在美国,可以根据所在地免费注册地区性域名,例如 `somename.city.state.us` 。这些域名自 1992 年起存在,并由政府合同维护。要注册,你必须是美国公民或永久居民、在美国注册的组织,或在美国有实际存在的实体。整个流程有若干步骤,首先要选定想要的地区域名。 In the United States, it's possible to register a free domain name based on your location, such as `somename.city.state.us`. These locality domains have existed since 1992 and are maintained under government contract. To register one, you need to be a US citizen or permanent resident, a US-incorporated organization, or an entity with a bona fide presence in the US. The process involves several steps, starting with choosing your desired locality domain.
在美国,可以根据所在地免费注册地区性域名,例如 `somename.city.state.us` 。这些域名自 1992 年起存在,并由政府合同维护。要注册,你必须是美国公民或永久居民、在美国注册的组织,或在美国有实际存在的实体。整个流程有若干步骤,首先要选定想要的地区域名。
许多地区性域名已被委托给具体公司负责注册。虽然有一份 2009 年的注册商联系方式列表,但其中一些公司后来可能更名或重组。如果你的地区不在该列表上,你可能可以在 `gen.your-state.us` 下注册,适用于一般独立实体。但如果某个地区根本未被委托,你大概率无法注册,因为未被委托域名的管理者 NeuStar 基于长期政府政策,只允许地方政府机构注册这类域名。
在注册前需要设置名称服务器,这一点比较特别,因为大多数域名注册商会自动提供名称服务器。 Amazon Lightsail 为非顶级域名提供免费的名称服务器。你只需创建一个 AWS 账户,进入 Lightsail 控制台,为目标域名建立一个 DNS 区域,就能获得注册表单所需的名称服务器地址。
注册使用的表单名为 Interim .US Domain Template v2.0,需要填写完整域名、个人或组织信息、预期用途说明以及名称服务器信息。名称服务器的 IP 地址可用在线 DNS 查询工具或 dig 命令获取。表单中还包含 US Nexus 要求,用以验证你的资格(如公民或居住身份等)。
填好表单后,将其通过电子邮件发给对应地区域名的注册商。处理并非自动化,可能需要数天到数周时间。一旦获批,你会收到确认,然后可以回到 Lightsail 配置 DNS 记录,把域名指向你想要的服务器,无论是网站托管、游戏服务器还是其他用途。作者使用 GitHub Pages 做免费网站托管,但任何托管服务在正确配置 DNS 后都可用。
FAQ 部分回答了关于地区性域名的常见问题:你不一定要居住在域名所代表的地区;WHOIS 查询不会泄露你的个人地址,通常只显示注册商信息。文章最后感谢了那些帮助作者完成这一流程的指南,也正是它们促使作者写出这篇更详细的说明,供有兴趣注册地区性域名的人参考。
In the United States, it's possible to register a free domain name based on your location, such as `somename.city.state.us`. These locality domains have existed since 1992 and are maintained under government contract. To register one, you need to be a US citizen or permanent resident, a US-incorporated organization, or an entity with a bona fide presence in the US. The process involves several steps, starting with choosing your desired locality domain.
Many locality domains have been delegated to specific companies that handle registration. A list from 2009 provides contact information for these registrars, though some companies may have changed names or restructured since then. If your locality isn't on the list, you might be able to register under `gen.your-state.us` for general independent entities. However, if registration hasn't been delegated at all, you're likely out of luck, as NeuStar, the manager of undelegated domains, only allows local government agencies to register them due to longstanding government policy.
Before registering, you need to set up nameservers, which is unusual since most domain registrars provide these automatically. Amazon Lightsail offers free nameservers for non-top-level domains. You create an AWS account, navigate to the Lightsail console, and set up a DNS zone for your intended domain. This gives you the nameserver addresses required for the registration form.
The registration form, called the Interim .US Domain Template v2.0, requires several pieces of information. You'll provide your full domain name, personal or organizational details, a description of your intended use, and your nameserver information. For the nameserver IP addresses, you can use online DNS lookup tools or the `dig` command. The form also includes US Nexus requirements to verify your eligibility based on citizenship or residency status.
After completing the form, you send it to the registrar for your locality domain via email. Processing can take days or weeks since it's not automated. Once approved, you'll receive confirmation and can return to Lightsail to configure your DNS records, pointing your domain to whatever server you want, whether for web hosting, gaming servers, or other purposes. The author uses GitHub Pages for free web hosting, but any hosting service will work with proper DNS configuration.
The FAQ section addresses common questions about locality domains. You don't necessarily need to live in the area your domain represents, and WHOIS requests won't leak your personal address, only showing registrar information instead. The article concludes with thanks to other guides that helped the author navigate this process, which inspired them to create a more detailed explanation for others interested in registering their own locality domains.
美国在 AI 竞赛中最关键的商业化环节上占据领先。自 2025 年初 DeepSeek R1 引发轰动以来,美国企业提速发展,OpenAI 向智能体领域和 Codex 扩展,Anthropic 把 Claude Code 打造成为商业产品。中国有竞争力的模型,但美国在营收、采用率、工具链和全球影响力上明显领先。对中国而言,DeepSeek 的真正战略价值不在于商业主导,而在于通过推动推理向华为昇腾等国产硬件迁移,减少对 Nvidia 的依赖,支持供应链自主,而非追求以盈利为核心的 AI 霸主地位。 The US is winning the AI race where it counts most, commercialization. Since DeepSeek R1 made waves in early 2025, American companies have accelerated faster, with OpenAI pushing into agents and Codex and Anthropic turning Claude Code into a business. China has competitive models, but the US leads clearly in revenue, adoption, tools, and global reach. DeepSeek's real strategic value for China is less about commercial dominance and more about reducing dependence on Nvidia by pushing inference toward domestic hardware like Huawei Ascend, supporting supply chain autonomy rather than profitable AI leadership.
美国在 AI 竞赛中最关键的商业化环节上占据领先。自 2025 年初 DeepSeek R1 引发轰动以来,美国企业提速发展,OpenAI 向智能体领域和 Codex 扩展,Anthropic 把 Claude Code 打造成为商业产品。中国有竞争力的模型,但美国在营收、采用率、工具链和全球影响力上明显领先。对中国而言,DeepSeek 的真正战略价值不在于商业主导,而在于通过推动推理向华为昇腾等国产硬件迁移,减少对 Nvidia 的依赖,支持供应链自主,而非追求以盈利为核心的 AI 霸主地位。
能源对 AI 很重要,但并非决定性因素。廉价电力能降低模型运行成本,美国的零售电价低于德国、英国、法国和西班牙等西欧主要经济体,但中国和俄罗斯的电价更便宜。电力本身不足以决定输赢:即便电价低廉,如果缺乏云规模、平台覆盖、开发者生态和大量可用数据的获取渠道,也会落败。美国在这些层面都形成了协同效应,这恰恰是其最强的优势。
真正决定胜负的是云基础设施和数据。全球性的超大规模云服务商——AWS 、 Azure 和 Google Cloud——掌握了模型触达世界的主要通道。美国的平台同时在生成和组织驱动 AI 所需的数据,从 YouTube 的视频语料,到嵌入日常办公的 Google Drive 与 Microsoft 365,再到深度参与软件开发的 GitHub 。它们既是分发系统,又是数据平台,使得新模型可以迅速推送到人们日常使用的产品中。中国在其庞大的国内市场内也具备许多这样的能力,但欧洲不具备这一整套体系。
欧洲有高水平的工程人才,但仅有人才还不够。美国的超大规模云服务商已占据主导地位,要想迎头赶上,除了要为本土云提供巨额资金,还必须把银行、制造业和公共机构迁移到这些平台上,这一过程可能耗时接近十年。而到那时,美国平台的领先优势将更难撼动。唯一的例外是 Arkady Volozh 正试图把 Nebius 打造为一家欧洲 AI 基础设施公司,但这恰恰说明了欧洲在这场竞赛中的起步仍然很晚。
SAP 的 Christian Klein 主张欧洲不需要更多数据中心,仅靠大语言模型也远远不够——这两点都是对的。但他忽视了一个核心事实:美国之所以领先,是因为它在同时构建每一个关键层面——芯片、能源、数据中心、云平台、开发者工具、消费级平台和企业软件。 AI 只有与真实数据、真实工作流和真实产品结合时才有价值,而美国具备将这些环节在大规模上整合起来的体系。
另一个正在出现的前沿是武器化的 AI 。下一阶段可能会出现国家之间在机器人网络、网络攻防和自主武器上的 AI 对抗。将系统调整为去人性化对手或针对特定人群令人不安地容易,一旦模型被嵌入媒体、网络和武器中,偏见就会转化为力量。这也把 AI 竞赛推向了一场安全竞赛。像 Anthropic 的 Mythos 这样的模型预示着另一次转变:以往的开源冲动会让位于通过"隐藏式安全"实现的封闭体系,采用封闭的软件、工具、固件和芯片。专有堆栈的价值会延伸到硬件层面,因为无法在目标的代码和架构上训练的模型,将缺乏上下文并且运行速度更慢。
The US is winning the AI race where it counts most, commercialization. Since DeepSeek R1 made waves in early 2025, American companies have accelerated faster, with OpenAI pushing into agents and Codex and Anthropic turning Claude Code into a business. China has competitive models, but the US leads clearly in revenue, adoption, tools, and global reach. DeepSeek's real strategic value for China is less about commercial dominance and more about reducing dependence on Nvidia by pushing inference toward domestic hardware like Huawei Ascend, supporting supply chain autonomy rather than profitable AI leadership.
Energy matters for AI, but it is not the decisive factor. Cheap electricity lowers model costs, and the US enjoys lower retail power prices than major Western European economies like Germany, the UK, France, and Spain. However, China and Russia are even cheaper. Power alone does not determine the winner. A country can have inexpensive electricity and still lose if it lacks cloud scale, platform reach, developer ecosystems, and access to large flows of useful data. The US has all of these layers working together, which is where its strongest advantage lies.
The decisive layers are cloud infrastructure and data. The US owns the global hyperscalers, AWS, Azure, and Google Cloud, which serve as the primary channels through which models reach the world. American platforms also generate and organize the data that fuels AI, from YouTube's video corpus to Google Drive and Microsoft 365 embedded in daily office work to GitHub sitting inside software development. These are both distribution systems and data platforms, allowing new models to be pushed into products people already use every day. China has much of this within its large domestic market, but Europe does not.
Europe has strong engineering talent, but talent alone is not enough. US hyperscalers already dominate, and catching up would require not just financing cloud champions but also migrating banks, manufacturers, and public agencies onto those platforms, a process that would take most of a decade. By then, American platforms would be even further ahead. There is one exception, Arkady Volozh's effort to build Nebius into a European AI infrastructure company, but that only confirms how early Europe still is in this race.
