<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: morserer</title><link>https://news.ycombinator.com/user?id=morserer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 20 May 2026 19:58:43 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=morserer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by morserer in "College students drown out AI-praising commencement speeches with boos"]]></title><description><![CDATA[
<p>From the little that I know:<p>Every abuser in my personal life whom I've learned about--most of whom I'd also met and spent time with before learning of their deeds--are <i>extremely</i> charismatic people who make active efforts to both isolate their partner from their social circle as well as do things externally that increase their reputation amongst both their peers and the peers of their partner. The people who batter, violate, and terrorize their partners are, with unusual frequency (in my experience), the same people who pick up the tab for everyone at the bar, who reliably buy people gifts, and who offer trusted advice and counsel in trying times.<p>Now, as to <i>why</i> these abusers are like this, that's a more complex thing. I'm not qualified to speak on it, but in the examples I've seen in my life, they're often people who have narcissistic personality disorder, where they're extremely attached to being seen in favorable lights by those around them, and as a result, react viciously to those who challenge that (oft fictitious) image. (This isn't always a conscious process--to put yourself into their shoes, imagine you're inextricably convinced that everyone is trying to defame you, abuse you, and tarnish your reputation at all times (which is probably true for the abuser, because in trying to prevent such fiction, they do monstrous things that fulfill that exact prophecy), so you need to constantly prevent it from happening by becoming trusted and loved by every means necessary, or else.) However, in an effort to maintain this image, they become very well-regarded by those around them, which makes the victim of their abuse <i>sound insane when they try to call them out.</i><p>These people also frequently attach high-value people (such as the children they have with the abused) to them so that they are more difficult to harm, hold accountable, or separate from. I have never, ever heard of an abuser who didn't actively maintain an external factor that made them incredibly difficult to prosecute ("but he has kids, and the kids adore him" / "but he donates so much of his time and money to local charities" / "but he's putting X through college", etc). Putting the abused OR people the abused cares about in financial dependence with them (paying for school / rent / resources for them or their lives ones, isolating the abused from avenues to financial independence, etc) is also very common, if the abuser has such resources. Then, the abused trying to get help is made to become someone who's trying to "defame" the abuser, "rob" their loved ones of financial assistance that they depend on, "steal" the children from their father "whom the kids so love". In the abuser's mind, if their being imprisoned means someone is immediately put in harm's way by their absence, they are safe.<p>The opportunities for the abused to be made to feel completely insane by the world the abuser has created around them are innumerable; the goal of the abuser is to make the victim sound like a monster for trying to challenge the abuser's authority, and usually, by the time the abused catches on to the situation they're now in (during which time the abuser has been nothing but sweet and caring), the abuser has already completed the process, and that world now has extreme consequences if the abused tries to escape it. They're no longer leaving their partner--they're leaving their entire family, their friends, their finances, their entire support network, because the abuser has ingrained themselves into all of it, and done all they can to make their authority unchallengeable (or, at least, convinced the abused of such).<p>Combine that with the abuser very often making a habit of encouraging the abused to doubt their own judgment, telling them they're stupid or worthless (in words subtle enough that you or I would believe them), or finding people from the get go who already lack such confidence (which the abuser may not even realize is what they're doing--they're just looking for someone who doesn't seem like a threat to them, while simultaneously being incapable of believing that they, themselves, might be that threat, as a result of being blinded by their own narcissism. Which is another factor--how do you convince someone they're being harmful when they're incapable of believing that they have the capacity to harm? The abusers often believe the same lies they tell their victims, and tell them with unwavering conviction.)<p>Do you have anyone in your life who you hold in very high esteem, whom you are very close to, who you've also heard ill of? When has your gut response been to believe the person speaking ill of them, instead of your trusted, caring, friend, who you've known for years, who would "never do such a thing"? It might be someone so close to you that believing their victim would feel like buying into a conspiracy theory--which is <i>exactly</i> the circumstance that the abuser is trying to maintain.<p>That's a big part of why.</p>
