0. Google broke its promise to me – now ICE has my data (eff.org)
1309 points · 569 comments · by Brajeshwar
The Electronic Frontier Foundation has filed complaints with state attorneys general after Google allegedly broke its privacy promise by handing a student's data to ICE without prior notification, depriving him of the opportunity to challenge the administrative subpoena. [src]
The discussion highlights a growing distrust of Google, with some users citing this incident as their final motivation to migrate to self-hosted or privacy-focused alternatives like Proton Mail [0]. While some commenters question the specific legal details of the subpoena and whether Google technically violated its own non-disclosure policies [5], others argue that the core issue is the systemic weaponization of data by government agencies like ICE against individuals [3][9]. There is a strong consensus that such stories are vital for industry decision-makers to see, as they fundamentally alter the legal and ethical calculations of trusting major tech corporations with sensitive data [1][2].
1. Anna's Archive loses $322M Spotify piracy case without a fight (torrentfreak.com)
391 points · 395 comments · by askl
A U.S. judge awarded Spotify and major record labels a $322 million default judgment against Anna’s Archive after the shadow library failed to contest charges of scraping and distributing millions of tracks. The ruling includes a permanent injunction ordering service providers to disable the site's domains. [src]
Commenters largely view the $322M judgment as a symbolic gesture that will fail to collect any money or stop the site's operations, as the operators remain unidentified and likely reside in non-extradition jurisdictions [0][3][5]. While some users defend the archive's mission to preserve research and books, others argue that expanding into music piracy was a strategic blunder that invited unnecessary legal heat from major corporations for little added public benefit [2][8]. The discussion also highlights a deep frustration with the current music industry, noting that while piracy pays artists nothing, "scummy" streaming models and major labels also fail to fairly compensate niche creators [2][9].
2. Backpacks got worse on purpose (worseonpurpose.com)
401 points · 367 comments · by 113
VF Corporation’s acquisition of major backpack brands like JanSport and The North Face led to a deliberate decline in quality, using cheaper materials and hardware to maximize profit margins while leveraging established brand reputations to drive repeat purchases. [src]
While modern products are often perceived as lower quality, some argue that inflation-adjusted prices for high-end goods remain consistent with the past; the primary issue is that "cheap" alternatives now flood the market, making it difficult for consumers to identify genuine quality [0][4]. This shift is attributed to private equity firms leeching value from established brands and a consumer tendency to prioritize the lowest price, though some maintain that these budget options provide necessary access for those with limited needs or funds [3][6][8]. However, critics point out that "inflation-adjusted" arguments ignore a massive decline in median purchasing power and that low-quality tools often fail to perform even basic tasks [2][9]. For those seeking reliable gear, users recommend brands like Osprey that maintain independent ownership and lifetime warranties [5].
3. Live Nation illegally monopolized ticketing market, jury finds (bloomberg.com)
491 points · 142 comments · by Alex_Bond
A jury has found Live Nation guilty of illegally monopolizing the ticketing market following an antitrust trial investigating the company's dominant industry practices. [src]
The jury's finding that Live Nation overcharged consumers by $1.72 per ticket has been met with cynicism regarding the actual impact on individual refunds [5]. Commenters argue that the core issue is vertical integration, where Ticketmaster lacks the incentive to stop scalpers because it profits from fees on both initial sales and secondary market resales [0][7]. While some suggest banning ticket transfers to eliminate scalping [1], others point out that this creates significant friction for legitimate fans who need flexibility for illness or gifting [2][9], leading to a debate over whether concert tickets should be treated like non-transferable airline tickets or flexible dinner reservations [3][8]. Additionally, there is praise for the federalist system, as the involvement of 30 states ensured the case continued despite potential changes in federal administration [4].
4. Want to write a compiler? Just read these two papers (2008) (prog21.dadgum.com)
479 points · 143 comments · by downbad_
The author argues that traditional textbooks overcomplicate compiler design and recommends Jack Crenshaw’s "Let’s Build a Compiler!" and the "Nanopass Framework" paper as more accessible resources for learning to build functional compilers through simple, incremental transformations. [src]
The discussion centers on the best entry points for compiler development, with significant debate over the "Dragon Book." While some praise its foundational Chapter 2 [0][6], others argue it is a "terrible starting place" due to its heavy focus on theory and outdated coverage of modern techniques like Static Single Assignment (SSA) [1][6].