SAP's Christian Klein has argued that Europe does not need more data centers and that large language models alone are not enough. He is right on both points, but his broader view misses the main fact. The US is winning because it is building every major layer simultaneously: chips, power, data centers, cloud platforms, developer tools, consumer platforms, and enterprise software. AI only becomes valuable when tied to real data, real workflows, and real products, and the US has the integrated system to make that happen at scale.
There is another frontier emerging: weaponized AI. The next phase may involve country-versus-country AI in bot networks, cyber campaigns, and autonomous weapons. Tuning systems to dehumanize rivals or target populations is disturbingly easy, and once models are embedded into media, networks, and weapons, bias becomes force. This makes the AI race also a security race. Models like Anthropic's Mythos point to another shift, where the old open-source instinct gives way to security by obscurity, with closed software, tooling, firmware, and chips. Proprietary stacks raise their value all the way down to hardware, because a model that cannot train on a target's code and architecture will have less context and speed.
• 有人质疑把 AI 发展描述为"战争"的说法,认为这种竞争思维反而会侵蚀全球的善意与信任,从而损害美国自身利益。如果美国和中国都不再被信任来提供数据或可靠服务,双方都会失去潜在的全球影响力,而欧洲等地区可能会因此受益。
• 一些人认为把 AI 描绘成"战争"是媒体和企业利益推动的叙事,AI 公司为耸人听闻的言论提供资金,以转移公众对真正挑战——对齐问题的注意力。人们更应该关心的不是哪个国家率先开发出更先进的 AI,而是这些 AI 是否与人类利益相一致。
• 在硬件未来轨迹上有一种技术论点,预测太空数据中心由于发射成本下降和太阳能充足,最终在经济性和实用性上会优于地面数据中心。
• 美国倾向于将一切视为竞争赛跑,这种心态受到批评。批评者认为它导致了适得其反的政策和态度,甚至在企业内部沟通中也充满了关于"赢"的体育隐喻。
• 对 GPU 性能趋势的详细分析显示,消费级与高端硬件之间存在长期差距,这引发了对当前大规模 AI 投资经济可持续性的质疑。如果消费级硬件在 10–15 年内追上今天的高端 GPU,那么对尖端基础设施的数万亿美元投资可能难以获得足够回报。
• 许多人怀疑前沿 AI 进展是否真构成一场"竞赛",指出多个国家和公司都在稳步推进,没有任何单一实体取得决定性且持久的优势。"赢者通吃"的说法更像是为了吸引风险资本,而非反映技术现实。
• 对数据隐私的担忧促使人们预测,对美国和中国治理的不信任将推动用户转向本地开源模型,在个人和企业层面避免依赖任何单一国家的云基础设施。
• 鉴于许多公司以亏损方式出售服务且盈利前景不明,人们质疑美国 AI 公司的商业模式。如果中国的开源权重模型持续改进并在价格上形成优势,美国可能会在商业层面失去优势,尽管目前其模型更为先进。
• 出于国家安全考虑,如果模型带来风险(例如可能助长生物恐怖主义),这些模型可能会被限制使用或被降级用于商业用途。类似于核武器的管控,这可能会限制最强大 AI 系统的可及性。
• 本地化 AI 推理正在快速进步,有人认为几年内强大模型就能在消费级硬件上运行,从而减少对云提供商的依赖,并对当前集中式 AI 基础设施模式的长期可行性提出质疑。
整体讨论反映出对"AI 竞赛"叙事的深切怀疑。许多参与者质疑目前的商业化策略是否可持续或是否值得追求,隐私、信任与公平访问的担忧凸显,同时围绕模型分发和硬件未来也存在技术性争论。反复出现的主题是:将 AI 发展框定为零和竞争可能适得其反,会分散对对齐挑战和社会影响的关注。对话中带有地缘政治的愤世嫉俗,无论是美国还是中国,都不被视为值得信赖的强大 AI 技术监管者。
• The framing of AI development as a "war" is questioned, with the argument that this competitive mindset may actually undermine U.S. interests by eroding global goodwill and trust. If neither the U.S. nor China can be trusted with data or reliable service, both lose potential global influence, potentially benefiting regions like Europe.
• Some argue the "war" narrative is driven by media and corporate interests, with AI companies funding sensationalist rhetoric to distract from the real challenge: alignment. The concern is not which nation develops advanced AI first, but whether that AI is aligned with humanity's interests.
• There is a technical argument about the future trajectory of hardware, with predictions that space-based data centers will become economically and practically superior to ground-based ones due to lower launch costs and abundant solar energy.
• The U.S. tendency to frame everything as a competitive race is highlighted, with criticism that this mindset leads to counterproductive policies and attitudes. One commenter humorously notes that even internal corporate communications are filled with sports metaphors about "winning."
• A detailed breakdown of GPU performance trends shows a consistent lag between consumer and high-end hardware, raising questions about the economic sustainability of current massive AI investments. If consumer hardware catches up to today's high-end GPUs within 10-15 years, the trillions invested in cutting-edge infrastructure may not generate adequate returns.
• Skepticism is expressed about whether frontier AI development constitutes a true "race" at all, pointing out that multiple nations and companies are making incremental progress without any single entity achieving a decisive, lasting advantage. The "winner-take-all" narrative is seen as more useful for raising venture capital than reflecting technological reality.
• Concerns about data privacy are raised, with predictions that distrust of both U.S. and Chinese governance will push users toward local, open-source models for personal and enterprise use, avoiding reliance on any single nation's cloud infrastructure.
• The economic model of U.S. AI companies is questioned, given that many sell services at a loss with uncertain profitability. If Chinese open-weight models continue to improve and undercut on price, the U.S. may lose its commercial edge despite having more advanced models currently.
• National security considerations could lead to models being restricted or degraded for commercial use if they pose risks, such as enabling bioterrorism. This mirrors nuclear technology controls and could limit the accessibility of the most capable AI systems.
• Local AI inference is improving rapidly, with arguments that within a few years, powerful models will run on consumer hardware, reducing dependence on cloud providers and raising questions about the long-term viability of the current centralized AI infrastructure model.
The discussion reveals deep skepticism about the "AI race" narrative, with many participants questioning whether current commercialization strategies are sustainable or even desirable. Concerns about privacy, trust, and equitable access feature prominently, alongside technical debates about the future of model distribution and hardware. There's a recurring theme that the framing of AI development as a zero-sum competition may itself be counterproductive, distracting from alignment challenges and social impacts. The conversation is marked by geopolitical cynicism, with neither the U.S. nor China viewed as trustworthy stewards of powerful AI technology.
我把代码从 GitHub 迁到自托管的 Forgejo 实例,有好几个原因,但归根到底是一个问题:所有权。在截至 2026 年 4 月的一年里,GitHub 记录了 257 起事故,其中 48 起属重大事故;CTO 公开道歉,称容量需要扩大 30 倍才能应付 AI 带来的负载。但宕机只是表象,根本转折是在 2025 年 8 月:GitHub 不再有自己的 CEO,被并入微软的 CoreAI 部门,也就是在开发 Copilot 的团队。现在把代码推到 GitHub 等于推到了微软 AI 组织的一个单元,这从根本上改变了你与平台的关系。 There are several reasons why I moved my code from GitHub to a self-hosted Forgejo instance, and they all boil down to one thing: ownership. GitHub logged 257 incidents in the year leading up to April 2026, 48 of them major, and the CTO publicly apologized, saying capacity needs to scale 30x to keep up with AI-driven load. But the outages are a symptom, not the cause. The real shift happened in August 2025 when GitHub stopped having its own CEO and was absorbed into Microsoft's CoreAI division, the same group building Copilot. When you push code to GitHub now, you're pushing it to a unit of Microsoft's AI organization, and that changes the relationship fundamentally.
我把代码从 GitHub 迁到自托管的 Forgejo 实例,有好几个原因,但归根到底是一个问题:所有权。在截至 2026 年 4 月的一年里,GitHub 记录了 257 起事故,其中 48 起属重大事故;CTO 公开道歉,称容量需要扩大 30 倍才能应付 AI 带来的负载。但宕机只是表象,根本转折是在 2025 年 8 月:GitHub 不再有自己的 CEO,被并入微软的 CoreAI 部门,也就是在开发 Copilot 的团队。现在把代码推到 GitHub 等于推到了微软 AI 组织的一个单元,这从根本上改变了你与平台的关系。
2026 年 4 月训练数据默认设置的变更把这件事具体化。 GitHub 修改隐私声明,Copilot Free 、 Pro 和 Pro+ 用户的交互数据默认用于 AI 训练,并且没有仓库级别的退出选项。作为维护者,我不能要求 GitHub 不在我的代码库交互上进行训练。退出是按用户账户设置的,这意味着任何使用 Copilot 的人接触到我的代码时,代码都有可能被用作训练素材,不论我如何授权。私有仓库的豁免也没想象中完全:当 Copilot 激活时生成的"代码片段和交互上下文"仍会被收集。只有 Copilot Business 和 Enterprise 客户例外,且是因为他们受单独的数据保护协议约束。
还有管辖权问题。 GitHub 和 Microsoft 都是美国公司,这意味着它们持有的任何数据都可能受到 FISA 第 702 条和 CLOUD Act 的影响,不管数据物理存放在哪儿。 GitHub 于 2024 年 10 月推出的欧盟数据驻留选项解决了数据位置问题,但没能解决管辖权,因为 CLOUD Act 是随企业控制权而非地理位置生效。微软一位律师在法国参议院听证会上宣誓表示,他无法保证存放在欧洲数据中心的欧盟数据不会被美国政府静默访问。荷兰政府也得出相同结论,并于 2026 年 4 月软启动了 code.overheid.nl——一个自托管的 Forgejo 实例,正是因为需要在一个自己真正拥有的平台上发布源代码。
我选择 Forgejo 而不是 GitLab,主要出于两点考虑。第一是许可:GitLab 采用 open core 模式,许多生产功能被锁在企业版后面;而 Forgejo 在 2024 年 8 月改用 GPLv3+ 许可,明确要保持 copyleft,抵抗商业收编。第二是治理:Forgejo 隶属于 Codeberg e.V.,一家在柏林注册的非营利组织,有成员选举的董事会和公开预算。 2022 年 12 月从 Gitea 分叉,正是因为 Gitea Ltd 在未经社区同意的情况下控制了商标,项目结构也反映了这次教训。 Forgejo v15.0 LTS 于 2026 年 4 月 16 日发布,长期支持到 2027 年 7 月。
我的部署跑在一台 64 GB 内存的 Intel NUC 上。 Forgejo v15 LTS 、 Postgres 17 和 Traefik 在 Docker 中运行;Actions 运行器放在由 Incus 管理的 KVM 虚拟机里。运行器才是真正需要下功夫的部分,因为它要执行不受信任的代码,例如对我的仓库做 npm 和 pip 安装,并按 Renovate 的日程每天运行。我用了五层重叠隔离:用 KVM 虚拟机避免共享主机内核;在该虚拟机内用 gVisor 作为 Docker 运行时,在用户空间拦截系统调用;每周做一次破坏性重建,从干净基础镜像销毁并重建整个虚拟机;用 nftables 做出口过滤,阻断对局域网的访问;以及使用范围绑定的运行器令牌,确保令牌只能在注册范围内使用。这些技术本身并不新,但把它们整合到一台 NUC 的单人家庭实验室里,才使整体方案可行。
这其中有真实的权衡。可发现性和社交网络是最大的代价,因为贡献者习惯在 GitHub 上找到我。我的计划是在迁移完成后将每个公共 GitHub 仓库归档,并在 README 中指向 code.jorijn.com,以保持发现路径。 Forgejo Actions 倾向于与 GitHub Actions 保持相似体验,而不是完全兼容,所以有些功能会静默失效,比如工作流级别的权限受限,有些 action 需要固定版本或自行分叉。 Forgejo 没有 Dependabot,因此我在同一自托管运行器上运行 Renovate 。也没有 7×24 的厂商支持,只有一个 issue 跟踪器和一个聊天室——对单人运维足够,但对更大团队可能难以扩展。
这种迁移并不适合所有人。如果你的团队不想运行基础设施、如果你高度依赖 GitHub 特有功能如 Codespaces 或 Advanced Security 、或者你的贡献者群体完全依赖 GitHub 的社交网络,那么这些摩擦可能不值得。荷兰政府的方法是个好范例:code.overheid.nl 是软启动平台,而非全面替代。我的部署也是同样的思路:Forgejo 是我的主平台,GitHub 是镜像,我也不排除以后再调整。关键是:在一台 NUC 上实现一个有防护能力的自托管 Forgejo 部署是可行的,但运行器需要真正用心对待;如果你不准备处理 KVM 隔离、 gVisor 、 nftables 和每周重建,最好把 CI 任务放到托管运行器上,或者继续留在 GitHub 。
There are several reasons why I moved my code from GitHub to a self-hosted Forgejo instance, and they all boil down to one thing: ownership. GitHub logged 257 incidents in the year leading up to April 2026, 48 of them major, and the CTO publicly apologized, saying capacity needs to scale 30x to keep up with AI-driven load. But the outages are a symptom, not the cause. The real shift happened in August 2025 when GitHub stopped having its own CEO and was absorbed into Microsoft's CoreAI division, the same group building Copilot. When you push code to GitHub now, you're pushing it to a unit of Microsoft's AI organization, and that changes the relationship fundamentally.