]]></description><pubDate>Wed, 20 May 2026 15:45:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=48209665</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=48209665</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48209665</guid></item><item><title><![CDATA[New comment by morserer in "StarFighter 16-Inch"]]></title><description><![CDATA[
<p>Smart move!<p>You have lpcamm2 just sitting around in a drawer? Or did you get last-gen?</p>
]]></description><pubDate>Wed, 06 May 2026 09:43:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=48034280</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=48034280</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48034280</guid></item><item><title><![CDATA[New comment by morserer in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Ideally yes, otherwise any other AOSP-based ROM. There are many, and they support far more devices than Graphene, though implementations of e.g. Google Play services is more hacky.<p>The most well-known: <a href="https://wiki.lineageos.org/devices/" rel="nofollow">https://wiki.lineageos.org/devices/</a></p>
]]></description><pubDate>Tue, 28 Apr 2026 17:28:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47937634</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47937634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47937634</guid></item><item><title><![CDATA[New comment by morserer in "Google plans to invest up to $40B in Anthropic"]]></title><description><![CDATA[
<p>Because the job itself has now changed, and they haven't. Their output speed might have been eclipsed by that of the engineers who efficiently adopted the new tooling.<p>Where I work, the power dynamics have shifted wildly. There are a number of senior engineers who refuse to touch the stuff, and as a result, they can barely keep up with their peers. Some of our <i>juniors</i> are now running laps around them.<p>When a stranger to your craft can now teach themselves what you know, how to do your job, and even how to <i>automate</i> your tasks in the span of the same workday as you, all while reliably being able to gauge the innacuracy of the output they're reading, how much longer do you really hold relevance?</p>
]]></description><pubDate>Sat, 25 Apr 2026 03:00:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47898236</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47898236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47898236</guid></item><item><title><![CDATA[New comment by morserer in "Framework Laptop 13 Pro"]]></title><description><![CDATA[
<p>Confused, doesn't all DDR5 support inline ECC by default? Or are you talking about the ability to enable it in the BIOS/OS?</p>
]]></description><pubDate>Thu, 23 Apr 2026 09:56:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47873880</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47873880</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47873880</guid></item><item><title><![CDATA[New comment by morserer in "Afroman found not liable in defamation case"]]></title><description><![CDATA[
<p>I thought this was interesting, so I checked your sources<p>> Insane take truly. First, CCW carriers are statistically the least likely to be involved in any kind of "violent life ending incident".<p>Sure, you could argue this, with the exception of suicide, found guns (usually by kids in the home), and stolen guns. It's not just the person certified, it's everyone around them who can obtain access to the gun they now own<p>>The number of non self-defense homicides caused by them is approximately 0 per year.<p>Only because there's no public data on this particular statistic. A nonprofit produced a database based on news headlines and limited state data, though, and found 1700 suicides and 600 convicted murders by CCW carriers between 2007 and 2025: <a href="https://vpc.org/concealed-carry-killers/" rel="nofollow">https://vpc.org/concealed-carry-killers/</a><p>A better way to phrase it would be that the number of homicides are far less than the violence that a lack of CCW would enable, though that on its own is statistically shaky.<p>> Second, to suggest that people should allow themselves to be victims to violent crime because it's safer for the whole is some sort of collectivist trotskyite nonsense we will never agree on. Under no circumstance should an innocent person forfeit life or property for a violent criminal.<p>You're right, <i>we</i> (the USA) probably won't ever agree on it, due to the intense financial incentives behind firearms manufacturing and ownership and the subsequent lobbying and influence over public influence that those companies fund, but every other country apart from the US is a sweeping counterexample to this. We lose 45,000 people per year to guns (~60% by suicide). It's the #1 cause of death for children since 2020. <a href="https://www.cdc.gov/firearm-violence/data-research/facts-stats/index.html" rel="nofollow">https://www.cdc.gov/firearm-violence/data-research/facts-sta...