For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | mvanbaak's commentsregister

BT and (although very very limited) NFC can be used for tracking and location detection.


> I am curious why Safari in particular is getting a lot of the hate here

Here is HN, where apple is the bad boy in town.


No this is where Apple gets handwaved with whataboutism.


Or maybe they deserve it?


I'm a vim user. for decades. Your post does not align at all with my experience.

If you prompt and hand-hold the LLM it is a big help. Things like boilerplate, basic crud etc etc is something I dont have to worry about anymore. And if I am looking at an unknown codebase or area, the llm can explain things to me, it's the rubber duck that talks back.

I'm not using vim plugins (yet) for LLM, tmux and a couple of panes etc is all I need at the moment.


I am reading the comments to see if there’s a merch shop haga


> You don't talk about all the assembly high level languages make, or at least it's no longer how people view things. We don't say "look at this assembly I compiled." Instead the entire concept fades to the back.

Some still do. Os and compiler devs to name a few


And people looking at code may well be as numerous as people looking at assembly. (Which I even like to do)


What if the the alternatives are worse?


Welcome to capitalism


how will it help you to break free from apple if it only supports pixel phones?


One reason that people use Apple phones is they are seen as a less privacy-invasive option than Android/Google.

So it would follow that a valid privacy-respecting third option would potentially help Apple customers as well as Google customers.


They are working on making their own phone hardware.


but then you send a mail to $person, and this $person uses gmail, and now your mail is still indexed by google.

The only way to get around this is to use encryption. dont send plain text email.


And if the recipient uses a Chrome extension to handle the decryption... Google still has access to the cleartext. There's no winning.


and how are you going to prove your ID? you might as well be the one abducting them, and especially if you refuse to use an app to identify yourself... (playing devils advocate here)


How about...showing your actual ID?

I am a parent and the school employees in primary would ask the kid to point finger at their parents and would remember our faces after just a few weeks. If someone had to pick them up because we had an issue we would just call the school.

I however never understood why I couldn't sign a paper so my kids could walk home on their own, especially since they would walk to school on their own already.


most immediate, would be my children would identify me, next one is under the assumption this suddenly crops up as a policy change, such a policy from the start would be a non starter, however familiarity of face would overide the need for what would be plutobeaurocratic requirement.

the really tight one is how to proceed when there is a change of lawful custody or guardianship, because, unfortunately, divorce, and domestic violence happens, and the lag between court order and, notification of custodial reassignment should be close to zero.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You