**Consensus and Recommendations** * **Alternative Literature:** There is strong support for more practical, accessible texts. Niklaus Wirth’s *Compilers* is lauded for its brevity and clarity [0], and *Crafting Interpreters* is frequently recommended for modern learners, though users wish it covered advanced topics like linking and optimization [4][7]. * **Complexity:** Participants agree that building a compiler is one of the most difficult yet rewarding challenges in computer science [2].
**Disag
5. God sleeps in the minerals (wchambliss.wordpress.com)
505 points · 100 comments · by speckx
A photographer shared a collection of snapshots featuring various mineral specimens from the "Unearthed: Raw Beauty" exhibition at the Natural History Museum of Los Angeles County. [src]
Commenters are captivated by the "mathematical perfection" of mineral formations, particularly the striking geometry of cubes [0][9]. While some find the poetic title evocative, others criticize the religious association, arguing that these specimens are simply the result of physics and time [1][4][8]. The discussion also highlights the accessibility of the hobby, ranging from the satisfaction of joining local mineral clubs to the frustration that museum-quality "treasure" is often restricted to private mines or commercial operations [3][5][7]. Additionally, users noted the irony of dangerous materials like asbestos and mercury being beautiful, naturally occurring minerals found in the wild [2][6].
6. Good sleep, good learning, good life (2012) (super-memory.com)
383 points · 193 comments · by downbad_
Dr. Piotr Wozniak explores the vital connection between sleep, memory, and learning, advocating for "free running" and biphasic sleep schedules to maximize cognitive performance while warning against the use of alarm clocks, sleeping pills, and other substances that disrupt natural circadian rhythms. [src]
The discussion highlights how sleep quality is deeply intertwined with mental stability and life purpose, with some arguing that a clear "path" in life naturally leads to better self-care and rest [0]. While parents and those with medical conditions like diabetes describe sleep deprivation as an unavoidable "curse" or a "bug in the universe" [1][9], others suggest that communal support or specific sleep training can mitigate these challenges [5][7]. There is significant disagreement regarding individual needs, as some users report high performance on minimal sleep [8], while others note that aging increases sensitivity to sleep disruptions caused by even moderate alcohol consumption [2][6].
7. Ask HN: Who is using OpenClaw?
259 points · 312 comments · by misterchocolat
An individual active in the AI community is inquiring whether anyone is actually using OpenClaw, noting a lack of adoption within their professional circles. [src]
While some users find OpenClaw valuable for managing personal knowledge bases, tracking health metrics, and automating family history documentation [0][4][6], others dismiss it as "manufactured bot hype" driven by social media signaling rather than utility [1][2][3]. Practical adoption is frequently hindered by high token costs—sometimes exceeding $100 a month—and reliability issues where agents repeatedly fail to execute scheduled tasks [5][7]. Despite these frustrations, some proponents view the tool as a "Dropbox moment" that simplifies complex automation for non-technical users, potentially serving as a prototyping phase for more deterministic software [8][9].
8. The buns in McDonald's Japan's burger photos are all slightly askew (mcdonalds.co.jp)
331 points · 173 comments · by bckygldstn
McDonald's Japan's official English menu features a variety of regular, dinner, and breakfast items, including the Chicken Tatsuta and "Bai Burger" double-patty options, with a disclaimer that all product images are for illustrative purposes only. [src]
Users praised the McDonald's Japan website for its exceptional speed and low payload (806kB) compared to competitors like Burger King, whose site is significantly heavier and slower [0]. While some commenters noted that in-store kiosks have become much more responsive over time [1], others argued that the mobile app remains frustratingly slow and buggy [5]. The discussion also touched on the "askew" burger aesthetic, with users suggesting it is a deliberate attempt to look "home-made" [3], a reflection of Japanese "wabi-sabi" [6], or a result of strict truth-in-packaging laws [4].
9. Do you even need a database? (dbpro.app)
231 points · 262 comments · by upmostly
A benchmark study reveals that simple flat-file storage strategies, such as in-memory maps and binary searches, can outperform traditional databases like SQLite for basic ID lookups, suggesting that many early-stage applications may not actually require a formal database until they reach significant scale or complexity. [src]
The discussion centers on whether developers should bypass traditional databases in favor of simple file-based storage or SQLite, with some arguing that modern NVMe speeds and OS page caching make raw files sufficient for early-stage products [6][8]. However, many warn that avoiding a relational database often leads to "feature vomit" or the low-quality reinvention of database internals like atomicity and indexing [0][3][7]. While there is debate over whether NoSQL is better for unpredictable startup needs [2], others contend that NoSQL actually compounds technical debt by trading manageable migrations for "insurmountable" data inconsistency [1][9]. Alternative suggestions include using SQLite to avoid reinventing the wheel [7] or leveraging advanced features in enterprise databases like Oracle to bridge the gap between JSON flexibility and relational stability [4].
