<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gdavisson</title><link>https://news.ycombinator.com/user?id=gdavisson</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 27 Apr 2026 08:31:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gdavisson" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gdavisson in "Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys"]]></title><description><![CDATA[
<p>Classical brute force is embarrassingly parallel, but Grover's algorithm (the quantum version) isn't. To the extent you parallelize it, you lose the quantum advantage, which means that to speed it up by a factor of N, you need N^2 processors.  
The article discusses this in detail, and calculates that "This means we’ll need 140 trillion quantum circuits of 724 logical qubits each operating in parallel for 10 years to break AES-128 with Grover’s."</p>
]]></description><pubDate>Mon, 20 Apr 2026 23:21:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47842411</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=47842411</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47842411</guid></item><item><title><![CDATA[New comment by gdavisson in "So What Should We Call This – A Grue Jay?"]]></title><description><![CDATA[
<p>"Grue" has a surprising variety of meanings:<p>Obsolete/dialiectical English: to shudder with fear, or a shudder (related to "gruesome")<p>Computer games: in Zork, a monster that eats adventurers in the dark [0]<p>Linguistics: an English translation for words that cover the entire green-blue part of the spectrum (in languages that don't distinguish blue from green) [1]<p>Philosophy: a color name that is equivalent to green until a specific future time, at which point it becomes equivalent to blue (used to raise questions about how to validly extrapolate into the future) [2]<p>[0]: <a href="https://zork.fandom.com/wiki/Grue" rel="nofollow">https://zork.fandom.com/wiki/Grue</a><p>[1]: <a href="https://en.wikipedia.org/wiki/Blue–green_distinction_in_language" rel="nofollow">https://en.wikipedia.org/wiki/Blue–green_distinction_in_lang...</a><p>[2]: <a href="https://en.wikipedia.org/wiki/New_riddle_of_induction#Grue_and_bleen" rel="nofollow">https://en.wikipedia.org/wiki/New_riddle_of_induction#Grue_a...</a></p>
]]></description><pubDate>Sat, 13 Dec 2025 08:22:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46253029</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=46253029</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46253029</guid></item><item><title><![CDATA[New comment by gdavisson in "Physicists who want to ditch dark energy"]]></title><description><![CDATA[
<p>Except that sometimes chasing these unicorn entitles leads to... finding the unicorn entities.<p>That's basically what happened with the neutrino. Neutrinos were originally proposed in 1930 by Wolfgang Pauli to solve apparent violations of energy and momentum conservation in beta decay. He suggested that the missing energy and momentum were being carried off by some additional -- undetected and mostly undetectable -- particle. For a while, it looked like these proposed ghost particles might never be detectable, but Fred Reines finally managed it... in 1956, 26 years later.<p>So don't write off unicorn particles. Sometimes they're real, even if you have trouble detecting them.</p>
]]></description><pubDate>Sun, 12 Jan 2025 21:32:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=42677147</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=42677147</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42677147</guid></item><item><title><![CDATA[New comment by gdavisson in "RNA-targeting CRISPR reveals that noncoding RNAs are not 'junk'"]]></title><description><![CDATA[
<p>You're refuting a strawman. The junk DNA claim is not, and as far as I can see never had been, that <i>all</i> non-coding DNA is junk. It's that <i>most</i> of our genome -- around 90% -- is junk[1][2]. But since the genome is over 98% non-coding, that implies that something like 8% is functional non-coding DNA, which is several times the amount of coding DNA. Finding small amounts of additional functional non-coding DNA does not significantly challenge this[3].<p>[1] <a href="https://sandwalk.blogspot.com/2022/08/junk-dna-vs-noncoding-dna.html" rel="nofollow">https://sandwalk.blogspot.com/2022/08/junk-dna-vs-noncoding-...</a><p>[2] <a href="https://en.wikipedia.org/wiki/Junk_DNA#History" rel="nofollow">https://en.wikipedia.org/wiki/Junk_DNA#History</a><p>[3] <a href="https://judgestarling.tumblr.com/post/154553548091/long-noncoding-rna-cannot-kill-junk-dna-there" rel="nofollow">https://judgestarling.tumblr.com/post/154553548091/long-nonc...</a></p>
]]></description><pubDate>Fri, 06 Dec 2024 20:40:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=42344175</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=42344175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42344175</guid></item><item><title><![CDATA[New comment by gdavisson in "Scientists decipher two-photon vision"]]></title><description><![CDATA[
<p><a href="https://doi.org/10.1016/j.visres.2024.108404" rel="nofollow">https://doi.org/10.1016/j.visres.2024.108404</a></p>