The training-data default flip in April 2026 made this concrete. GitHub changed its privacy statement so that interaction data from Copilot Free, Pro, and Pro+ users is now used for AI training by default, with no repository-level opt-out. As a maintainer, I can't tell GitHub not to train on interactions inside my codebase. The opt-out is per user account, meaning my code becomes training material whenever anyone using Copilot touches it, regardless of how I license it. Private repositories get a narrower carve-out than it sounds, since "code snippets and interaction context" generated while Copilot is active are still collected. Only Copilot Business and Enterprise customers are exempt, and only because they're governed by separate Data Protection Agreements.
Then there's the jurisdiction problem. GitHub and Microsoft are US companies, which means anything they hold falls under FISA Section 702 and the CLOUD Act, regardless of where the data physically sits. GitHub's EU data residency option, launched in October 2024, solves data location but not jurisdiction, since CLOUD Act exposure follows corporate control, not geography. Microsoft's own attorney told a French Senate hearing under oath that he couldn't guarantee EU data stored in European datacenters was safe from silent US government access. The Dutch government reached the same conclusion and soft-launched code.overheid.nl in April 2026, a self-hosted Forgejo instance, specifically because the ministry needed to publish source code on a platform it actually owns.
I chose Forgejo over GitLab for two reasons. First, licensing. GitLab is open core, with many production features locked behind enterprise tiers. Forgejo relicensed to GPLv3+ in August 2024 with the explicit goal of staying copyleft and resisting commercial capture. Second, governance. Forgejo lives under Codeberg e.V., a non-profit registered in Berlin with a member-elected board and public budgets. The fork from Gitea in December 2022 happened precisely because Gitea Ltd took control of trademarks without community consent, and the project's structure now reflects that lesson. Forgejo v15.0 LTS shipped on April 16, 2026, with long-term support through July 2027.
My setup runs on a single Intel NUC with 64 GB of RAM. Forgejo v15 LTS, Postgres 17, and Traefik live inside Docker, and an Incus-managed KVM virtual machine hosts the Actions runner. The runner is where the real engineering lives, since it has to execute untrusted code like npm and pip installs against my repositories on a daily Renovate schedule. I use five overlapping isolation layers: a KVM virtual machine so the host kernel isn't shared, gVisor as the Docker runtime inside that VM to intercept system calls in user space, a weekly destructive rebuild that destroys and recreates the entire VM from a fresh base image, an nftables egress filter that blocks access to my LAN, and scope-bound runner tokens that can't be used outside their registered scope. None of these primitives are novel, but wiring them together for a single-user homelab on one NUC is what makes the setup work.
There are real tradeoffs. Discovery and the social graph are the biggest cost, since contributors expect to find me on GitHub. My plan is to archive each public GitHub repository once the migration is complete and point the README at code.jorijn.com, keeping the discovery path intact. Forgejo Actions aims for familiarity with GitHub Actions, not compatibility, so some things break silently, like permissions blocks at the workflow level, and some actions need pinning or forking. Forgejo doesn't have Dependabot, so I run Renovate on the same self-hosted runner instead. And there's no 24/7 vendor support, just an issue tracker and a chat room, which is fine for a one-person operation but might not scale for larger teams.
This move isn't for everyone. If your team has no appetite for running infrastructure, if you're heavily invested in GitHub-specific features like Codespaces or Advanced Security, or if your contributor base depends entirely on the GitHub social graph, the friction may not be worth it. The Dutch government's approach is a good model: code.overheid.nl is a soft-launch platform, not a wholesale replacement. My setup has the same shape, Forgejo is canonical for my work, GitHub is a mirror, and I'm willing to revisit that later. The key point is that a defensible self-hosted Forgejo deployment is achievable on a single NUC, but the runner is the part that requires real care, and if you're not prepared to think about KVM isolation, gVisor, nftables, and weekly rebuilds, you should run your CI jobs on a managed runner host or stay on GitHub.
Git 的设计初衷是去中心化的,但凭借出色的工具、可扩展性和维护能力,GitHub 已成为事实上的中心枢纽。很多人认为,尽管技术上可以离开 GitHub,但为了项目的可发现性和长期存续,在 GitHub 上保留镜像仍然非常重要,因为那些托管在小众或自托管平台上的项目常常在镜像消失后也逐渐沉寂。
促使人们想要离开 GitHub 的一个重要原因是,GitHub 使用公开仓库来训练像 Copilot 这样的商业 AI 模型,却没有征得开发者的明确同意。这让许多开发者感到被背叛,因为开源社区原有的契约——例如署名和许可证合规——被利益化的行为所践踏。
围绕 AI 训练的法律环境正在向大型科技公司倾斜,法院通常裁定使用公开数据进行训练是允许的。这使得一些人觉得阻止 AI 抓取数据的斗争已近失败,从而考虑通过限制访问或制定新许可证来应对,但这些方案往往被认为不切实际或效果有限。
除了代码托管外,GitHub 的真实价值还在于其集成的项目管理功能,比如 issue 跟踪、 CI/CD 和访问控制。迁移仓库本身并不难,但要把项目的整个表面搬走——包括问题记录和 CI 配置——却是离开 GitHub 的主要障碍。
Forgejo 被视为一个真正可定制、由社区治理的替代方案。与 GitHub 不同,Forgejo 的架构从一开始就为定制设计,允许用户以较少的工作实现私有仓库的"展示"模式等功能,从而提供实际可用的自由,而不仅仅是理论上的源代码访问。
GitHub 的"社交组件",如星标、关注者和协作工具,被一些人视为双刃剑。它们确实有助于项目可发现性,但也催生了虚荣指标,并在用户和贡献者中滋生出某种权利感,这可能侵蚀 FOSS 的核心原则。
虽然去中心化经常被讨论,但现实是多数系统随时间推移会趋向中心化。真正的难题不仅在于离开 GitHub,而在于避免简单地建立另一个新的中心;例如 Forgejo 的兴起本身也可能形成一种新的依赖。
对于不想自托管的人来说,找到简单、低成本的 git 托管服务很困难。多数替代方案要么定价偏向企业级,要么捆绑许多不必要的功能(如 CI/CD 和 AI 工具),市场上缺少类似 GitHub 早期每月 7 美元那样基础且经济实惠的选择。
推动离开 GitHub 的动力来自多重因素的叠加:频繁的服务中断、反 AI 情绪、以及出于政治不稳定和供应链风险对美国科技巨头的普遍不信任。这使得像 Codeberg 这样的欧洲替代方案和各种自托管解决方案更具吸引力。
尽管存在离开 GitHub 的运动,但凭借其强大的网络效应、免费资源和高可发现性,GitHub 仍然是开源项目的主导平台。对许多开发者,尤其是处于职业早期的人来说,GitHub 个人资料在求职时仍然非常重要,因此短期内全面撤离的可能性不大。
• Git was designed to be decentralized, but GitHub became the de facto central hub due to its superior tooling, scalability, and maintenance. Many argue that while moving away from GitHub is possible, maintaining a mirror on GitHub is crucial for discoverability and longevity, as projects on niche or self-hosted platforms often disappear when their mirrors die.
• A major reason for leaving GitHub is the use of public repositories to train commercial AI models like Copilot without explicit consent from developers. This has led to a sense of betrayal, as the social contract of open source, which includes attribution and license compliance, was violated for profit.
• The legal landscape around AI training is shifting in favor of BigTech, with courts often ruling that training on publicly available data is acceptable. This has led some to believe the battle to prevent AI scraping is already lost, pushing developers to consider gated access or new licenses, though these are seen as impractical or ineffective.
• Beyond hosting, GitHub's real value lies in its integrated project management tools, such as issue tracking, CI/CD, and access control. Moving a repository is easy, but migrating the entire project surface, including issues and CI configurations, is the primary barrier to leaving.
• Forgejo is highlighted as a genuinely hackable and community-governed alternative. Unlike GitHub, its architecture is designed for customization, allowing users to implement features like "showcase" modes for private repos with minimal effort, providing actual freedom rather than just theoretical access to source code.
• The "social component" of GitHub, including stars, followers, and collaboration tools, is seen by some as a double-edged sword. While it aids discoverability, it also creates vanity metrics and a sense of entitlement among users and contributors, which can be detrimental to the core principles of FOSS.