</a> <a href="https://www.gunviolencearchive.org/" rel="nofollow">https://www.gunviolencearchive.org/</a><p>It's reductive to suggest that the only thing having more guns around does is "prevent victimization" when the guns themselves enable violence to so many nearby parties, including to the owner themselves.<p>> Its astonishing to me people can look at FBI statistics, total gun deaths trending down for the last 30 years, and then suggest people who are statistically the most safe with guns shouldn't be able to carry them.<p>The figure you're quoting appears to be the graph from page 1 of <a href="https://bjs.ojp.gov/document/tpfv9323.pdf" rel="nofollow">https://bjs.ojp.gov/document/tpfv9323.pdf</a>, which is nonfatal victimization, which hasn't trended down--it's hovered between 1 and 2 per 1000 since 2003, and appears to be more of a reflection of improved medical skill than anything about guns.<p>Anyway, you were quoting gun <i>deaths</i>--that's page 13. That chart has stayed roughly the same since 1999: 4-5 per 100k persons (except for the spike during covid)<p>>The qualifications for CCW are harder than police qualifications in most states. But you wouldn't know this because Everytown, MSNBC, CNN, and others have spent the last 12 or so years lying through statistics so that the government has the monopoly on violence.<p>No permit required for CCW in 27 states. You also have states like Utah that will mail you a permit that's valid in 30 different states and doesn't require proof of live-fire training.<p>But yes, in CA, for example, it's a 16 hour course, background check, fingerprints, clean record, (sometimes) psych evals, and even then there are restrictions.<p>This isn't an indicator that CCW is difficult to obtain, though, since this is a reasonable barrier--it's an indicator that police qualifications are laughable. (While we're on that topic, by the way, law enforcement officers (both active and inactive) are allowed to concealed carry in all 50 states)<p><a href="https://aliengearholsters.com/blogs/news/how-to-get-a-concealed-carry-permit-for-all-50-states" rel="nofollow">https://aliengearholsters.com/blogs/news/how-to-get-a-concea...</a><p>Share more feedback if you have it. Would love to learn more</p>
]]></description><pubDate>Thu, 19 Mar 2026 18:57:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47444174</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47444174</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47444174</guid></item><item><title><![CDATA[New comment by morserer in "Canada's bill C-22 mandates mass metadata surveillance of Canadians"]]></title><description><![CDATA[
<p><a href="https://tboteproject.com/" rel="nofollow">https://tboteproject.com/</a><p><a href="https://tboteproject.com/git/hekate/attestation-findings" rel="nofollow">https://tboteproject.com/git/hekate/attestation-findings</a><p><a href="https://web.archive.org/web/20260314094348/https://tboteproject.com/" rel="nofollow">https://web.archive.org/web/20260314094348/https://tboteproj...</a></p>
]]></description><pubDate>Mon, 16 Mar 2026 05:33:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47395483</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47395483</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47395483</guid></item><item><title><![CDATA[New comment by morserer in "Mexican Forces Kill Nation's Most-Wanted Cartel Boss"]]></title><description><![CDATA[
<p>Probably none.<p>I grew up in Mexico--spending a few years in or near Puerto Vallarta, specifically, funnily enough--and the M.O. of the cartel is overwhelmingly geared towards keeping a VERY low profile. Their whole purpose is to be quiet and subtle.<p>For every "loud" cartel action in MX, there are twenty that you never see, and then ten that exist as different recyclings and exaggerations and attack ads in the US to (now) perpetuate the current administration's favorite scapegoat, or (then) to prevent people from emigrating from the US.<p>It's been like that since '07 or so: take a story from Ciudad Juárez or Tamaulipas, then magnify it and convince Americans that the entire country is like that, so that they don't pay attention to the fact that they could get cheaper healthcare, out of pocket, by driving across the border to an equally well-equipped hospital... than they would for the cost of a single ambulance ride in the States... while living in a house that cost 10-100 times more than a house of the same size and quality across the border. All the while, the cartel hums happily along, truly wanting absolutely nothing to do with you.<p>Fear sells, and fear controls. Just like whatever series of headlines got you wanting to believe that they've infiltrated the American govt. ;)</p>
]]></description><pubDate>Mon, 23 Feb 2026 09:41:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47120072</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=47120072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47120072</guid></item><item><title><![CDATA[New comment by morserer in "Show HN: The HN Arcade"]]></title><description><![CDATA[
<p><a href="https://news.ycombinator.com/item?id=7373566">https://news.ycombinator.com/item?id=7373566</a><p>:)</p>