]]></description><pubDate>Mon, 11 Nov 2024 06:01:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=42104847</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=42104847</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42104847</guid></item><item><title><![CDATA[New comment by gdavisson in "A rudimentary quantum network link between Dutch cities"]]></title><description><![CDATA[
<p>That's not correct; you cannot use a double-slit test to check for entanglement. Running a photon through a double-slit setup always just produces a single dot, not a any sort of pattern. To get a pattern, you need to run a bunch of photons through it and see if a fringe pattern appears [1].<p>(BTW, you never get a two-line pattern in a decent setup. This is an incredibly common mistake, but it's simply wrong. The interference (which produces fringes) only happens where the separate patterns from the two slits overlap, so if you want a lot of interference, you need them to overlap a lot. So in the no-interference case, you won't get two separate lines with a gap between, you'll get a single merged wash (with probably some fine structure due to diffraction within each of the slits, but that'll also be there when there <i>is</i> interference, on top of the two-slit interference fringes).)<p>You might think "ok, I'll do this with a bunch of photons, measure/not measure all of their twins, and see if the bunch of them show fringes." This is more-or-less what's done in the delayed-choice quantum eraser experiment, but it doesn't work out in a way that allows communication. What happens is that you <i>always</i> get the no-interference pattern. In order to see interference fringes, you need to split the individual photons' dots up based on the result of the measurement you made on their twins. Based on those measurements (if you made them), you can split the photons up into two groups, which'll have fringes with equal-and-opposite patterns (i.e. each will have bands where the other has gaps [2]).<p>If you didn't measure the twin photons (or made some other measurement on them instead), you can't split them up, so you won't see the fringes. But that's not because the measurements were different, it's just that you can't split them up afterward to see the fringes. And even if you did measure the twins, you can't split them up until you get a list of which twin got which result -- which can't be sent faster-than-light.<p>Net result: no, you can't send information via entanglement, you can only get correlation.<p>[1] <a href="https://www.researchgate.net/figure/Electron-Fringe-Pattern-after-a-10-electrons-b-100-electrons-c-3-000_fig2_253550263" rel="nofollow">https://www.researchgate.net/figure/Electron-Fringe-Pattern-...</a><p>[2] <a href="https://algassert.com/quantum/2016/01/07/Delayed-Choice-Quantum-Erasure.html" rel="nofollow">https://algassert.com/quantum/2016/01/07/Delayed-Choice-Quan...</a></p>
]]></description><pubDate>Fri, 08 Nov 2024 23:42:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=42091342</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=42091342</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42091342</guid></item><item><title><![CDATA[New comment by gdavisson in "Start all of your commands with a comma (2009)"]]></title><description><![CDATA[
<p>Brackets are used in shell wildcard ("glob") expressions. For example, if you try to use "[bar]" as a command, the shell will first look for files named "b", "a", and "r" in the current directory, and if it finds any it'll use the first one as the command name and any others as arguments to it.<p>But as far as I can see, using a close-bracket as the first character in a command is safe, since it cannot be treated as part of such a pattern. Open-bracket (without a matching close-bracket) would work in many shells, but will get you a "bad pattern" error in zsh.</p>
]]></description><pubDate>Sun, 23 Jun 2024 19:23:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=40769905</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=40769905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40769905</guid></item><item><title><![CDATA[New comment by gdavisson in "Cognition and Memory After Covid-19 in a Large Community Sample"]]></title><description><![CDATA[
<p>True, but since everyone in the study -- both those with and without diagnosed COVID-19 infections -- had been subject to this, it shouldn't affect the results. Essentially, they're comparing people who were <i>just</i> trapped indoors vs those who were trapped indoors <i>and also</i> had diagnosed COVID-19 infections (and they also broke the infected group down by severity of infection, what variant was prevalent when they were infected, etc).</p>
]]></description><pubDate>Tue, 26 Mar 2024 21:03:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=39832838</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=39832838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39832838</guid></item><item><title><![CDATA[New comment by gdavisson in "A Nuclear Renaissance Is the Best Path Forward"]]></title><description><![CDATA[
