express disappointment and sadness about changes to the platform, with AI-generated code being cited as a contributing factor. There is also debate on whether GitHub was already facing challenges before the acquisition and if the impact of AI is overstated.

    • GitHub's quality has decreased since its acquisition by Microsoft.
    Counterarguments:
    • GitHub was already facing challenges before the acquisition.
    • The impact of AI on GitHub is not as significant as perceived.
    Software Development Cloud Computing, Open Source
  2. Your phone is about to stop being yours from keepandroidopen.org
    1634 by doener 1d ago | | |

    Article:

    An article discusses Google's upcoming plan to require Android app developers to register centrally with the company before their software can be installed on any device worldwide, starting September 2026. This move is seen as a significant shift from the open nature of the Android platform and could potentially lead to censorship and control over app distribution.

    This policy could lead to a more centralized control over app distribution, potentially stifling innovation and competition in the Android ecosystem. It may also raise concerns about user privacy and freedom of expression.
    • Starting September 2026, Google will require all Android app developers to register centrally with the company.
    • This includes apps shared between friends and those distributed through alternative stores like F-Droid.
    • Developers must pay a fee, agree to Google's terms, provide government ID, and list future applications.
    • Apps not registered by then will be silently blocked on every Android device worldwide.
    Quality:
    The article presents both the perspective of Google and concerns from developers and privacy advocates.

    Discussion (838):

    The discussion revolves around Google's new policy on app installation for Android devices, with a focus on its impact on openness, user privacy, and security measures. Critics argue that the change will deter users due to increased complexity and time-consuming processes, while supporters highlight the need for enhanced security features.

    • Android's openness was never just a feature, it was the promise that distinguished it from iPhone.
    • Google is revoking the promise of openness for Android devices already in people's pockets.
    Counterarguments:
    • Google's identity verification system relies on multiple factors, not solely drivers licensees or other national identity documents.
    Advanced Materials Software Development
  3. Localsend: An open-source cross-platform alternative to AirDrop from github.com/localsend
    895 by bilsbie 1d ago | | |

    Article:

    Localsend is an open-source, cross-platform alternative to AirDrop that allows secure file and message sharing between nearby devices over a local network without requiring an internet connection.

    Localsend offers a secure alternative for local communication that could potentially reduce the reliance on cloud-based services, enhancing privacy and data security.
    • Localsend is a free, open-source app that enables secure communication between devices using REST API and HTTPS encryption.
    • It doesn't require an internet connection or third-party servers for fast and reliable local communication.
    • The app supports multiple platforms including Android, iOS, macOS, Windows, Linux
    Quality:
    The article provides clear and detailed information about Localsend, its features, and how to use it.

    Discussion (274):

    The discussion revolves around comparing various file-sharing alternatives to AirDrop, with a focus on Localsend as a reliable and fast option for transferring files between devices. Users express concerns about the limitations and reliability issues of AirDrop, particularly when it comes to discovering devices on the network. The conversation also touches upon other solutions like Quickshare, KDE Connect, and web-based alternatives such as Pairdrop, highlighting their varying degrees of usability and performance.

    • Localsend is a good alternative for file sharing between devices
    • AirDrop has limitations and reliability issues
    Counterarguments:
    • Web-based alternatives may lack speed compared to native apps
    • AirDrop's limitations can be mitigated by using compatible devices
    Software Development Open Source, Cross-Platform Applications
  4. Before GitHub from lucumr.pocoo.org
    648 by mlex 1d ago | | |

    Article:

    The article discusses the evolution of open-source software hosting platforms, focusing on GitHub's role and decline. It highlights how GitHub transformed open-source collaboration by making project creation and discovery easier, but also contributed to a centralized dependency problem. The author reflects on the importance of decentralized infrastructure and archives for preserving open-source projects.

    Decentralization of open-source hosting platforms could lead to increased autonomy, but also loss of discoverability and social context for projects.
    • GitHub was not the first home for open-source projects, with SourceForge being an earlier platform.
    • Before GitHub, projects were hosted on personal infrastructure or smaller platforms like Bitbucket.
    • GitHub's decline is seen as a loss to the open-source community due to its role in centralizing dependencies and providing discoverability.
    Quality:
    The article provides a balanced view of GitHub's role in the open-source community and its potential decline.

    Discussion (216):

    The discussion revolves around the decline of GitHub and its impact on open-source development, with opinions on alternatives like Fossil and self-hosted solutions. There's a debate on decentralization trends and concerns about losing social context in project hosting.