]]></description><pubDate>Wed, 28 Jan 2026 18:29:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46799563</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46799563</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46799563</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>Hmm. I'm on a stock Arch install and had no latency or quality issues to speak of. Bluetooth works out of the box using `bluez` and `blueman`, though Bluetooth is still Bluetooth, with inherent latency. Some headphones have low-latency modes that can be activated in their respective apps at the expense of ANC/battery life, maybe that'll help?<p>The apt command you're looking for may be the audio backend, though. `apt install pipewire wireplumber -y`. Won't break your existing pulseaudio setup, but will allow low-latency operations. (I think--I avoid the dumpster fire that is Ubuntu like the plague, so ymmv)</p>
]]></description><pubDate>Wed, 28 Jan 2026 17:23:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=46798473</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46798473</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46798473</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>You're so welcome!<p>The soft modular synth is called The Grid, fyi. Little square button on the lower left corner of any instrument lets you see it in Grid form.<p>Oh, man, and just wait until you find out that you can modulate literally every control in the UI...<p>Have fun :)</p>
]]></description><pubDate>Wed, 28 Jan 2026 17:18:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46798361</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46798361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46798361</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>This is a simultaneously insane yet deeply delightful concept. Does anyone have the link to that discussion?</p>
]]></description><pubDate>Wed, 28 Jan 2026 17:03:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46798101</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46798101</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46798101</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>Iirc it was to force the extra step necessary for the user to acknowledge that the AUR can bootstrap malware if used blindly.<p>This seems to be a relatively consistent discussion surrounding AUR helper development; for example, adding UX to incentivise users to read PKGBUILDs, lest the AUR becomes an attractive vector for skids.<p>No one wants the AUR to become NPM, and the thing that will incentivise that is uneducated users. Having the small barrier of not having helpers in the main repos is an effective way of accomplishing that.</p>
]]></description><pubDate>Wed, 28 Jan 2026 16:55:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46797976</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46797976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46797976</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>Came here to say this. Archinstall rocks.<p>Regarding why Arch doesn't "invest" in a graphical installer, it's worth mentioning that Arch's installation image has a different design philosophy than most installation media.<p>The image is a fully functional arch environment that copies the entirety of its contents to RAM on boot, giving you special installation opportunities such as the ability to install Arch to <i>the same flash drive</i> that booted the installer. Having no graphical dependencies lets this image remain small enough to pull this off, as well as allowing for fully remote installations over SSH out of the box, since archinstall is a TUI.</p>
]]></description><pubDate>Wed, 28 Jan 2026 16:43:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46797780</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46797780</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46797780</guid></item><item><title><![CDATA[New comment by morserer in "Microsoft forced me to switch to Linux"]]></title><description><![CDATA[
<p>Bitwig was developed by ex-Ableton devs, and the layout is incredibly similar. It's a very easy transition compared to coming from a DAW like FL or Logic.<p>It's also a <i>really</i> attractive offering once you hear about it. It's intuitive, cross-platform, half the price of Ableton for a 3-device lifetime license without geofencing, and the software contains a modular software synth atop which most of the preset instruments are built that is so versatile that its value alone exceeds the price tag of the entire daw.<p>Big fan. Share your thoughts if you give it a whirl.</p>
]]></description><pubDate>Wed, 28 Jan 2026 16:18:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46797349</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46797349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46797349</guid></item><item><title><![CDATA[New comment by morserer in "Google AI Overviews cite YouTube more than any medical site for health queries"]]></title><description><![CDATA[
<p>People don't flag comments because of tone, they flag (and downvote) comments that violate the HN guidelines (<a href="https://news.ycombinator.com/newsguidelines.html">https://news.ycombinator.com/newsguidelines.html</a>). I skimmed your comment history and a ton of your recent comments violate a number of these guidelines.<p>Follow them and you should be able to comment without further issue. Hope this helps.</p>