<p>Photons are their own antiparticle, so this is not an issue.</p>
]]></description><pubDate>Mon, 13 Nov 2023 20:38:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=38255066</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=38255066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38255066</guid></item><item><title><![CDATA[New comment by gdavisson in "Base64 Encoding, Explained"]]></title><description><![CDATA[
<p>echo -n is <i>not</i> safe, because some versions of echo will just print "-n" as part of their output (and add a newline at the end, as usual). In fact, XSI-compliant implementations are <i>required</i> to do this (and the same for anything else you try to pass as an option to echo). According to the POSIX standard[1], "If the first operand is -n, or if any of the operands contain a <backslash> character, the results are implementation-defined."<p>[1] <a href="https://pubs.opengroup.org/onlinepubs/9699919799/utilities/echo.html#tag_20_37_05" rel="nofollow noreferrer">https://pubs.opengroup.org/onlinepubs/9699919799/utilities/e...</a></p>
]]></description><pubDate>Mon, 23 Oct 2023 19:40:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=37990536</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=37990536</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37990536</guid></item><item><title><![CDATA[New comment by gdavisson in ""<ESC>[31M"? ANSI Terminal security in 2023 and finding 10 CVEs"]]></title><description><![CDATA[
<p>I (vaguely) remember playing games with terminal echoback on physical terminals back in the early-mid 1980s when I was in college. This was on a VAX/VMS system.<p>Someone (I don't remember who did what here) discovered that they could get `SHOW SYSTEM` (roughly analogous to unix `ps` command) to display their name in reverse video by adding escape sequences to their process name. So a bunch of us started experimenting to see what else we could embed in there.<p>Most of the terminals attached to the VAX were Zenith Z-19s, which mostly emulated DEC VT-52s but with some added features. One of those added features was an enablable 25th line (in addition to the regular 24x80 display) that functioned as a sort of status line. We found we could enable that, write something into it, then use the "transmit 25th line" escape sequence to send its contents back to the VAX. I remember having to work around limitations like it sending an escape sequence before the 25th line (which confused VMS), and I think it didn't send a carriage return at the end... or something like that.<p>I don't think we ever got it to do anything terribly interesting, but it was fun to play with. And then IIRC a VMS update blocked control characters in the `SHOW SYSTEM` listing.</p>
]]></description><pubDate>Fri, 20 Oct 2023 20:56:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=37961412</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=37961412</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37961412</guid></item><item><title><![CDATA[New comment by gdavisson in "How do you manage your Apple accounts at work and at home?"]]></title><description><![CDATA[
<p>That's what I do. I have one account ("Apple ID") for iCloud, and a separate one for music and App Store purchases.<p>A couple of caveats, though: Apple encourages using the same account for everything, and their interfaces try to autopilot you into that setup. You have to pay attention, and find & choose the "I'll set it up myself" options. Also, Apple uses email addresses as the name/identifier for Apple IDs, so to set up multiple IDs, you need multiple email addresses. iCloud includes an optional email account, do it's easy to use that for the iCloud account yourself and your personal email address for the other.<p>Which reminds me: don't tie your personal stuff (iCloud, purchases, whatever) to an Apple ID under your company email address. If it's stuff you should keep after leaving your current job, it should be under an Apple ID that's tied to an email address you'll still have after leaving the job. On the other hand, for things that're part of the job (e.g. apps purchased by the company for the job), it should be under an Apple ID "owned by" the company and tied to a company-controlled email address.</p>
]]></description><pubDate>Fri, 07 Jul 2023 18:17:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=36636032</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=36636032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36636032</guid></item><item><title><![CDATA[New comment by gdavisson in "macOS command-line tools you might not know about"]]></title><description><![CDATA[
<p>I find that the `pbpaste | something | pbcopy` idiom is common enough that it's worth having a shell function for it:<p><pre><code>  pbfilter() {
      if [ $# -gt 0 ]; then
          pbpaste | "$@" | pbcopy
      else
          pbpaste | pbcopy
      fi
  }       

</code></pre>