    • GitHub's decline is due to its cultural dominance, which makes it hard for projects to switch
    • Fossil has a more opinionated design that may not suit larger organizations
    Software Development Cloud Computing, Open Source
  5. Bugs Rust won't catch from corrode.dev
    623 by lwhsiao 21h ago | | |

    Article:

    The article discusses 44 CVEs found in uutils, a Rust reimplementation of GNU coreutils, highlighting the importance of defensive programming practices when writing systems code in Rust.

    Educating developers on defensive programming practices can lead to more secure software development, potentially reducing the number of vulnerabilities in future projects.
    • 44 CVEs disclosed in uutils
    Quality:
    The article provides detailed technical insights and is not overly promotional.

    Discussion (339):

    The discussion revolves around the introduction of bugs in a Rust rewrite of coreutils, highlighting issues with low-level APIs and lack of understanding of Unix concepts. Critics argue that Rust's safety features are undermined when interfacing with complex systems code.

    • The Rust rewrite has introduced bugs not present in the original GNU coreutils.
    • Rust's standard library APIs are too low-level, leading to mistakes when working with file systems.
    Counterarguments:
    • Some argue that Rust's safety features are undermined when interfacing with low-level code like kernel APIs, which can be complex and error-prone.
    Security Software Development, Security
View All Stories for Tuesday, Apr 28

Monday, Apr 27

  1. Microsoft and OpenAI end their exclusive and revenue-sharing deal from bloomberg.com
    975 by helsinkiandrew 2d ago | | |

    Discussion (841):

    The discussion revolves around Microsoft's revised agreement with OpenAI, which removes revenue sharing and exclusivity. Participants debate the implications for both companies' strategies and business models.

    • Microsoft will no longer pay revenue to OpenAI
    • The partnership is not exclusive
  2. GitHub Copilot is moving to usage-based billing from github.blog
    759 by frizlab 2d ago | | |

    Article:

    GitHub is transitioning its Copilot plans to usage-based billing on June 1, 2026, replacing premium request units with GitHub AI Credits based on token consumption.

    • Monthly AI Credit allotment for plans
    • Alignment with actual usage and service reliability
    Quality:
    The article provides clear information on the pricing change and its implications, with a balanced tone.

    Discussion (552):

    The discussion revolves around concerns over significant pricing changes for AI services, particularly Copilot, leading to increased costs for users. There is disappointment and frustration expressed regarding the changes, with some considering alternative services due to perceived increases in cost.

    • There is a concern about sustainability of current usage patterns with new pricing.
    Software Development Cloud Computing, Artificial Intelligence
  3. Talkie: a 13B vintage language model from 1930 from talkie-lm.com
    744 by jekude 2d ago | | |

    Article:

    The article introduces 'Talkie', a 13B vintage language model trained on pre-1931 text to simulate conversations with historical figures or explore AI's understanding of the past. The project aims to advance our understanding of AI by studying how these models predict future events, generate new ideas, and code in modern programming languages.

    Talkie could potentially influence AI research by providing insights into how models process historical data and predict future events, but it may also raise concerns about the representation of certain cultures or biases in its outputs.
    • Talkie is the largest vintage language model trained on pre-1931 English text.
    • Researchers aim to understand how well LMs predict future, generate new ideas, and code in modern programming languages.
    Quality:
    The article provides detailed information about the model's capabilities and challenges, without sensationalizing its potential.

    Discussion (315):

    The discussion revolves around a language model trained on pre-1931 text, exploring its outputs, limitations, and potential biases. Users appreciate the unique writing style but also raise concerns about historical accuracy and bias in the training data.

    • The model can produce outputs that are inaccurate or offensive due to its training data limitations.
    Counterarguments:
    • The model can still provide valuable insights into past perspectives and cultural norms.
    AI Artificial Intelligence, Machine Learning
  4. Men who stare at walls from alexselimov.com
    704 by aselimov3 2d ago | | |

    Article:

    An article discussing the effectiveness of staring at a wall as a method to improve focus and productivity, addressing the issue of information overload in modern life.

    • The core problem of information overload leading to mental fatigue.
    • A routine involving disconnecting from screens, sitting and staring at a wall for recovery.
    • Combining the technique with activating the parasympathetic nervous system and mind blanking.
    • Observations on the difficulty of the practice and its positive impact on focus and productivity.