• Decentralization is often discussed, but the reality is that most systems tend to centralize over time. The challenge is not just to move away from GitHub but to avoid simply creating a new center, as seen with the rise of Forgejo, which itself becomes a new dependency.
• For those who do not want to self-host, finding a simple, low-cost git hosting service is difficult. Most alternatives are enterprise-priced or come with unnecessary features like CI/CD and AI tools, whereas the market lacks a bare-bones, affordable option similar to GitHub's early $7 plan.
• The push to leave GitHub is driven by a convergence of factors: frequent outages, anti-AI sentiment, and a general distrust of US-based tech giants due to political instability and supply chain risks. This has made European alternatives like Codeberg and self-hosted solutions more attractive.
• Despite the movement away from GitHub, it remains the dominant platform for open source due to its network effects, free resources, and discoverability. For many developers, especially those early in their careers, a GitHub profile is still essential for employment, making a complete exodus unlikely in the near term.
作者描述了一次有意识的迁移:把整个数字基础设施从美国云服务迁向 European 替代方案,原因是他们对自己的数据和工具托管在自己无法控制、司法环境日益不可预测的服务器上感到越来越不安。作者认为,数字主权不是流行语,而是关于知道数据存放在哪里、不会因为一次政策变更或企业并购就失去对关键工具访问权的一种务实立场。这次迁移与其说是出于偏执,倒不如说是为了让基础设施选择与价值观保持一致。 The author describes a deliberate migration of their entire digital infrastructure away from US-based cloud services toward European alternatives, driven by a growing unease with how much of their data and tooling sat on servers they didn't control, in a jurisdiction they found increasingly unpredictable. Digital sovereignty, they argue, isn't a buzzword but a practical stance about knowing where your data lives and not being one policy change or corporate acquisition away from losing access to critical tools. The migration was less about paranoia and more about aligning infrastructure choices with values.
作者描述了一次有意识的迁移:把整个数字基础设施从美国云服务迁向 European 替代方案,原因是他们对自己的数据和工具托管在自己无法控制、司法环境日益不可预测的服务器上感到越来越不安。作者认为,数字主权不是流行语,而是关于知道数据存放在哪里、不会因为一次政策变更或企业并购就失去对关键工具访问权的一种务实立场。这次迁移与其说是出于偏执,倒不如说是为了让基础设施选择与价值观保持一致。
分析工具是首个改动点。 Google Analytics 被自托管的 Matomo 替代:所有数据保留在作者自有服务器上,因而无需显示 Cookie 同意横幅。代价是增加了维护工作——作者必须负责更新与备份——但报告全面且界面熟悉。邮件服务从 Google Workspace 迁到 Proton Mail,后者基于 Switzerland,侧重隐私而非广告,在协议层面提供端到端加密。需要注意的是,Proton 的过滤系统不及 Gmail 强大,尤其无法根据邮件正文过滤;即便是高级方案,自定义域名也被限制为三个。密码管理也迁入 Proton 生态,采用 Proton Pass——一个端到端加密的开源工具,受同一 Switzerland 司法管辖,从 1Password 迁过去更多是横向替换而非升级。
在计算资源上,DigitalOcean 被 Scaleway 取代——这家位于 France 的云提供商出乎意料地给作者留下好印象:控制面板简洁、服务器启动迅速,并在选择地点时显示预计 CO2 排放量,这促使作者将大部分基础设施托管在 Paris 。对象存储从 AWS S3 迁到 Scaleway 的 S3 兼容服务,使用 rclone 迁移;由于 bucket 体量大,这一机械化过程耗时一周多。异地备份从 Backblaze 迁到 OVHcloud,作为 European 最大的云提供商之一,一旦配置生命周期规则把旧备份转入冷存储,会更划算;不过 OVH 的控制面板被形容为迷宫,需要耐心并配合终端操作才能顺利使用。
事务性邮件从 Twilio SendGrid 切换到 Lettermint——一个更精简的 European 服务,投递表现良好、定价透明;通过合并两个 SendGrid 账户,作者实际上节省了成本。错误追踪由 Sentry 改为自托管的 Bugsink,仅需一行配置就能接收 Sentry 的 SDK 。 Bugsink 功能本就精简,缺少性能监控和高级告警,但对作者来说,一个带堆栈跟踪的远程错误日志已足够,而且数据完全不离开他们的基础设施。 AI API 集成从 OpenAI 转到 Mistral——这家总部在 Paris 的提供商提供开放权重模型和清晰的 API,迁移在质量上属横向,但在资金去向和提供商价值观上更有意义。
并非所有服务都迁移。 Cloudflare 仍被保留为 CDN,因为其主要作用是缓存并保护已公开的内容,这改变了关于主权的考量;而其诸如安全规则和 Workers 平台等功能,Bunny CDN 未能充分替代。支付处理仍使用 Stripe,尽管作者更倾向于 EU 司法管辖,因为迁移会牵扯到账单逻辑、 webhook 和税务发票等,需要谨慎时机;Dutch 替代方案 Mollie 在他们的用例下反而更昂贵。 AI 代码辅助从 OpenAI 切到 Claude Code,后者仍基于美国,但作者之所以选择,是因为 Anthropic 在安全性和透明度方面的方法更有结构性基础;作者也指出,像 Alibaba 的 Qwen 这样的本地模型在完全在自有硬件上运行推理方面正变得越来越可行。 GitHub 也保留用于面向公众的 NPM 包和开源问题跟踪——网络效应和开发者预期让它成为现实的选择。
总体评价是积极的:大多数迁移只花了半天时间,少数耗时更久,但没有发生严重问题。两个月下来,一切平稳运行。作者的结论是,European 云生态大体成熟,工具可靠且功能完善,唯一阻碍他们的只是惰性。数字主权就是要意识到谁在持有你的数据、政治变化会带来什么影响,而这次迁移证明,完全可以主要依靠 European 基础设施来运行专业级的数字技术栈。
The author describes a deliberate migration of their entire digital infrastructure away from US-based cloud services toward European alternatives, driven by a growing unease with how much of their data and tooling sat on servers they didn't control, in a jurisdiction they found increasingly unpredictable. Digital sovereignty, they argue, isn't a buzzword but a practical stance about knowing where your data lives and not being one policy change or corporate acquisition away from losing access to critical tools. The migration was less about paranoia and more about aligning infrastructure choices with values.
Analytics was the first target. Google Analytics was replaced with a self-hosted Matomo instance, which keeps all data on the author's own server and eliminates the need for cookie consent banners. The tradeoff is maintenance overhead, since the author is now responsible for updates and backups, but the reporting is comprehensive and the interface familiar. Email moved from Google Workspace to Proton Mail, which is based in Switzerland and built around privacy rather than advertising, with end-to-end encryption at the protocol level. The adjustment worth noting is that Proton's filter system is more limited than Gmail's, particularly the inability to filter on email body content, and custom domains are capped at three even on higher-tier plans. Password management followed into the Proton ecosystem with Proton Pass, an end-to-end encrypted, open-source tool under the same Swiss jurisdiction, making the move from 1Password more of a lateral shift than an upgrade.
For compute, DigitalOcean was replaced with Scaleway, a French cloud provider that turned out to be a pleasant surprise with a clean control panel, fast server provisioning, and the notable feature of displaying projected CO2 emissions alongside location choices, which led the author to host most infrastructure in Paris. Object storage migrated from AWS S3 to Scaleway's S3-compatible offering using rclone, a mechanical process that took over a week due to bucket size. Offsite backups moved from Backblaze to OVHcloud, Europe's largest cloud provider, which is cheaper once lifecycle rules are configured to move older backups to cold storage, though the OVH control panel is described as a labyrinth that requires patience and terminal work to navigate.
Transactional email shifted from Twilio SendGrid to Lettermint, a leaner European service with solid deliverability and straightforward pricing that actually cut costs by allowing the author to merge two SendGrid accounts. Error tracking moved from Sentry to Bugsink, a self-hosted tool that accepts Sentry's SDK with a one-line configuration change. Bugsink is bare-bones with no performance monitoring or advanced alerting, but for the author's needs, a simple remote error log with stack traces, it works perfectly with no data leaving their infrastructure. AI API integrations switched from OpenAI to Mistral, a Paris-based provider with open-weight models and a clean API, making the transition lateral in quality while meaningfully better in terms of where the money goes and the values behind the provider.
Not everything moved. Cloudflare remains as the CDN because its role is to cache and protect already-public content, making the sovereignty calculus different, and its feature set including security rules and the Workers platform wasn't matched closely enough by the European alternative Bunny CDN. Stripe remains as the payment processor despite the author's preference for EU jurisdiction, because migration touches billing logic, webhooks, and tax invoicing in ways that require careful timing, and Mollie, the Dutch alternative, is more expensive for their use case. AI code assistance moved from OpenAI to Claude Code, which is still US-based but chosen because Anthropic's approach to safety and transparency feels more structurally grounded, and the author notes that local models like Alibaba's Qwen are becoming increasingly viable for running inference entirely on your own hardware. GitHub also remains for public-facing NPM packages and open source issue tracking, where network effects and developer expectations make it the practical choice.
The overall assessment is positive. Most migrations took an afternoon of work, a few took longer, and none were catastrophic. Two months in, everything runs without incident. The author's conclusion is that the European cloud ecosystem is mostly mature, the tools are reliable and capable, and the only thing that was stopping them was inertia. Digital sovereignty, they argue, is about being conscious of who holds your data and what happens when politics shift, and this migration proved it's entirely possible to run a professional digital stack mostly from European infrastructure.
- 欧洲各机构的态度发生了戏剧性变化:数据主权和在欧盟境内托管的能力已成为采购与规划中的标准且不可谈判的要求,这与几年前截然不同。
- 这种转变主要受当前美国政治局势驱动:贸易战威胁、关税措施,甚至对盟友(如格陵兰)采取军事行动的可能性,根本性地破坏了信任,使美国更像不可靠的伙伴而非稳定盟友。
- 例如微软封锁国际刑事法院检察官的邮件,以及美国在全球冲突中的立场,成为重要警示,推动组织加速从美国云基础设施向欧洲替代方案迁移。
- 尽管大语言模型和人工智能工具能在技术层面辅助迁移,但规划、协调与执行等核心挑战仍然艰巨,需要大量专业人力,使该过程更多是战略权衡,而非单纯的技术替换。
- 许多组织已在欧洲基础设施上开展"影子运营",从理论规划走向实际部署,因为担心美国大型科技公司随时可能被用来损害欧洲利益。
- 信任的失落被视为结构性且长期的。普遍认为,即便未来出现更"理智"的美国政府,也难以立即扭转局面,因为对美国科技巨头的依赖已显露风险,难以快速消除。
- 欧洲企业正把握这一机遇。许多公司报告称,来自欧盟客户的兴趣明显上升,这些客户明确希望与美国供应商脱钩,即便欧洲替代方案尚未完全成熟。
- "数字主权"被大力倡导,开发者和企业正将技术栈迁移到 Hetzner 、 OVH 、 Scaleway 和 Proton 等欧洲供应商,尽管通常需在成本、便利性或特定功能上做出权衡。
- 尽管向欧洲基础设施迁移势头明显,但大家也承认欧盟并非完美的避风港:其自身存在数字监管问题,如可能的 VPN 限制或聊天管制法律,不过这些通常被认为比美国的行为更可预测、威胁性更低。
- 这些讨论反映出更广泛的地缘政治脱钩:美欧这段"家庭式"关系正经历"青春期",欧洲在寻求定义自身身份并降低对美国技术与安全保障的依赖。
• There has been a dramatic and rapid shift in sentiment across European organizations, with data sovereignty and the ability to host within the EU becoming a standard, non-negotiable requirement in procurement and planning, a stark change from just a few years ago.