Then you can use something like `pbfilter json_pp` or `pbfilter base64 -d` or `pbfilter sed 's/this/that/'` or whatever.<p>This version also can also act as a plain-text-only filter. If you just use `pbfilter` with no argument, it'll remove any formatting from the text in the pasteboard, leaving just straight plain text.<p>It does have a some limitations, though: you can't use it with an alias, or pipeline, or anything complex like that. The filter command must be a single regular command (or function) and its arguments.</p>
]]></description><pubDate>Tue, 27 Jun 2023 20:05:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=36497973</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=36497973</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36497973</guid></item><item><title><![CDATA[New comment by gdavisson in "macOS command-line tools you might not know about"]]></title><description><![CDATA[
<p>It usually doesn't matter much, but there are some situations where it can matter a lot. For one thing, you can't use seek() on a pipe, so e.g. `cat bigfile | tail` has to read through the entire file to find the end, but `tail bigfile` will read the file backward from the end, completely skipping the irrelevant beginning and middle. With `pv bigfile | whatever`, pv (which is basically a pipeline progress indicator) can tell how big file is and tell you how for through you are as a percentage; with `cat bigfile | pv | whatever`, it has no idea (unless you add a flag to tell it). Also, `cat bigfile | head` will end up killing cat with a SIGPIPE signal after head exits; if you're using something like "Unofficial bash strict mode" [1], this will cause your script to exit prematurely.<p>Another sometimes-important difference is that if there are multiple input files, `somecommand file1 file2 file3` can tell what data is coming from which file; with `cat file1 file2 file3 | somecommand` they're all mashed together, and the program has no idea what's coming from where.<p>In general, though, I think it's mostly a matter of people's expertise level in using the shell. If you're a beginner, it makes sense to learn one very general way to do things (`cat |`), and use it everywhere. But as you gain expertise, you learn other ways of doing it, and will choose the best method for each specific situation. While `cat |` is usually an ok method to read from a file, it's almost never <i>the best</i> method, so expert shell users will almost never use it.<p>[1] <a href="http://redsymbol.net/articles/unofficial-bash-strict-mode/" rel="nofollow noreferrer">http://redsymbol.net/articles/unofficial-bash-strict-mode/</a></p>
]]></description><pubDate>Tue, 27 Jun 2023 19:50:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=36497774</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=36497774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36497774</guid></item><item><title><![CDATA[New comment by gdavisson in "What character was removed from the alphabet? (2020)"]]></title><description><![CDATA[
<p>Actually, the article ends with "The ampersand isn’t the only former member of the alphabet. Learn what led to the extinction of the thorn and the wynn." (which links to <a href="https://www.dictionary.com/e/letters-alphabet/" rel="nofollow noreferrer">https://www.dictionary.com/e/letters-alphabet/</a>)</p>
]]></description><pubDate>Sun, 18 Jun 2023 01:51:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=36376586</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=36376586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36376586</guid></item><item><title><![CDATA[New comment by gdavisson in "Investigating and preventing scientific misconduct with Benford’s law"]]></title><description><![CDATA[
<p>I don't know about that particular analysis, but there've been a number of such claims that don't stand up (mostly because, as you ask, the districts themselves don't follow Benford's law). See, for example, "Inappropriate Applications of Benford’s Law Regularities to Some Data from the 2020 Presidential Election in the United States" by Walter R. Mebane, Jr. [0], and "Why do Biden's votes not follow Benford's Law?" by Matt Parker [1]. This fits the general pattern that there's been a lot of suspicion raised about fraud in the 2020 election, but none of it actually seems to pan out.<p>[0] <a href="http://www-personal.umich.edu/~wmebane/inapB.pdf" rel="nofollow">http://www-personal.umich.edu/~wmebane/inapB.pdf</a><p>[1] <a href="https://www.youtube.com/watch?v=etx0k1nLn78">https://www.youtube.com/watch?v=etx0k1nLn78</a></p>
]]></description><pubDate>Sun, 16 Apr 2023 23:42:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=35595207</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=35595207</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35595207</guid></item><item><title><![CDATA[New comment by gdavisson in "I fixed a parasitic drain on my car in 408 days"]]></title><description><![CDATA[