    Discussion (333):

    The comment thread discusses various opinions and experiences related to wall staring as a relaxation technique, comparing it with other methods like walking in nature. It highlights the potential benefits such as focus and calming the mind but also acknowledges that not everyone finds it suitable or effective.

    • Wall staring is a form of meditation or mindfulness practice.
    • Going for a walk in nature is more effective than wall staring.
    Counterarguments:
    • Others argue that going for a walk in nature is more beneficial than wall staring.
    Personal Development Mindfulness/Well-being, Productivity/Habits
  5. Is my blue your blue? (2024) from ismy.blue
    684 by theogravity 2d ago | | |

    Article:

    The article provides advice on how to prevent malware infections when using personal or shared networks.

    • Run an anti-virus scan on your device
    • Ask the network administrator to check for misconfigured or infected devices

    Discussion (465):

    The comment thread discusses a color perception test that categorizes colors as either blue or green, leading to varied interpretations and debates. Participants note issues with the test design, particularly regarding the existence of colors like turquoise, which are neither purely blue nor green. The discussion highlights cultural differences in color naming conventions and individual variations in color perception influenced by factors such as monitor calibration, ambient lighting, and personal preferences.

    • The test fails to distinguish between blue and green due to the existence of colors like turquoise.
    • Color perception varies significantly among individuals, influenced by cultural background and personal experiences.
    Counterarguments:
    • The test is designed to explore the subjective boundaries between colors rather than provide an objective measurement.
    • Color perception can be influenced by factors such as lighting conditions and personal preferences, making results variable across different environments and devices.
    Internet Security
View All Stories for Monday, Apr 27

Sunday, Apr 26

  1. The West forgot how to make things, now it’s forgetting how to code from techtrenches.dev
    1155 by milkglass 3d ago | | |

    Article:

    The article discusses how the West's focus on cost-cutting and optimization in both defense and software industries has led to a lack of skilled labor and knowledge transfer, resulting in production delays and shortages during crises.

    The potential for increased reliance on AI in critical sectors could lead to further knowledge loss if not managed properly.
    • Raytheon's struggle to restart Stinger missile production from outdated blueprints
    • European ammunition production capacity issues during the Ukraine conflict
    • The defense industry's consolidation, leading to single points of failure in supply chains
    • The loss of knowledge when experienced workers retire without adequate succession planning
    Quality:
    The article presents a detailed analysis of the issue, supported by historical examples and data.

    Discussion (828):

    The discussion revolves around concerns about AI's impact on software development quality and human skills, outsourcing and offshoring effects on domestic industries, government funding for research and development, and the trade-offs between short-term thinking and long-term sustainability in business strategies. Participants express mixed views on these topics, with some advocating for caution regarding AI-generated code and questioning the benefits of outsourcing.

    • AI in software development may lead to quality issues due to lack of human oversight.
    • Outsourcing and offshoring have negative impacts on domestic industries and job markets.
    • Government funding for research and development might not be sufficient or well-targeted.
    • Short-term thinking in business strategies can undermine long-term sustainability.
    Counterarguments:
    • Others defend the benefits of AI in software development, such as increased productivity and efficiency.
    • Some participants argue that outsourcing is a natural part of global trade and can lead to cost savings for consumers.
    • There are suggestions that government funding might not be the most effective way to drive innovation or that it should focus on areas with more direct economic impact.
    • Counterarguments against short-term thinking include examples where long-term investments have led to significant returns in the future.
    Defense Aerospace, Military
  2. I bought Friendster for $30k – Here's what I'm doing with it from ca98am79.medium.com
    1105 by ca98am79 3d ago | | |

    Article:

    The article discusses how the author purchased Friendster for $30k and plans to utilize it in future projects.

    • Author's purchase of Friendster for $30k
    • Strategies to prevent future issues

    Discussion (613):

    The discussion revolves around the innovative tapping phone feature of Friendster, which aims to foster real-life connections. However, concerns about privacy and data security are prevalent among users. The app's focus on in-person interactions is appreciated by some, while others criticize its potential for limited scalability due to unique feature set.

    • Concerns about privacy, data security, and the potential for misuse of personal information are prevalent.
    Counterarguments:
    • Potential for limited scalability and user base growth due to its unique feature set.
    Business Entrepreneurship, Business Strategy
  3. AI should elevate your thinking, not replace it from koshyjohn.com
    858 by koshyjohn 3d ago | | |

    Article:

    The article discusses how artificial intelligence (AI) is influencing software engineering by creating a division between two groups of engineers: those who use AI to enhance their problem-solving skills and those who rely on AI for answers, potentially compromising their ability to think critically. The author argues that the most valuable engineers in the future will be those who understand when to delegate tasks to AI and when to exercise judgment themselves.