• This shift is primarily driven by the current US political climate, including threats of trade wars, tariffs, and military action against allies like Greenland, which have fundamentally broken trust and made the US seem like an unreliable partner rather than a stable ally.
• Specific events like Microsoft blocking the ICC prosecutor's email and the US stance on global conflicts have acted as major alarm bells, accelerating migrations from US-based cloud infrastructure to European alternatives.
• While LLMs and AI tools can assist with the technical aspects of migration, the core challenges of planning, alignment, and execution remain difficult and require significant human expertise, making the process more about strategic trade-offs than just a simple technical swap.
• Many organizations are now actively running "shadow operations" on European infrastructure, moving from theoretical planning to practical execution due to fears that US tech monopolies could be weaponized against European interests at any moment.
• The loss of trust is seen as structural and long-lasting, with the consensus being that even a future "sane" US administration would not immediately reverse the damage, as the risk of depending on US monopolies has now materialized and cannot be easily undone.
• European companies are seizing this opportunity, with many reporting a significant uptick in interest from EU clients specifically looking to decouple from US providers, regardless of whether the European alternatives are currently feature-perfect.
• There is a strong push for "digital sovereignty," with developers and businesses migrating stacks to European providers like Hetzner, OVH, Scaleway, and Proton, though this often involves trade-offs in cost, convenience, or specific feature sets.
• Despite the move towards European infrastructure, there is an acknowledgment that the EU is not a perfect "sanctuary," as it has its own issues with digital regulation, such as potential VPN restrictions or chat control laws, though these are generally viewed as more predictable and less existentially threatening than US actions.
• The discussion highlights a broader geopolitical decoupling, where the "familial" relationship between the US and Europe is entering an "adolescent" phase, with Europe seeking to define its own identity and reduce its reliance on American technology and security guarantees.
2026 年 5 月 13 日,互联网清理基金会推出了 SecurityBaseline.eu,这是一个用于监控和可视化欧洲各国政府网络安全状况的新网站。该项目源自 Netherlands 的"Basisbeveiliging"计划,后者已经追踪基础安全十余年。基金会在网站上线前三个月向欧洲各国政府发送了数万封邮件,给各方机会在数据公开前审查并修复问题。其目标是提高网络透明度,并通过促使政府对自身和国家实施更高的安全标准来更好地保护公民。 ## European Government Security: A Wake-Up Call from SecurityBaseline.eu
2026 年 5 月 13 日,互联网清理基金会推出了 SecurityBaseline.eu,这是一个用于监控和可视化欧洲各国政府网络安全状况的新网站。该项目源自 Netherlands 的"Basisbeveiliging"计划,后者已经追踪基础安全十余年。基金会在网站上线前三个月向欧洲各国政府发送了数万封邮件,给各方机会在数据公开前审查并修复问题。其目标是提高网络透明度,并通过促使政府对自身和国家实施更高的安全标准来更好地保护公民。
SecurityBaseline.eu 使用名为 Web Security Map 的软件,该软件已开发超过十年。网站覆盖 32 个国家,包括所有 EU 成员国以及 Switzerland 、 Norway 、 Iceland 和 Liechtenstein,检测约 67,000 个地方政府的近 200,000 个互联网域名(实际的政府域名数量可能高出十倍)。网站每天生成超过 1,800 张"交通灯"式地图:红色表示存在安全问题,橙色表示有警告,绿色表示无问题。这些地图基于 21 项指标,涵盖从加密质量到是否存在跟踪 cookie 等多方面内容。
其中一项令人担忧的发现是,有 3,081 个欧洲政府网站在未经用户同意的情况下使用跟踪 cookie,这违反了 GDPR 。按比例看,Slovakia 以近 9.88% 位列首位,其次是 Greece(8.16%)和 Portugal(7.63%)。 YouTube 是这些跟踪 cookie 的最大来源,出现 2,077 次,其次是 Google Ads(842 次)。基金会指出,许多跟踪 cookie 是集成现代技术时带来的副作用,这类技术往往隐藏了广告相关代价,因此敦促政府采用更尊重隐私的网页开发做法。
另一大问题是数据库管理界面的外置,尤其是 phpMyAdmin,本不应对外公开。基金会在 3,529 个域名上发现了 1,070 个 phpMyAdmin 门户,France 有 513 个实例、 Poland 有 499 个。暴露的管理面板风险极高,容易引发安全事故,例如今年早些时候 cPanel 中发现的严重漏洞。基金会还指出,尽管 phpMyAdmin 是开源软件,但没有任何欧洲政府对该项目提供资助,这反映出对自身线上安全投入的不足。
或许更令人震惊的是,欧洲有 99% 的政府邮件加密水平不达标。只有 Netherlands 和 Denmark 的情况相对较好,分别有 58% 和 44% 的邮件域名符合现代加密标准。该加密质量依据 Netherlands 政府的最新指南进行测评,这些指南尚未在欧洲层面标准化。 Germany 和 France 等国虽有各自指南,但相互不兼容且缺乏简便的检测工具。加密不足使得政府通信易被窃听和篡改。
基金会强调,这些问题不能靠一次性修补解决,而需要持续改进并适应未来变化,例如更强的加密和量子密码学。他们敦促各国政府建立变更流程并加大线上安全投入。 SecurityBaseline.eu 的数据公开可查,基金会鼓励政府利用这些数据提升安全态势,并邀请组织与个人通过成为会员或提出进一步研究请求来支持他们的工作。
文章最后附有详细来源表,展示各国在跟踪 cookie 、 phpMyAdmin 面板与邮件加密质量方面的分布,直观呈现了安全格局,便于政府与公众识别需改进之处。基金会的工作得到包括 CIP 、 RDI 、 SIDN Fonds 、 cobytes 和 procolix 及其会员的支持,致力于通过透明化与对在线可用性、完整性和机密性的研究,推动互联网更安全。
## European Government Security: A Wake-Up Call from SecurityBaseline.eu
On May 13, 2026, the Internet Cleanup Foundation launched SecurityBaseline.eu, a new website designed to monitor and visualize the cybersecurity posture of European governments. This initiative is a spin-off from the Dutch "Basisbeveiliging" project, which has been tracking baseline security for over a decade. The foundation sent tens of thousands of emails to European governments three months prior to the launch, giving them time to review their security status and address any issues before the data became public. The goal is to make the web more transparent and to help governments protect their citizens by imposing higher security standards on themselves and their countries.
SecurityBaseline.eu uses software called Web Security Map, which has been in development for over ten years. The site measures security across 32 countries, including all EU member states plus Switzerland, Norway, Iceland, and Liechtenstein. It covers nearly 200,000 internet domains across approximately 67,000 local governments, though the true number of government domains is likely ten times higher. The site generates over 1,800 maps daily, each colored like a traffic light: red for security issues, orange for warnings, and green for no issues. These maps cover 21 different metrics, ranging from encryption quality to the presence of tracking cookies.
One of the most alarming findings is that 3,081 European government sites use tracking cookies without user consent, which is illegal under the GDPR. Slovakia leads with nearly 9.88% of its governmental sites placing tracking cookies, followed by Greece at 8.16% and Portugal at 7.63%. YouTube is the largest source of these tracking cookies, with 2,077 instances, followed by Google Ads with 842. The foundation notes that many of these tracking cookies are a side effect of integrating modern technologies that have hidden advertising costs, and they urge governments to adopt more privacy-friendly web development practices.
Another significant issue is the exposure of database management interfaces, specifically phpMyAdmin, which should not be publicly accessible. The foundation found 1,070 phpMyAdmin portals across 3,529 domains, with France leading at 513 instances and Poland at 499. These exposed panels are particularly dangerous because they are prone to security incidents, such as the severe vulnerability discovered in cPanel earlier this year. The foundation also points out that while phpMyAdmin is open-source software, no European governments have financially contributed to the project, highlighting a concerning lack of investment in their own online security.
Perhaps the most shocking discovery is that 99% of governmental email in Europe is poorly encrypted. Only the Netherlands and Denmark show somewhat promising numbers, with 58% and 44% of their email domains meeting modern encryption standards, respectively. The encryption quality is measured using the latest guidelines from the Dutch government, which are not yet standardized at the European level. Countries like Germany and France have their own guidelines, but they are not compatible and lack simple testing tools. This poor encryption leaves government communications vulnerable to eavesdropping and tampering.
The foundation emphasizes that these issues cannot be fixed with a one-time effort but require continuous improvement and adaptation to future changes, such as stronger encryption and quantum cryptography. They urge governments to establish change processes and invest in their online security. The data from SecurityBaseline.eu is publicly available, and the foundation encourages governments to use it to improve their security posture. They also invite organizations and individuals to support their mission by becoming members or requesting further research.
The article concludes with detailed source tables showing the distribution of tracking cookies, phpMyAdmin panels, and email encryption quality across European countries. These tables provide a clear and transparent overview of the security landscape, allowing governments and citizens to see where improvements are needed. The foundation's work is supported by various organizations, including CIP, RDI, SIDN Fonds, cobytes, and procolix, as well as their members. They remain committed to making the internet safer through transparency and research into online availability, integrity, and confidentiality.
