I mean he's right, the old internet and the technology that underlies it still exists, and there's nothing stopping you from building and using sites that work independently of the big social media platforms/centralised services.

That said, I do wish this essay was a bit better contrast wise. Had to highlight some of the tables to read them at all, which isn't exactly ideal.

The components heavily give Claude Code vibes. I use CC to build internal tools and, given free reign over the design, this exactly what it will produce.

Won't comment on the writing other than that the punchlines do feel a bit pretentious in an AI kinda way. I've seen the author's blog posts and I much prefer their natural writing to this essay-style output, but to each their own.

The writing is definitely AI.

I see this often in HN posts and I’m not sure whether to comment. Because it seems most people don’t care; and are only discussing the title, which the LLM post is a predictable extrapolation of, so human effort on the article would be wasted.

I wish people would discuss more interesting topics and less repeats. But probably most of the unique posts just aren’t interesting to me, and I spend too long here so I see repeats more than the average user.

[flagged]

Somewhat. If you open port 22 up on an ip, you're going to get hit by bots scanning the Internet, trying to find an open server to ssh into. If you open port 80 or 443, you're going to get bots looking for /wp-admin.php just as soon as the domain name for it hits certificate transparency logs. The Internet's not a friendly place to be. It once was, but the default now is that someone is going to try and abuse anything you put up. Makes it hard to want to set up a new platform outside of the big centralized ones.

In ham radio - we have a 'Q code' (abbreviation) for man-made noise: QRM (QRN is naturally occurring: thunderstorms and such). This is used mainly to refer to electrically noisy transformers, vehicles, misconfigured transmitters etc. Always been there, gets worse and/or better over time - but gotta figure out how to deal with it as part of the hobby.

When doing stuff on the internet, I've just decided to stop worrying and treat these scans like that above mentioned QRM. You can filter it a bit if you like [1], but really, a sensibly configured and maintained SSH server is as secure as it gets as far as I can see.

[1] https://alastairbarber.com/Building-Anycast-Network/#securit...

> If you open port 22 up on an ip, you're going to get hit by bots scanning the Internet, trying to find an open server to ssh into

This has been the case for years. I can remember this from logs for port 22, more than 20 yeas ago, I saw this.

Eh, as someone who runs a bunch of smaller sites and forums, I've not had any issues with scammers or hackers gaining access to them. Most of them are looking for obvious vulnerabilities via some sort of script, and usually assume the file names and database structure are the same for every site they target.

It's plenty possible to run an independent site with no issues if you keep things up to date and change a few things to thwart the most common attack attempts.

Those scanners are low effort. Don't run vulnerable software and you're fine (this mostly means not running any website you didn't write, but wasn't that the point anyway?) Run it in a container and you're double-fine.

If you don't have a wp-admin.php who cares if someone is trying to access it? If you have one but it correctly validates your admin credentials, again who cares?

You can turn it into a fun project of making a honeypot.