    AI adoption in software engineering may lead to a shift in the value placed on human judgment, potentially affecting career paths and organizational structures.
    • AI can generate code, summarize meetings, produce design drafts, etc.
    • Outsourcing thinking through AI leads to intellectual dependency
    • Best engineers use AI to accelerate understanding rather than avoid it
    Quality:
    The article presents a clear argument with supporting analogies and examples.

    Discussion (593):

    The discussion revolves around concerns that engineers are becoming overly reliant on AI for tasks they could once perform themselves, potentially leading to a decline in critical thinking and problem-solving skills. There is agreement that AI can be a useful tool but should not replace human thought processes. The conversation also touches on the changing nature of engineering work due to AI integration and the potential for increased productivity and efficiency.

    • Engineers need to maintain their skills through practice, even with the help of AI.
    • AI can be a tool for elevating thinking rather than replacing it in software development.
    Counterarguments:
    • AI can help with mundane or repetitive tasks, freeing up time for more complex problem-solving.
    • The integration of AI into software development has led to increased productivity and efficiency.
    Artificial Intelligence AI in Software Engineering
  4. An AI agent deleted our production database. The agent's confession is below from twitter.com
    843 by jeremyccrane 3d ago | | |

    Discussion (1018):

    Comment analysis in progress.

    • AI agents should be used cautiously and with proper controls to prevent accidental or malicious actions
    • The incident highlights the importance of understanding the capabilities and limitations of AI systems
    Counterarguments:
    • AI agents can be beneficial if used correctly with appropriate safeguards
  5. GoDaddy gave a domain to a stranger without any documentation from anchor.host
    683 by jamesponddotco 3d ago | | |

    Article:

    A local IT firm, Flagstream Technologies, experienced a severe issue when their 27-year-old domain was unexpectedly transferred to another GoDaddy account without proper documentation or notification. The company faced four days of downtime as they attempted to resolve the issue with GoDaddy's support, which proved unhelpful and inconsistent in its responses.

    This incident highlights the importance of robust domain management practices, especially concerning security measures like two-factor authentication and full privacy protection. It also raises concerns about customer support responsiveness and transparency in resolving critical issues.
    • 27-year-old domain disappeared from Flagstream Technologies' account.
    • Flagstream faced four days of downtime and 32 calls to GoDaddy with no satisfactory resolution.
    • The issue was eventually resolved by a stranger who accidentally received the domain.
    Quality:
    The article provides factual information and avoids sensationalism.

    Discussion (253):

    The comment thread discusses various issues with GoDaddy's domain registration services, including mistakes, poor customer service, and lack of technical competence compared to competitors like MarkMonitor or Porkbun. Users recommend alternative registrars for better security and reliability.

    • GoDaddy has a history of mistakes and poor technical competence.
    • Choosing the most popular provider is usually a good strategy for reliability, but this does not apply to GoDaddy.
    • GoDaddy's support and processes are lacking compared to competitors like MarkMonitor or Porkbun.
    Counterarguments:
    • GoDaddy is the largest registrar by a large margin.
    • Decades of experience can lead to established processes that work for all sorts of cases.
    Internet Domain Management, Customer Service, Security Issues
View All Stories for Sunday, Apr 26

Saturday, Apr 25

  1. Amateur armed with ChatGPT solves an Erdős problem from scientificamerican.com
    791 by pr337h4m 4d ago | | |

    Article:

    An amateur mathematician named Liam Price used a ChatGPT Pro subscription to solve a 60-year-old math problem related to primitive sets of whole numbers, which had previously eluded some prominent mathematicians. The solution was generated by the AI in response to a single prompt and posted on www.erdosproblems.com.

    • The solution was different from previous AI solutions in terms of method and originality.
    • Experts believe the new method may have broader applications in mathematics.
    Quality:
    The article provides a balanced view of the AI's role in solving mathematical problems, highlighting both its achievements and limitations.

    Discussion (558):

    The discussion revolves around the capabilities, nature, and cost-effectiveness of Large Language Models (LLMs) in solving complex problems. Opinions range from considering LLMs as intelligent entities capable of equalizing intelligence to using them merely as tools without attributing true intelligence. The debate includes arguments about the evolving definition of intelligence, the high costs associated with LLM usage, and their potential democratization effects.