• 德国对"黑客"行为的刑事化(如《刑法典》第 202a 条和第 202c 条)产生了明显的寒蝉效应:把未经授权访问、甚至对公开可访问系统的测试定为违法,使得道德黑客因担心被起诉而不敢去检测包括政府网站在内的安全弱点。
• 德国存在一种更倾向于推脱责任和官僚自我保护的文化,而非主动改善安全,这导致漏洞常被搁置,往往只有在发生重大事故后才被迫处理。
• 尽管是 Chaos Computer Club 的发源地,德国在留住和发挥技术人才方面却困难重重:许多技术人员选择出走,留在国内的则常被僵化的体制限制,无法充分施展专长。
• GDPR 初衷良好,但在欧洲各国的执行不均:如西班牙等南欧国家积极对大型公司罚款,而德国等北欧国家则狭隘地把注意力集中在 cookie 同意问题上,忽视了更广泛的数据治理和执法议题。
• 一个名为 SecurityBaseline 的新项目扫描了全欧洲超过 267,000 个政府和公共网站,揭示出普遍存在的问题:非法跟踪 cookie 、暴露的数据库接口、薄弱的电子邮件加密等,凸显出对基础安全实践的系统性忽视。
• 也有批评认为,部分发现(例如缺少 DNSSEC 或使用第三方电子邮件服务)被过度渲染或错误归类为高风险,这种将轻微配置问题与真正安全威胁混淆的做法可能削弱报告的可信度。
• 在官方欧盟域名 ec.europa.eu 上发现一个疑似恶意 PDF 文件,讽刺地表明:在严格约束私营部门的数字法规面前,政府自身的基础设施安全却未得到相应保障。
• 与德国相比,意大利在公共部门数字化方面表现相对更好,这在很大程度上得益于集中化举措(如共享市政网站框架)以及较早采用 SPID 和 PEC 等国家级数字身份体系。
• 政府 IT 岗位普遍缺乏问责机制且停滞不前,绩效不佳的员工很少被解聘,通常只在部门间调动,从而缺乏维护现代化、安全系统的动力。
总体上,讨论暴露出德国在网络安全方面的深刻矛盾:一方面拥有深厚的黑客文化和隐私保护传统,另一方面法律与体制障碍却抑制了道德安全研究和实际改进。尽管 SecurityBaseline 之类的工具揭示了政府基础设施中的明显漏洞,官方回应却常呈防御性或淡化态度,反映出更倾向于追求合规形式而非切实安全的做法。与此同时,意大利等国表明,集中化、充足投入和有执行力的领导比单纯监管更能带来可见成效。讨论还指出,公众对 GDPR 的认知越来越被简化为 cookie 横幅等表面现象,掩盖了数据治理与执法中更关键的议题。
• Germany's strict hacking laws, such as § 202a and § 202c StGB, create a chilling effect on security research by criminalizing unauthorized access even to publicly reachable systems, discouraging ethical hackers from testing government websites for fear of prosecution.
• There is a cultural tendency in Germany to prioritize blame avoidance and bureaucratic self-preservation over proactive security improvements, meaning vulnerabilities are often ignored until a major incident forces action.
• Despite being home to the Chaos Computer Club, Germany struggles with retaining tech talent, as skilled individuals either leave the country or are stifled by rigid institutional structures that fail to leverage their expertise.
• The GDPR, while well-intentioned, suffers from inconsistent enforcement across Europe, with southern countries like Spain actively fining large corporations while northern nations like Germany focus narrowly on cookie consent rather than broader data protection issues.
• A new project called SecurityBaseline has scanned over 267,000 government and public sites across Europe, revealing widespread issues including illegal tracking cookies, exposed database interfaces, and poor email encryption, highlighting systemic neglect of basic security practices.
• Some critics argue that certain findings, like missing DNSSEC or the use of third-party email providers, are overemphasized or misclassified as high-risk, potentially undermining the credibility of the report by conflating minor configuration issues with serious security threats.
• The discovery of a potentially malicious PDF hosted on an official EU domain (ec.europa.eu) underscores the irony of governments failing to secure their own infrastructure while enforcing strict digital regulations on private entities.
• In contrast to Germany, Italy performs relatively well in public sector digitalization, thanks to centralized initiatives like shared municipal website frameworks and early adoption of national digital identity systems such as SPID and PEC.
• Government IT roles often suffer from low accountability and stagnation, with underperforming staff rarely fired and instead transferred between departments, creating little incentive for maintaining modern, secure systems.
The discussion reveals a deep frustration with Germany's paradoxical relationship with cybersecurity: despite a strong tradition of hacker culture and privacy advocacy, legal and institutional barriers actively discourage ethical security research. While tools like SecurityBaseline expose glaring vulnerabilities in government infrastructure, responses are often defensive or dismissive, reflecting a broader pattern of prioritizing legal compliance over actual security. Meanwhile, other European countries like Italy demonstrate that centralized, well-funded digital initiatives can yield better outcomes, suggesting that political will and competent leadership matter more than regulation alone. The conversation also highlights how public perception of laws like GDPR has become fixated on superficial elements like cookie banners, overshadowing more critical aspects of data governance and enforcement.
作者认为,软件正在经历他所称的"Emacs 化",这一变化由 AI 代码代理推动。 Emacs 文化是指用户为了解决自己特定的问题,构建个人化、常带个人风格的工具,这类工具往往牺牲了可发现性和广泛可用性。现在这种理念正从文本编辑器蔓延到应用开发领域。原本构建原生用户界面很难,需要专业开发者,但有了代理,任何人都能迅速"挤出"定制化应用。这些应用不挣钱、没有明显的市场定位,仅仅是让一小撮极客的生活稍微好一点。 The author argues that software is undergoing what he calls "Emacsification," a shift driven by AI code agents. Emacs culture is defined by users building personal, often idiosyncratic tools to solve their own specific problems, frequently at the expense of discoverability or broad usability. With AI agents, this same ethos is now leaking out of text editors and into application development. Building native user interfaces used to be difficult work that required professional software developers, but agents now allow anyone to quickly "extrude" bespoke applications. These applications make no money and have no obvious market fit. They simply make life slightly better for a small group of nerds.
作者认为,软件正在经历他所称的"Emacs 化",这一变化由 AI 代码代理推动。 Emacs 文化是指用户为了解决自己特定的问题,构建个人化、常带个人风格的工具,这类工具往往牺牲了可发现性和广泛可用性。现在这种理念正从文本编辑器蔓延到应用开发领域。原本构建原生用户界面很难,需要专业开发者,但有了代理,任何人都能迅速"挤出"定制化应用。这些应用不挣钱、没有明显的市场定位,仅仅是让一小撮极客的生活稍微好一点。
这一浪潮源于对现有工具糟糕体验的失望。作者指出,虽然 Markdown 已成为软件开发的通用语言,但在终端里用等宽字体阅读常令人疲惫;而图形化编辑器又对只是"查看"文件来说太过侵入。为了解决这个问题,作者用 Claude 代理做出了 MDV.app——一个专门的原生 macOS Markdown 查看器。它包含搜索、书签、复制粘贴等常规功能,注重排版并用 SQLite FTS 建索引。大约用了 30 分钟的互动时间,就做出了一款比 App Store 上现有工具更能提升他日常体验的产品。
作者认为 MDV.app 预示着更大趋势的开端。开发者不再需要依赖臃肿的、把 Chromium 打包进来的单体 Electron 应用,而会越来越多地用代理去构建专门的原生 UI 工具——关键在于创意而非源代码本身。他明确鼓励读者不必拘泥于使用他的工具,而是"拿去这个想法",做出更好的变体。这是向个人化软件的转变:一波开发者会为了解决自身痛点去打造界面优雅、针对特定"极客"问题的工具,而这些工具以前难以证明投入的价值。
所谓软件的"Emacs 化",就是向个人化、定制化应用的转变。在这个生态里,驱动软件的提示词和背后的想法,比源代码更有价值。作者形容这种"Emacs 化"被 AI 代理"撬开",让原生 UI 开发变得可接近且有趣。他把这种体验比作配置 Emacs:软件开发平台变得极具可配置性。这一趋势会让"极客软件"更有吸引力,人们会用新工具替代那些糟糕的终端专用工具。
作者还举出超出简单 Markdown 查看器的例子:用代理为复杂的系统监控工具(如 bpftrace 、 iostat)构建原生 UI,取代丑陋的终端可视化。他把这种变化看作"纯粹的好事",尽管围绕 AI 的安全隐忧仍然存在。他鼓励大家别把构建软件当成传统的体力活,而是开始用代理去"配置"。建议极客们去试一试,做"某个愚蠢但非常特定的东西",然后分享成果,或者至少分享所用的提示词。
作者认为,这种转变会催生一波缺乏广泛商业吸引力的个人软件。这些工具可能只服务小群体,甚至只是开发者本人。 Emacs 化让任何人都能创建这些小众、个性化的工具,代表了从单体 Electron 应用向小型、原生、按需定制软件的转变。用于创建这些工具的提示与想法,与工具本身一样重要,构建软件的过程正在演变成一种配置行为。
The author argues that software is undergoing what he calls "Emacsification," a shift driven by AI code agents. Emacs culture is defined by users building personal, often idiosyncratic tools to solve their own specific problems, frequently at the expense of discoverability or broad usability. With AI agents, this same ethos is now leaking out of text editors and into application development. Building native user interfaces used to be difficult work that required professional software developers, but agents now allow anyone to quickly "extrude" bespoke applications. These applications make no money and have no obvious market fit. They simply make life slightly better for a small group of nerds.
The phenomenon was triggered by frustration over the poor quality of existing tools. The author suggests that while Markdown has become the universal language of software development, the tools used to read it in the terminal are often fatiguing when rendered in monospaced fonts. Graphical UI editors are too intrusive for just "viewing" a file. To solve this, the author used the Claude agent to build MDV.app, a dedicated native macOS Markdown viewer. The tool includes standard features like search, bookmarks, and copy-paste, along with good typography and a SQLite FTS index. It took about 30 minutes of interactive time to build something that improves the author's daily quality of life better than anything currently on the App Store.
The author believes SDV.app marks the start of a larger trend. Instead of relying on awful, monolithic Electron apps that carry their own copy of Chromium, developers will increasingly use agents to build specialized native UI tools where the key artifact is the idea rather than the source code. He explicitly encourages readers not to necessarily use his tool, but to "steal the idea" and build their own better versions. This represents a shift toward personal software. He suggests that we will see a wave of builders scratching their own itches, solving specific "nerd" problems with pleasant interfaces that were previously too difficult to justify the effort of building.
The "Emacsification" of software refers to the shift toward personal, bespoke applications. In this ecosystem, the prompts and the ideas behind the software are more valuable than the source code itself. "Emacsification" is described as "fracked" by AI agents, making native UI development accessible and fun. The author compares the experience to configuring Emacs, because the platform of software development has become vastly more configurable. He suggests that this trend will make "nerd software" more interesting as people build tools to replace terrible terminal-only utilities.
The author concludes by providing examples of this trend beyond simple Markdown viewers. He mentions using agents to build native UI for complex system monitoring tools like `bpftrace` and `iostat`, replacing ugly terminal visualizations. He frames this as an "unalloyed good," even amidst the dread surrounding AI and security vulnerabilities. He encourages readers to stop thinking of software construction as "building" in the traditional, labor-intensive sense and instead start "configuring" with agents. He advises nerds to give it a shot, "make something stupidly specific," and then share the results, or at least the prompts.
He suggests that this shift will lead to a wave of "personal software" that lacks broad commercial appeal. These tools will be created for small groups, or even just the developers themselves. He suggests that the "Emacsification" of software is making the creation of these personal, niche tools accessible to everyone. This represents a move away from monolithic Electron apps. It shows that the future of software might be small, native, and custom-built for specific problems. The prompts used to create these tools are as important as the tools themselves, and the act of building software has become a form of configuration.