10. Open Source Isn't Dead (strix.ai)
318 points · 168 comments · by bearsyankees
While Cal.com is transitioning to a closed-source model to prevent AI-automated vulnerability exploitation, security firm Strix argues that "security through obscurity" is ineffective against modern AI agents and advocates for integrating autonomous AI defenders directly into the development lifecycle. [src]
The shift toward closed-source models is increasingly framed as a response to AI-driven security risks, though many argue this is a convenient excuse for the underlying difficulty of monetizing open-source software [1][6]. While some maintain that open source benefits from a wider net of voluntary security reports [0], others contend that closed-source companies can simply run the same AI scanners internally without exposing their vulnerabilities to the public [2][5]. Furthermore, there is a growing consensus that financial incentives and "human fatigue" are driving developers toward private repositories to prevent AI from "slurping" their innovations without compensation [7][8].
11. Cal.com is going closed source (cal.com)
268 points · 193 comments · by Benjamin_Dobell
Scheduling platform Cal.com is transitioning to a closed-source model to protect customer data from AI-driven security threats, though it will maintain a separate open-source version called Cal.diy for hobbyists and developers. [src]
Cal.com’s decision to go closed source is framed by its leadership as a defense against AI-driven vulnerability discovery [3], though many commenters suspect the move is actually a business decision to prevent "copyright-washing" or to combat declining conversion rates for self-hosted users [4][5][7]. While some argue that closing source code provides a necessary delay against automated attackers [6][9], critics contend this is a return to "security through obscurity" that ignores the benefits of shared auditing budgets in open-source ecosystems [0][1][8]. Others suggest that if LLMs are proficient at finding exploits, developers should simply integrate them into their own pre-release CI/CD pipelines to harden code before it goes public [2].
12. Elevated errors on Claude.ai, API, Claude Code (claudestatus.com)
242 points · 217 comments · by redm
Anthropic has resolved a major service disruption that caused elevated error rates and login failures across Claude.ai, the Claude API, and Claude Code. [src]
Users report that Claude's frequent outages often occur around 14:30 UTC, which commenters attribute to the peak load of US Pacific workers coming online while European users are still active [0][1]. While some suggest these failures stem from oversubscribed GPU capacity and global supply constraints, others note that similar scaling issues previously plagued OpenAI [2][9]. The disruptions have led users to seek alternatives and methods for exporting active "Claude Code" sessions to avoid losing progress on complex, multi-file coding tasks [3][6].
13. Google Gemma 4 Runs Natively on iPhone with Full Offline AI Inference (gizmoweek.com)
278 points · 168 comments · by takumi123
We couldn't summarize this story. [src]
Users suspect the article was written by an LLM due to repetitive phrasing and high scores on AI detection tools, though some argue such detectors are fundamentally unreliable [0][4][7]. While the technical feat is noted, critics argue that routing inference through the GPU instead of Apple’s Neural Engine makes it a battery-draining "tech demo" rather than a practical tool [3], with others questioning if local models on consumer hardware are even coherent enough to be useful [2]. Furthermore, developers report "hitting a brick wall" with App Store rejections when trying to ship local LLMs [1], leading to speculation that Apple may be blocking these apps to protect their business model from a "SaaSpocolypse" [5][8], despite some existing apps successfully bypassing these restrictions [6].
14. The Future of Everything Is Lies, I Guess: New Jobs (aphyr.com)
254 points · 169 comments · by aphyr
As machine learning expands, new professional roles are emerging at the human-AI boundary, including prompt "incanters," quality-control engineers, expert model trainers, "meat shields" for legal accountability, and "haruspices" who investigate and interpret unpredictable model behaviors. [src]
The discussion centers on whether AI will remain a tool for "concentrated engineering thinking" or eventually replace the software engineer entirely [0][1]. Proponents of the technology argue that human accountability, judgment, and the ability to define "what not to build" remain irreplaceable bottlenecks that AI cannot currently navigate [4][6]. Conversely, skeptics argue that current technical limitations, such as context windows and lack of intention, are temporary hurdles, and that businesses will eventually use AI to bypass "primadonna" engineers in favor of direct prompting by management [2][8][9]. This divide creates a tension between those who are "giddy" about their increased implementation speed and those who believe even domain expertise offers no long-term protection from automation [1][3][7].