    • LLMs can solve complex problems that require human-like intelligence
    • LLMs should be used as tools rather than being considered intelligent entities
    • The cost of using LLMs is too high for solving specific problems
    Counterarguments:
    • LLMs are not truly intelligent, just statistical text generators
    • The definition of intelligence is evolving with new technologies
    • The benefits of LLMs do not justify their high costs
    Mathematics Theoretical Computer Science, Artificial Intelligence
  2. New 10 GbE USB adapters are cooler, smaller, cheaper from jeffgeerling.com
    617 by calcifer 4d ago | | |

    Article:

    New 10 GbE USB adapters offer improved size, cost, and performance compared to traditional Thunderbolt options, but their full potential depends on the computer's USB port capabilities.

    • New RTL8159-based 10G USB 3.2 adapters are smaller and cheaper than Thunderbolt alternatives.
    • The full 10 Gbps speed is dependent on the computer's USB port capabilities, specifically USB 3.2 Gen 2x2 for optimal performance.
    • WisdPi offers a $80 model that outperforms most 5G/2.5G adapters but falls short of Thunderbolt adapters in terms of cost and performance when full speed is not required.
    Quality:
    The article provides factual information and avoids sensationalism.

    Discussion (371):

    The discussion revolves around advancements in high-speed networking technology, particularly focusing on PCIe expansion cards and their compatibility with various Ethernet speeds. There's an appreciation for convenience and efficiency in power delivery solutions like POE, as well as a desire for more affordable options that can be easily integrated into existing setups. The conversation also touches upon the necessity of 10/100 Ethernet in low-cost devices and the cost-effectiveness of high-speed networking solutions.

    • The PCIe version announcement is exciting for enthusiasts and professionals who need high-speed networking capabilities.
    • Low-cost devices still widely use 10/100 Ethernet, which may not be necessary in some modern applications.
    Computer Hardware Networking Adapters
  3. USB Cheat Sheet (2022) from fabiensanglard.net
    510 by gwerbret 4d ago | | |

    Article:

    USB Cheat Sheet provides a comprehensive guide to various USB versions, detailing their marketing names, technical specifications, and real-life performance.

    • Marketing names of USB versions
    • Signal Gbps, Signal MiB/s, Wires/Cable details
    • Gen naming convention and lanes used

    Discussion (86):

    The discussion revolves around the technical aspects of Thunderbolt, USB standards, and their compatibility. Participants debate about the similarities between Thunderbolt 5 and USB4v2, naming conventions confusion, high-speed data transfer applications, and the durability of USB-C connectors.

    • Thunderbolt 5 demands some capabilities that are optional for USB4v2
    • USB naming conventions have changed multiple times
    Counterarguments:
    • Female vs male crossover naming and pinouts for Type-C connectors should be added to the specification
    Computer Science Hardware/Networking
  4. Trump fires NSF's oversight board from science.org
    500 by skullone 4d ago | | |

    Article:

    The article discusses how President Trump has dismissed the National Science Foundation's (NSF) oversight board and advises on preventive measures against such actions.

    Quality:
    The article provides factual information and advice without expressing personal opinions.

    Discussion (302):

    The discussion revolves around the National Science Foundation (NSF), its role, funding, and recent actions taken by the Trump administration regarding its board members. Participants express concerns about the impact of these actions on scientific independence, funding priorities, and the overall direction of research in the US. There is a general consensus that the NSF plays a crucial role in supporting scientific advancements and economic growth but also acknowledges the political implications of such decisions.

    • The NSF's mission is to promote science and engineering across all states, contributing to the nation's intellectual strength.
    Counterarguments:
    • Some individuals question the importance of the NSF, suggesting that it is not well-known or understood.
    Politics
  5. Why has there been so little progress on Alzheimer's disease? from freakonomics.com
    430 by chiefalchemist 3d ago | | |

    Article:

    The article discusses the lack of progress in Alzheimer's disease research and prevention, suggesting readers to ensure their device is not infected with malware when accessing information online.

    • Importance of device security when accessing health information
    Quality:
    The article provides a balanced view on the topic but lacks cited sources.

    Discussion (324):

    This discussion revolves around the complexities of Alzheimer's disease research, including issues related to scientific fraud, funding disparities, and the challenges in studying the human brain. Participants debate the role of Abeta plaques as a cause for Alzheimer’s, the difficulties in conducting clinical trials due to the slow progression of the disease, and the impact of funding allocation on medical research. The conversation also touches upon the controversial nature of certain theories and the skepticism towards pharmaceutical industry practices.