• LLMs 实现了"个人软件":用 AI 构建高度定制、一次性的应用以精准契合个人工作流,原本打包出售的专业软件正在被个人夺回。随之而来,消费成为新的瓶颈,因为分享或维护这些个性化的数字"茧房"越来越困难。
• "配置管理"成为下一个前沿:当软件易于生成但难以分享或版本化时,关注点从编写代码转向管理"源代码"——包括提示词、生成日志和截图等,这对 GitHub 以外的协作模式提出了新挑战。
• 这类似于"Lisp 程序员的困境":高度定制带来生态碎片化,解决方案各不相同、难以被他人采用。借助 LLM,这种被称为"双向情感障碍的 Lisp 程序员"(BBM) 的心态可以被放大复制,可能催生"AI 唯我论"。
• "配方"比"工件"更有价值:用户不应只关注分享静态软件二进制,而应分享用于生成应用的提示词和逻辑——具体的代码不如创造它的想法与配方重要。
• 软件的"Emacs 化":LLM 让非专家像 Emacs 用户几十年来那样调整和定制他们的数字环境。但如果缺乏真正的交互式、实时调试循环,这些生成工具可能缺乏传统软件的稳定性。
• 维护比创建更难:虽然现在生成一次性脚本比安装新应用更容易,但为调试边缘案例或随时间更新个人工具所付出的意愿仍然有限,这促成了"杂乱堆"或一次性设计的文化。
• 原生平台 vs 跨平台垃圾:用户可以用 LLM 生成"足够好"的原生应用(如 SwiftUI)或高度专业化的 CLI 工具,从而绕过那些试图面面俱到的替代品,更好地匹配他们的心智模型和性能需求。
• 我们是否在失去软件的"通用语言"?界面和文件格式的高度定制化使互操作更复杂,增加了专业团队协作和未来标准化数字出版的难度,可能迫使 AI 为每个专有生态构建一次性转换器。
• 等宽文字并非普遍"令人疲劳":虽然有人认为比例字体更易阅读,但等宽字体仍是数十亿用户的强烈偏好,在代码或符号数学中通常必不可少。软件的"Emacs 化"让用户能够把 UI 包装成符合自己阅读偏好的样子,而不是被迫接受通用默认。
• 家用计算的原始愿景:上世纪 60 年代的设想是每个家庭终端都能为个人需求编写自定义程序。 LLM 最终把入门门槛降到足够低,从而有可能实现这一愿景,即便生成的"代码"对人类的可读性不如 80 年代的 BASIC 。
• 讨论强调了从"消费优先"的软件经济向以 LLM 为核心的"个人自动化"经济的范式转变。与会者普遍认为 AI 已将定制软件的门槛几乎降为零,当前情形类似于家用计算或高度可定制的 Lisp 环境的早期阶段。但对这种"唯我论"长期影响存在重大分歧,尤其在可维护性、共享标准碎片化以及"氛围编码"能否经受住调试个性化工具的枯燥现实方面。一些人把这视为"高级用户"的新黄金时代,另一些人则警告说,缺乏文档和标准化可能导致不可用的"杂乱堆"。
• LLMs enable "personal software." Packaged, professional software is being reclaimed by individuals using AI to build hyper-specific, "throw-away" apps tailored to their exact idiosyncratic workflows. This shift makes consumption the new bottleneck as sharing or maintaining these personalized digital "cocoons" becomes increasingly difficult.
• "Configuration management" is the next frontier. As software becomes easy to generate but hard to share or version, the focus shifts from writing code to managing "the source." This includes prompts, generated logs, and screenshots, which creates pressure for new collaboration models beyond traditional platforms like GitHub.
• This mirrors the "Lisp programmer's dilemma." High levels of customization led to a fragmented ecosystem where solutions are unique to the individual and difficult for others to adopt. With LLMs, this "Bipolar Lisp Programmer" (BBM) mindset is now scalable, potentially leading to a state of "AI solipsism."
• The value of "recipes" over "artifacts." Instead of sharing static software binaries, users should focus on sharing the prompts and logic used to generate the application. The specific code output is less important than the "idea" and the "recipe" used to create it.
• The "Emacsification" of software. LLMs allow non-experts to tweak and customize their digital environments in the same way Emacs users have done for decades. However, without the interactive, "live" debugging loop of a true programming environment, these generated tools may lack the stability of traditional software.
• Maintenance is harder than creation. While it is now easier to generate a one-off script than to install a new app, the willingness to debug edge cases or update personal tools over time remains a significant hurdle, creating a "cruft heap" or "throwaway design" culture.
• Native platforms vs. cross-platform slop. Users can bypass "replacement-grade" software that attempts to serve everyone poorly by using LLMs to generate "good-enough" native applications (e.g., SwiftUI) or highly specialized CLI tools that better match their mental models and performance needs.
• Are we losing the "common language" of software? The customization of user interfaces and file formats makes interoperability more difficult. This complicates professional teamwork and the future of standardized digital publishing, potentially requiring AI to build "throw-away converters" for every proprietary ecosystem.
• Monospaced text is not universally "fatiguing." While some find proportional fonts easier to read, monospaced text remains a strong preference for billions of users and is often essential for code or mathematical notation. The "Emacsification" of software allows users to shrink-wrap the UI to their specific reading preferences rather than accepting a universal default.
• The original vision of home computing. The 1960s vision was that every home terminal would be used to write custom programs for personal needs. LLMs finally bring the barrier to entry low enough to realize this vision, even if the "code" produced is less comprehensible to a human than 80s-era BASIC.
• The discussion highlights a paradigm shift from a "consumption-first" software economy to a "personal-automation" economy using LLMs. Participants generally agree that AI has lowered the barrier to entry for custom software to near zero, comparing the current moment to the early days of home computing or the highly customizable Lisp environments. However, there is significant debate over the long-term implications of this "solipsism," particularly regarding maintainability, the fragmentation of shared standards, and whether the novelty of "vibe coding" will survive the tedious reality of debugging personalized tools. While some see this as a new golden age for "power users," others warn that the lack of documentation and standardization could lead to an unusable "cruft heap."
Elevator 是一款开创性的二进制翻译器,能够在无需调试信息、源代码或关于代码布局的假设下,将整个 x86-64 可执行文件静态地转换为 AArch64 。不同于现有系统,它不依赖启发式规则或运行时回退来解决代码与数据混淆这一难题;相反,Elevator 会对二进制中每个字节的所有可能解释一一考虑,预先为每种可行解释生成独立的翻译。每个字节既可能是数据、也可能是指令或指令参数,系统为每种可能性构建独立的控制流路径,仅剪除会导致非正常终止的路径。 Elevator is a groundbreaking binary translator that can statically convert entire x86-64 executables to AArch64 without needing debug information, source code, or assumptions about how the code is laid out. What sets it apart from existing systems is that it doesn't rely on heuristics or runtime fallbacks to handle the tricky problem of distinguishing code from data. Instead, it considers every possible interpretation of each byte in the binary, generating separate translations for all feasible interpretations ahead of time. Any byte might be data, an opcode, or an opcode argument, and Elevator creates separate control flow paths for each possibility, only pruning those that would lead to abnormal termination.
Elevator 是一款开创性的二进制翻译器,能够在无需调试信息、源代码或关于代码布局的假设下,将整个 x86-64 可执行文件静态地转换为 AArch64 。不同于现有系统,它不依赖启发式规则或运行时回退来解决代码与数据混淆这一难题;相反,Elevator 会对二进制中每个字节的所有可能解释一一考虑,预先为每种可行解释生成独立的翻译。每个字节既可能是数据、也可能是指令或指令参数,系统为每种可能性构建独立的控制流路径,仅剪除会导致非正常终止的路径。
该系统通过组合从源指令集的高级描述自动派生出的代码"瓦片"来生成翻译,这使得翻译框架既灵活又易于适配。其方法是完全确定性的,意味着输出是完整且自包含的可执行文件,可信代码基中不含任何运行时组件。这与需运行时支持的模拟器或 JIT 编译器不同,后者既有运行时开销,也无法在编译时确定最终会执行哪些代码。
这种彻底性带来的主要代价是代码体积显著膨胀:同一字节的多种解释会产生多条代码路径,导致生成的代码增多。然而,关键优势在于生成的二进制确实代表将在目标硬件上运行的实际代码,从而可以在部署前对翻译结果进行测试、验证、认证,甚至进行加密签名,相较于那些只有在运行时才能确定最终执行代码的方法,这大大降低了风险。
研究者在多种真实二进制上对 Elevator 进行了评估,包括整个 SPECint 2006 基准套件。结果表明,静态的全程序二进制翻译既可靠又实用。在性能上,Elevator 的表现与广泛使用的 QEMU 用户态 JIT 仿真相当或更优,这一成就是值得注意的,因为静态翻译通常难以与能在运行时自适应优化的 JIT 编译器竞争。
总体而言,这项工作标志着二进制翻译技术的一大进步,证明可以在不同处理器架构之间实现对复杂真实二进制的完整静态翻译而不牺牲可靠性。通过消除对启发式方法和运行时组件的依赖,Elevator 为那些对代码完整性和可预测性有严格要求的场景开辟了新可能,例如安全敏感的应用或需要形式化认证的系统。
Elevator is a groundbreaking binary translator that can statically convert entire x86-64 executables to AArch64 without needing debug information, source code, or assumptions about how the code is laid out. What sets it apart from existing systems is that it doesn't rely on heuristics or runtime fallbacks to handle the tricky problem of distinguishing code from data. Instead, it considers every possible interpretation of each byte in the binary, generating separate translations for all feasible interpretations ahead of time. Any byte might be data, an opcode, or an opcode argument, and Elevator creates separate control flow paths for each possibility, only pruning those that would lead to abnormal termination.
The system builds translations by composing code "tiles" that are automatically derived from a high-level description of the source instruction set architecture. This makes the translation framework nimble and adaptable. The approach is fully deterministic, meaning it produces complete, self-contained binaries with no runtime component in the trusted code base. This is a significant departure from emulators or JIT compilers, which carry runtime overhead and uncertainty about what code will actually execute.
The main trade-off for this thoroughness is substantial code size expansion, since multiple interpretations of the same bytes result in multiple code paths being generated. However, the key benefit is that the output represents the actual code that will run on the target hardware. This enables testing, validation, certification, and even cryptographic signing of the translated binary before it's ever deployed, which significantly reduces risk compared to approaches where the final executing code isn't known until runtime.
The researchers evaluated Elevator on a diverse set of real-world binaries, including the entire SPECint 2006 benchmark suite. The results demonstrate that static full-program binary translation can be both reliable and practical. In terms of performance, Elevator achieves results on par with or better than QEMU's user-mode JIT emulation, which is a widely used and respected dynamic binary translation system. This is a notable achievement since static translation typically faces challenges competing with the optimization opportunities available to JIT compilers that can adapt at runtime.