15. Fixing a 20-year-old bug in Enlightenment E16 (iczelia.net)
257 points · 156 comments · by snoofydude
Kamila Szewczyk fixed a 20-year-old bug in the Enlightenment E16 window manager caused by a faulty Newton’s algorithm implementation. The flaw triggered infinite loops and desktop freezes when truncating long window titles, which Szewczyk resolved by adding iteration limits and safety floors to the codebase. [src]
The discussion surrounding Enlightenment E16 highlights a nostalgic divide between those who view it as a "ricing" tool primarily for screenshots [1] and those who value its enduring low-resource efficiency and extreme configurability [2][6]. While some users transitioned to KDE or GNOME as Enlightenment's ecosystem shifted, others criticize modern desktop environments for "hostile" design choices and the removal of user options [0][2][8]. Notable anecdotes include the "free" implementation of video playback in the Terminology terminal due to toolkit features [5] and the "bittersweet" realization that a desktop once famous for its heavy "bling" is now considered lightweight by modern standards [6][9].
16. YouTube users get option to set their Shorts time limit to zero minutes (theverge.com)
264 points · 124 comments · by pentagrama
YouTube is rolling out a new "time management" setting that allows all users to set a zero-minute limit on Shorts, effectively removing the feed from the home screen and app tabs. [src]
The new "zero-minute" limit for YouTube Shorts is criticized as a misleading tool that merely prevents swiping between videos rather than removing Shorts from the homepage or user interface [0][8]. Commenters argue this "self-regulation" approach shifts the burden of addiction onto the user while YouTube continues to employ aggressive design hooks to harvest attention for advertisers [1][3][7]. To bypass these limitations, users recommend third-party tools like uBlock Origin, UnTrap, and DeArrow to effectively hide Shorts and eliminate clickbait [4][6].
17. Wacli – WhatsApp CLI (github.com)
233 points · 150 comments · by dinakars777
Wacli is an open-source command-line interface for WhatsApp that enables users to sync message history locally, perform fast offline searches, send messages and files, and manage contacts or groups using the WhatsApp Web protocol. [src]
While some users prefer Telegram for its superior bot integration and ease of use in DevOps workflows [0], others criticize its lack of default end-to-end encryption (E2EE) compared to competitors [1][6]. A significant debate exists regarding multi-device support, with participants disagreeing on whether WhatsApp’s implementation constitutes true multi-device functionality or merely a proxy for a primary phone [7][8][9]. For those using unofficial CLI tools like Wacli, experts warn of a high risk of account bans due to the lack of official API support [5].
18. Does Gas Town 'steal' usage from users' LLM credits to improve itself? (github.com)
226 points · 111 comments · by rektomatic
Users of the AI development tool Gas Town report that the software is automatically using their paid LLM credits and GitHub credentials to fix bugs and submit pull requests to the maintainer's own repository without explicit consent or disclosure. [src]
The discussion centers on whether Gas Town’s aggressive token consumption is a feature or a flaw, with some arguing the software’s "danger" warnings and "vibe coding" philosophy make such behavior expected [0][5]. While some users defend the project as a bold experiment in high-velocity AI development [9], others dismiss it as a "vibe coded mess" and compare the hype to the NFT craze [3][7]. Significant skepticism also stems from Steve Yegge’s controversial history with crypto projects and the perceived low quality of his AI-generated documentation [2][6][8].
19. Why are Flock employees watching our children? (substack.com)
229 points · 43 comments · by enaaem
Leaked audit logs from Dunwoody, Georgia, reveal that Flock Safety employees and police have used the company’s surveillance network to monitor live and recorded footage of children and adults in private locations, including gymnastics centers, pools, and preschools, without clear oversight or documented law enforcement purposes. [src]
The discussion centers on the "wantonly irresponsible" security practices at Flock Safety, specifically the revelation that sales employees accessed live camera feeds of children to conduct product demos [1][3][5]. While some argue that schools opt for these third-party cloud solutions due to a lack of local IT expertise, others contend that schools should instead implement on-premise, encrypted storage using open-source tools like ZoneMinder to maintain privacy and data sovereignty [0][4][8]. There is a strong consensus that such access is a gross violation of privacy—potentially even a CJIS violation—and highlights a desperate need for regulation in a sector where the primary customers are the government agencies that would typically act as regulators [1][6][7][9].
Brought to you by ALCAZAR. Protect what matters.