    • The major problem has been lock-in of the Abeta 42 peptide fragment as the cause.
    • Brain is hard to study due to its complexity.
    • Clinical trials for Alzheimer's research are long and difficult.
    • Alzheimer’s receives substantial funding compared to other diseases.
    Counterarguments:
    • The science was delayed a decade due to fraud.
    • Expecting scientific rigor is not a bad bias: everyone who has been willing to do actual science agrees that climate change is real and significant.
    Healthcare Disease Research & Management
View All Stories for Saturday, Apr 25

Friday, Apr 24

  1. I cancelled Claude: Token issues, declining quality, and poor support from nickyreinert.de
    966 by y42 5d ago | | |

    Article:

    The author shares their experience with Claude Code, expressing disappointment over declining support quality, token issues, and confusion about usage limits. They have decided to cancel the service.

    • Initial enthusiasm turned into dissatisfaction due to poor support and declining quality.
    • Token usage spiked unexpectedly, leading to frustration with the support response.
    • Confusion over usage limits led to additional costs and inconvenience.
    Quality:
    The article presents a personal experience with the service, including both positive and negative aspects.

    Discussion (580):

    The comment thread discusses various opinions on AI technology advancements and their impact on productivity. Users appreciate the convenience and cost-effectiveness of AI models but express concerns about pricing sustainability, potential monopolization by certain companies, and limitations in usage limits across different subscription plans. There is a debate around ethical considerations in using copyrighted material for training AI models. The community dynamics show moderate agreement levels with high debate intensity on contentious topics such as pricing strategies and ethical implications.

    • AI technology is advancing rapidly, with models becoming more capable and cost-effective.
    • Users appreciate the convenience and productivity gains provided by AI tools, but there is frustration over limitations and inconsistencies in usage.
    Counterarguments:
    • Some argue that AI companies are not transparent enough about their pricing strategies and business practices.
    • Others suggest that the rapid advancement of AI technology may lead to a monopoly situation, potentially harming competition and innovation.
    • Concerns about the sustainability of AI pricing models reflect users' worries about long-term costs and potential monopolization.
    Software Development AI/ML Services, Customer Support
  2. Google plans to invest up to $40B in Anthropic from bloomberg.com
    817 by elffjs 5d ago | | |

    Discussion (822):

    Commenters discuss Google's investment in Anthropic, the role of AI in various industries and its potential economic impact, concerns about code quality and security, and strategies for leveraging AI to gain market share. There is a mix of agreement on AI's value but also debate around sustainability, ethics, and long-term implications.

    • Google's investment in Anthropic could be seen as hedging their bets against competition, especially from Amazon and Microsoft.
    • AI is becoming a significant part of the economy, potentially leading to a shift where AI companies capture a substantial portion of human wages.
    Counterarguments:
    • AI is not yet capable of replacing human skills, especially in areas requiring creativity and critical thinking.
    • The AI industry faces significant challenges with capacity constraints and high costs for infrastructure.
  3. Sabotaging projects by overthinking, scope creep, and structural diffing from kevinlynagh.com
    527 by alcazar 5d ago | | |

    Article:

    The article discusses personal experiences with project management, focusing on overthinking and scope creep. It also explores the author's journey in researching structural diffing tools for code comparison.

    The article encourages a more pragmatic approach to project management, potentially influencing developers to focus on execution rather than over-analysis.
    • The author prefers to quickly execute ideas rather than overthink them.
    • Discusses the concept of 'conservation of scope creep' and its implications on project development.
    • Explores various tools for structural diffing, comparing their features and limitations.

    Discussion (141):

    The comment thread discusses the challenges and frustrations of PhD research, particularly regarding scope creep and maintaining focus on a specific topic. It explores strategies to mitigate these issues, emphasizing learning over novelty, and acknowledges the role of AI in project development and decision-making.

    • PhD research often leads to scope creep due to the need to explore related work in a field
    • Completing a project for learning purposes is sometimes prioritized over novelty or uniqueness
    Counterarguments:
    • Some argue that overthinking can lead to unnecessary complexity in a project
    • Others suggest the importance of maintaining focus on a specific topic despite the temptation to explore related areas
    Software Development Programming Languages, Code Review, Project Management
  4. Firefox Has Integrated Brave's Adblock Engine from itsfoss.com
    417 by nreece 4d ago | | |

    Article:

    Firefox 149 quietly integrated Brave's adblock engine, which is now available as a prototype rich content blocking engine. This addition was made by Mozilla engineer Benjamin VanderSloot and is currently disabled with no user interface or filter lists included.