]]></description><pubDate>Mon, 26 Jan 2026 15:21:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46766712</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46766712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46766712</guid></item><item><title><![CDATA[New comment by morserer in "Growing up in “404 Not Found”: China's nuclear city in the Gobi Desert"]]></title><description><![CDATA[
<p>Yes, the author used an AI translator to transcribe his original article, written in Chinese.<p><a href="https://news.ycombinator.com/item?id=46414040">https://news.ycombinator.com/item?id=46414040</a></p>
]]></description><pubDate>Tue, 30 Dec 2025 18:33:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=46436376</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46436376</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46436376</guid></item><item><title><![CDATA[New comment by morserer in "Staying ahead of censors in 2025"]]></title><description><![CDATA[
<p>They don't necessarily need one to do their jobs.<p>Signal is centralized, hosted on AWS, and through a mixture of legal procedures codified by US law and their bundled gag orders (PR/TT order, SCA warrant, FISA 702, and usage of NSLs) that can be extended for significant lengths of time and, occasionally, in de facto perpetuity, all metadata (who is talking to who, when, from where) can be monitored in real-time without Signal ever being informed. Combined with existing legal procedures for telecoms and VOIP providers for real-time + retrospective location tracking by phone number/associated IMEI/IP address by way of tower connectivity (this framework is required by law [specifically, CALEA] to be implemented by default for all users, not after the fact nor on-request), that's enough data to escalate to standard law enforcement procedures if an incriminating link is found, whereby the phone's internal message history can be dumped either through private (ex.: Cellebrite) or functionally coercive legal means (refusing to decrypt data can get you jail time if you are the subject of an investigation, and deletion of data such as via duress pins etc can get you a destruction of evidence charge), at which point all of your messages can be dumped.<p>And this all ignores the fact that firmware for basebands and cryptoprocessors (and most other hardware components in all devices) is closed-source, proprietary code, and that Signal piggybacks off of device encryption for at-rest message data instead of reimplementing it in userland. (This feature used to exist and was removed, but can be re-added through the Molly fork.)<p>I've also known protesters who have also had Signal geoblocked at the site of a protest the moment it was slated to start, forcing members of said protest to fall back to unencrypted methods at crucial times. Being centralized and using US-based cloud infra does a <i>lot</i> to compromise anonymity and security, even if message content isn't immediately readable.<p>Luckily, Signal is not vulnerable to push notification interception, but if you want a great real-world example of how gag-ordered dragnet metadata surveillance visible to both domestic and foreign governments (by way of international intelligence agreements) can look for massive corporations rendered helpless by this legal framework, that's a great case study to look into. <a href="https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/" rel="nofollow">https://www.reuters.com/technology/cybersecurity/governments...</a><p>Throwing out the accusation of apps being "backdoored" just obscures the real, de facto "backdoors" that are US law.</p>
]]></description><pubDate>Tue, 30 Dec 2025 17:27:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46435654</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46435654</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46435654</guid></item><item><title><![CDATA[New comment by morserer in "GrapheneOS is the only Android OS providing full security patches"]]></title><description><![CDATA[
<p>"not <i>easily</i> verifiable": true.<p>If you have the IMEI, this will answer whether or not a Pixel is Verizon-sold, and thus, bootloader-locked. <a href="https://www.verizonwireless.com/bring-your-own-device/#checkDevice" rel="nofollow">https://www.verizonwireless.com/bring-your-own-device/#check...</a></p>
]]></description><pubDate>Tue, 16 Dec 2025 10:25:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46286891</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46286891</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46286891</guid></item><item><title><![CDATA[New comment by morserer in "GrapheneOS is the only Android OS providing full security patches"]]></title><description><![CDATA[
<p>This is true, and important. Thanks for the reminder.<p>The list linked above (and the price tag deduced from it) is restricted to unlocked phones only for this reason.</p>
]]></description><pubDate>Mon, 08 Dec 2025 02:48:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46187768</link><dc:creator>morserer</dc:creator><comments>https://news.ycombinator.com/item?id=46187768</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46187768</guid></item></channel></rss>