<p>I recently watched a YouTube video from someone who'd tracked a nasty intermittent parasitic draw [0]. The problem only happened after turning the ignition on & back off (so the standard test of disconnecting the battery & reconnecting via the ammeter wouldn't show it), and the draw cycled between 3.6A and 0.3A.<p>Also, after turning the ignition on & back off there were a lot of (normal) transient draws (from things like the dome light that don't turn off immediately). Even with the problem circuit disconnected, it drew around 6A (!) immediately after the ignition was switched off, dropped to 0.4A after about a minute, and sat at that level for another 9 minutes before dropping again to 0.06A. That means if he hadn't waited ~10 minutes <i>per test</i>, he'd have been chasing draws that were actually normal.<p>Combine an intermittent fault with intermittent normal behavior, and you've got a troubleshooting nightmare.<p>[0] <a href="https://www.youtube.com/watch?v=rVScppKsfHs">https://www.youtube.com/watch?v=rVScppKsfHs</a></p>
]]></description><pubDate>Mon, 10 Apr 2023 18:06:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=35515317</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=35515317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35515317</guid></item><item><title><![CDATA[New comment by gdavisson in "A New Turn in the Fight over Masks"]]></title><description><![CDATA[
<p>"They filter AT LEAST 95% of the particles above a certain size."<p>That's a common misunderstanding; they filter at least 95% of particles <i>of all sizes</i>. It's actually intermediate-sized particles (around 0.1 - 1 micron) that're hardest to capture. Smaller particles are more subject to Brownian motion, which makes them jiggle around more, and hence makes them more likely to bump into one of the respirator's strands... where they'll stick, thanks to Van der Waals forces.<p>N95 masks (if properly fitted) block at least 95% of particles in that 0.1 - 1 micron range (they're tested with particles around 0.3 microns), and even higher percentages of particles that're either larger <i>or smaller</i> than that.<p>Reference: <a href="https://blogs.cdc.gov/niosh-science-blog/2009/10/14/n95/" rel="nofollow">https://blogs.cdc.gov/niosh-science-blog/2009/10/14/n95/</a> (especially figure 2)</p>
]]></description><pubDate>Sat, 18 Feb 2023 22:09:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=34851627</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=34851627</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34851627</guid></item><item><title><![CDATA[New comment by gdavisson in "I Thought I Was Saving Trans Kids. Now I’m Blowing the Whistle"]]></title><description><![CDATA[
<p>That study didn't compare suicide rates with and without surgery, it compared post-op trans people with the general population (i.e. mostly cisgender people). It explicitly says "This study design sheds new light on transsexual persons' health after sex reassignment. It does not, however, address whether sex reassignment is an effective treatment or not."</p>
]]></description><pubDate>Sun, 12 Feb 2023 10:20:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=34761677</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=34761677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34761677</guid></item><item><title><![CDATA[New comment by gdavisson in "I Thought I Was Saving Trans Kids. Now I’m Blowing the Whistle"]]></title><description><![CDATA[
<p>That's just plain wrong. Mental properties in general (e.g. personality) are not easily measurable, but that doesn't mean they don't exist (or can't exist without a non-material soul), and I see no reason to think that an innate sense of gender would be any different.<p>In any case, while gender is not directly measurable, it does seem to correlate with some aspects of brain structure. A number of studies have shown that, at least in some respects, the brain anatomy of transgender people is more similar to that of cisgender people of the same gender than those of the same sex. It's clearly more complicated than trans people having one type of brain in the other type of body, but something sort of like that is going on. See <a href="https://www.scientificamerican.com/article/is-there-something-unique-about-the-transgender-brain/" rel="nofollow">https://www.scientificamerican.com/article/is-there-somethin...</a> and the links at <a href="https://sitn.hms.harvard.edu/flash/2016/gender-lines-science-transgender-identity/" rel="nofollow">https://sitn.hms.harvard.edu/flash/2016/gender-lines-science...</a>.<p>But whatever the basis of transgender identities is, it's clear that <i>something real</i> is going on. Dismissing trans people as "simply mistaken" is, well, simply mistaken.<p>EDIT: I should probably point out that the idea of someone developing some male-type features and some female-type should not be particularly surprising. Sexual differentiation is complex and has a lot of moving parts that don't always operate completely in sync. For example, a genetic male with complete androgen insensitivity syndrome will generally develop male-type internal organs (i.e. testes) and female-style external anatomy (a vagina, generally female appearance, etc).</p>
]]></description><pubDate>Sun, 12 Feb 2023 09:07:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=34761282</link><dc:creator>gdavisson</dc:creator><comments>https://news.ycombinator.com/item?id=34761282</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34761282</guid></item></channel></rss>