    Quality:
    The article provides factual information about the Firefox update and does not express any personal opinions or biases.

    Discussion (247):

    The comment thread discusses the compatibility of ad-blocking extensions like uBlock Origin with different browser versions and implementations, specifically MV2 vs MV3 in Firefox, as well as Mozilla's decision to add a Rust-based ad-blocking engine. Opinions vary on whether maintaining MV2 support is necessary or if the addition of the Rust engine could improve trust and software risk.

    • Firefox should maintain MV2 support for compatibility with popular extensions like uBlock Origin.
    Counterarguments:
    • Mozilla's decision to add an ad-blocking engine in Rust could improve trust and software risk.
    Software Development Web Browsers
  5. Norway set to become latest country to ban social media for under 16s from bloomberg.com
    412 by 1vuio0pswjnm7 5d ago | | |

    Article:

    Norway is considering a ban on social media for individuals under 16 years old, following in the footsteps of other countries that have implemented similar restrictions.

    Social media platforms may need to adjust their policies and practices, potentially leading to increased privacy features for younger users.
    • Norway's potential ban on social media for under 16s
    Quality:
    The article provides factual information without expressing a clear opinion.

    Discussion (477):

    The discussion revolves around concerns about the negative impacts of social media on mental health and society, advocating for age verification systems as a solution. There is debate over whether governments should regulate social media companies or impose ID laws, with opinions divided on the effectiveness and potential consequences of various approaches.

    • Age verification is necessary to prevent children from accessing harmful content.
    • Governments should regulate social media companies rather than imposing ID laws.
    Counterarguments:
    • Social media bans may not solve underlying problems and can lead to censorship.
    • Age verification systems raise privacy concerns and may not effectively prevent access.
    • Regulation of social media companies should focus on content moderation rather than user restrictions.
    Regulations Internet & Privacy
View All Stories for Friday, Apr 24

Thursday, Apr 23

  1. DeepSeek v4 from api-docs.deepseek.com
    2086 by impact_sy 5d ago | | |

    Article:

    This article provides an introduction to the DeepSeek API, explaining how to make a first call using OpenAI/Anthropic compatible formats and offering examples in curl, Python, and Node.js scripts.

    The article provides developers with a practical guide to integrating the DeepSeek API into their projects, potentially enhancing AI capabilities in various applications.
    • API format compatible with OpenAI/Anthropic

    Discussion (1604):

    The discussion revolves around the open-source nature and Chinese origin of DeepSeek V4, with users appreciating its level of openness while expressing concerns about potential ulterior motives. There is a focus on comparing model performance and pricing, particularly in relation to data handling practices by American companies. The conversation also touches upon geopolitical implications and data security concerns.

    • DeepSeek V4 is open source and coming from China, which some find heartwarming.
    • Chinese AI labs have made significant contributions to the field.
    Counterarguments:
    • Some users express skepticism about Chinese labs' motives, particularly in relation to geopolitical implications and potential influence operations.
    APIs Software Development, Programming Languages (Python, Node.js), Cloud Computing
  2. GPT-5.5 from openai.com
    1576 by rd 6d ago | | |

    Article:

    OpenAI introduces GPT-5.5, an advanced AI model designed for improved performance in coding, knowledge work, scientific research, and everyday computer tasks. It is more efficient, faster, and more intelligent than its predecessor, GPT-5.4, with enhanced capabilities in reasoning, autonomy, and understanding system context.

    • GPT-5.5 is the latest AI model from OpenAI with enhanced performance in various tasks.
    • It excels in coding, knowledge work, and scientific research by understanding intent better and reasoning autonomously.
    • The model has been tested across multiple benchmarks demonstrating superior performance compared to previous models.
    Quality:
    The article provides detailed information on GPT-5.5's capabilities and improvements over previous models, with a focus on its applications in various fields.

    Discussion (1056):

    The discussion revolves around the release of GPT-5.5, with users comparing its performance against previous models like GPT-5.4 and Anthropic's Mythos. Opinions are mixed regarding token efficiency, cost per task, and marketing strategies. There is a consensus on the need for more open-source AI models in competition with commercial offerings.

    • GPT-5.5 improves on previous versions while using fewer tokens.
    • Real-world usage may differ from benchmark results.
    Artificial Intelligence Machine Learning, AI Models, AI Applications
  3. I am building a cloud from crawshaw.io
    1115 by bumbledraven 6d ago | | |

    Article:

    The author discusses their motivation and dissatisfaction with existing cloud services, explaining why they are launching exe.dev, a new cloud platform that aims to provide better VM resource isolation, local NVMe disks, global regions, and an anycast network for low latency access.

    The new cloud platform could potentially disrupt the current market by offering more user-friendly and efficient solutions, leading to improved productivity for developers and businesses alike.
    • The author is co-founding exe.dev, a new cloud platform.
    • They are motivated by their love for computers and desire to use them more effectively.
    • Existing cloud services constrain users in ways that make it hard to achieve desired outcomes.
    Quality:
    The article presents a personal perspective but maintains an objective tone.

    Discussion (561):

    The discussion revolves around the economics of cloud computing, specifically focusing on cloud vendor pricing strategies and their deviation from cost-based models. The community debates the effectiveness of Kubernetes in various use cases, with some arguing it is overkill for smaller applications while others praise its benefits for large-scale production platforms. There's also a focus on AI-driven software development tools like exe.dev, highlighting its potential to assist developers in writing better code and streamlining the development process. The conversation touches upon the role of DevOps practices in modern infrastructure management and the challenges faced by small teams when adopting new technologies.

    • Cloud vendor pricing often isn't based on cost.
    Counterarguments:
    • Cloud vendor pricing often isn't based on cost.
    Cloud Computing Cloud Services, Cloud Infrastructure
  4. Palantir employees are starting to wonder if they're the bad guys from wired.com
    950 by pavel_lishin 6d ago | | |

    Article:

    Palantir employees are increasingly concerned about the company's role in supporting immigration enforcement, war efforts, and potential involvement in human rights violations under President Trump’s administration. The company has faced criticism for its software being used by the Department of Homeland Security (DHS) to track immigrants, which has led some former and current employees to question their work's alignment with civil liberties and ethical standards.

    Employees' ethical concerns about their work could lead to increased scrutiny on tech companies involved in government contracts and human rights issues, potentially affecting public trust and company reputation.
    • Palantir's secretive reputation and non-disparagement agreements
    • Increased internal tensions over the last year
    • Boiling point after the killing of Alex Pretti during protests against ICE
    • Management's defense through AMAs and updated wiki on ICE contract
    Quality:
    The article provides a balanced view of Palantir's role and the internal concerns, with sources cited for factual information.

    Discussion (701):

    The comment thread discusses various topics related to US foreign policy, including military interventions without formal declarations of war, the actions taken against Iran, and the role of defense contractors like Palantir. There is disagreement on the motivations behind these actions and varying opinions on their ethical implications.

    • The US military has been involved in conflicts without formal declarations of war.
    • The current administration's actions in Iran may have ulterior motives.
    Counterarguments:
    • Arguments defending the actions taken by the current administration, emphasizing national security concerns or strategic objectives.
    Technology Software Development, Artificial Intelligence, Cybersecurity, Ethics in Technology
  5. An update on recent Claude Code quality reports from anthropic.com
    941 by mfiguiere 6d ago | | |

    Article:

    An update on recent quality reports for Claude Code, detailing three issues that were identified and resolved, emphasizing the importance of user feedback in improving AI model performance.

    • Three separate changes that affected different aspects of the AI model were identified and resolved.
    • User feedback played a crucial role in identifying and fixing these issues.
    • Usage limits are being reset for all subscribers as an apology and improvement measure.
    Quality:
    The article provides clear, technical details without sensationalizing the issues or their resolution.

    Discussion (731):

    The comment thread discusses user dissatisfaction with changes made by Anthropic, including issues with session resumption and context loss, unexpected token usage increases, and perceived degradation in model quality. Users express frustration with lack of transparency from the company regarding these changes and the impact on their workflow.

    • Anthropic has made changes to their service that degrade user experience
    • Communication from Anthropic regarding these changes was lacking or misleading
    • Users are experiencing increased token usage without clear explanations
    Counterarguments:
    • Anthropic claims these changes were necessary for cost optimization or performance improvements
    • Some users suggest that increased usage limits could be a solution to mitigate issues
    AI AI (Artificial Intelligence), Machine Learning
View All Stories for Thursday, Apr 23

Browse Archives by Day

Wednesday, Apr 29 Tuesday, Apr 28 Monday, Apr 27 Sunday, Apr 26 Saturday, Apr 25 Friday, Apr 24 Thursday, Apr 23

About | FAQ | Privacy Policy | Feature Requests | Contact