The work represents a significant advance in binary translation technology, showing that it's possible to achieve complete static translation of complex real-world binaries across different processor architectures without sacrificing reliability. By eliminating the need for heuristics and runtime components, Elevator opens up new possibilities for scenarios where code integrity and predictability are critical, such as in security-sensitive applications or systems requiring formal certification.
一位开发者回顾了他在 2013 年实现高性能 x86-64 到 aarch64 JIT 引擎的经历。他指出,该实现虽比原生代码慢约 2–5 倍,但 QEMU 的 JIT 慢得更多,达 10–50 倍,说明 QEMU 的方法还有很大优化空间。
QEMU 的 JIT 架构以广泛的架构兼容性为优先,而非针对性性能优化。它采用通用的"客户机 → 中间表示 → 主机"流程,因此放弃了对特定客户机 / 主机配对进行深度优化所能带来的性能提升,比如针对 x86 寄存器稀少性的优化,或利用两种架构间相符的浮点语义。
从认证和监管的角度看,静态二进制翻译具有显著优势,尤其是在航空、医疗等必须使用确定性且可签名代码的领域。尽管 JIT 在性能上可能更有优势,但在这些行业,基于 JIT 的方案通常不可接受。
间接跳转通过查找表处理——将原始地址映射到已翻译代码的位置。虽然这增加了开销,但可以接受,因为间接跳转本身就更慢,且很少出现在性能关键的循环中(尽管它们确实出现在解释器的核心调度路径上)。
Elevator 翻译器相比 QEMU 在运行时大约快 4.75 倍,但代价明显:执行指令数增加约 7 倍,二进制体积放大约 50 倍,且受限于单线程、不支持异常处理、 ISA 支持不完整,因此并不适用于像基于 Electron 的 Slack 这类复杂应用。
自修改代码明确不被 Elevator 和所有完全静态二进制重写器支持;静态翻译本质上无法处理运行时代码生成。不过由于 W^X 安全策略以及在超标量 CPU 上带来的性能损失,自修改代码在现代系统中已相当罕见。
把每个字节偏移都当作潜在的代码起点来翻译,会使二进制增大约 50 倍,进而带来缓存性能问题。不过在链接阶段对代码重排、把热代码聚合在一起,可以缓解这一问题,前提是假定大多数可能的解码起点在运行时仍然不可达。
Apple 的 Rosetta 受益于 Apple 添加的 ARM 特定扩展,用以模拟 x86 的内存模型——这些扩展比 ARM 标准实现更早且有所差异。此外,Rosetta 可能还获得了硬件层面对 x86 标志位仿真的支持,使其相比通用翻译方法具有性能优势。
讨论强调了 AI 行业追求速度与受监管行业对确定性、可审计软件需求之间的紧张:LLM 被视为通用解法,而安全关键系统则需要经过认证的编译流水线,且审查的工件通常停留在二进制生成之前的最后一层抽象。
Elevator 采用超集反汇编来化解代码与数据的二义性:把每个字节既视为数据又作为潜在指令起点进行翻译,构建完整的控制流图,并用运行时查找表来处理间接跳转。但由于基本的理论限制,这种方法无法对抗性代码或运行时代码生成。
总体讨论显示出与会者对二进制翻译各种权衡的深入理解:静态翻译在认证上提供了宝贵的确定性,但相较于 JIT,会在性能和体积上付出明显代价。对话还强调,不同用途——从爱好者实验到安全关键系统——需要不同的优化优先级。 QEMU 的广泛架构支持与那些能针对特定客户机 / 主机优化的专用翻译器形成鲜明对比。监管要求是采用静态翻译的重要推动力,但与会者也指出,AI 行业目前更偏重于快速迭代,而非主导受监管环境下的认证与可复现性工作。
• A developer shares a personal anecdote about creating a high-performance x86-64 to aarch64 JIT engine in 2013, noting that while their implementation was 2x-5x slower than native code, QEMU's JIT was significantly slower at 10x-50x, suggesting substantial room for optimization in QEMU's approach.
• QEMU's JIT architecture prioritizes broad architectural support over optimization, using a generic guest-to-intermediate-representation-to-host design that sacrifices potential performance gains from specializing for specific guest/host pairs, such as leveraging x86's fewer integer registers or matching floating point semantics between architectures.
• The certification and regulatory angle emerges as a key advantage of static binary translation, particularly for industries like aviation and medical devices where code must be deterministic and signable, making JIT-based solutions unacceptable despite potential performance benefits.
• Indirect jumps are handled through lookup tables mapping original addresses to translated code locations, which adds overhead but is acceptable since indirect jumps are inherently slower and rarely appear in performance-critical loops, though they do occur in core interpreter dispatch mechanisms.
• The Elevator translator achieves ~4.75x runtime speedup over QEMU but with significant tradeoffs: 7x more executed instructions, 50x binary size increase, single-thread limitation, no exception handling, and incomplete ISA support, making it unsuitable for complex applications like Electron-based Slack.
• Self-modifying code is explicitly unsupported by Elevator and all fully static binary rewriters, as static translation fundamentally cannot handle runtime code generation, though self-modifying code has become rare in modern systems due to W^X security requirements and performance penalties on superscalar CPUs.
• The 50x binary size increase from translating every byte offset as potential code creates cache performance concerns, though link-time code reordering could mitigate this by grouping hot code together, assuming most possible decoding starting points remain unreachable at runtime.
• Apple's Rosetta benefits from Apple-specific ARM extensions for x86 memory model emulation that predated and differ from ARM's standard implementations, plus potential hardware support for x86 flags emulation, giving it performance advantages over generic translation approaches.
• The discussion highlights tension between AI industry priorities and regulated industries' needs for deterministic, auditable software, with LLMs being touted as universal solutions while safety-critical systems require certified compilation pipelines where the reviewed artifact is the last abstraction layer before binary generation.
• Elevator uses superset disassembly to handle code-versus-data ambiguity by translating every byte as both data and potential instruction starts, building a comprehensive control flow graph with runtime lookup tables to resolve indirect jumps, though this approach cannot handle adversarial code or runtime code generation due to fundamental theoretical limitations.
The discussion reveals a nuanced understanding of binary translation tradeoffs, with participants recognizing that while static translation offers determinism valuable for certification, it comes with substantial performance and size penalties compared to JIT approaches. The conversation highlights how different use cases, from hobbyist experimentation to safety-critical systems, demand different optimization priorities, with QEMU's broad architectural support contrasting against specialized translators that can exploit specific guest/host pair properties. Regulatory requirements emerge as a significant driver for static translation adoption, though participants note the AI industry's current focus on rapid innovation rather than attestation and reproducibility needs that dominate regulated environments.
从未大学毕业的 Eric Park 分享了他在美国毕业帽和礼服租赁体系的经历,指出租金高达 94 美元且必须归还。他还幽默地质疑典礼上把流苏从右侧移到左侧的传统,打趣称这是对左撇子的"歧视"。这一传统促使他制作了一个装置:当流苏被移动时,帽檐底部会亮起灯——毕竟根据租赁协议和 Purdue University 的规定,把帽子点着显然不被允许。 Eric Park, who had never graduated from college before, shares his experience with the US graduation cap and gown rental system, noting the high cost of $94 and the requirement to return them. He also humorously questions the tradition of moving the tassel from right to left during the ceremony, jokingly suggesting discrimination against left-handed people. This tassel-moving tradition inspired him to create a contraption that would light up the bottom of his cap when the tassel was moved, since setting the cap on fire was likely prohibited by the rental agreement and Purdue University regulations.
从未大学毕业的 Eric Park 分享了他在美国毕业帽和礼服租赁体系的经历,指出租金高达 94 美元且必须归还。他还幽默地质疑典礼上把流苏从右侧移到左侧的传统,打趣称这是对左撇子的"歧视"。这一传统促使他制作了一个装置:当流苏被移动时,帽檐底部会亮起灯——毕竟根据租赁协议和 Purdue University 的规定,把帽子点着显然不被允许。
该项目使用了 Digispark ATtiny85 微控制器、 48 颗 WS2812B LED 、从报废的苹果 USB-C 数据线回收的线材、用于检测流苏的簧片开关和磁铁、一个 USB-C Power Delivery 触发板以及一个移动电源。代码用 Rust 编写,耗时大约两小时,但由于 avr-hal 和 ws2812-avr 库默认不支持 ATtiny85,他不得不对它们进行 fork 和补丁处理。硬件组装花了三个多小时,Eric 指出动手总比别人说的要难。
尽管做成了这个装置,Eric 最终决定不在毕业典礼上佩戴它,因为他觉得看起来"相当俗气",像孩子眼中的游戏电脑,或是老一辈人认为会诱发癫痫的闪烁灯。他在视频中对快速闪烁灯做了警告,并提到与癫痫相关的一个错失的玩笑机会。项目完整源码可在他的 GitHub 仓库 github.com/ericswpark/gradcap-rs 查阅。
Eric Park, who had never graduated from college before, shares his experience with the US graduation cap and gown rental system, noting the high cost of $94 and the requirement to return them. He also humorously questions the tradition of moving the tassel from right to left during the ceremony, jokingly suggesting discrimination against left-handed people. This tassel-moving tradition inspired him to create a contraption that would light up the bottom of his cap when the tassel was moved, since setting the cap on fire was likely prohibited by the rental agreement and Purdue University regulations.
The project uses a Digispark ATtiny85 microcontroller, 48 WS2812B LEDs, wires salvaged from a dead Apple USB-C cable, a reed switch and magnet for tassel detection, a USB-C Power Delivery trigger board, and a power bank. The code was written in Rust, which took about 2 hours, though it required forking and patching the `avr-hal` and `ws2812-avr` libraries since they didn't support the ATtiny85 out of the box. The hardware assembly took over 3 hours, which Eric notes is always more challenging than people claim.
Despite building the device, Eric decided not to wear it to his actual graduation ceremony because he felt it looked "pretty tacky," comparing it to what kids might think of as a gaming PC or what older generations might consider seizure-inducing. He includes a video warning about rapid strobing lights, referencing a missed opportunity related to the seizure comment. The full source code for the project is available on his GitHub repository at github.com/ericswpark/gradcap-rs.
• 作者选择用 Rust 来做 LED 毕业帽项目,虽然比用 Arduino 库更费事,但主要动机是想写出一个吸引眼球的博客标题,评论者觉得这一点很有趣。
• 在美国,不同学校的毕业帽和学位礼服租赁政策各不相同:有的学校要求昂贵的租赁(约 94 美元),有的学校则提供更划算的购买选项,甚至免费提供礼服,反映出各高校做法不一致。
• 学术礼服的租赁模式是按受众定价的典型例子,像 Jostens 这样的公司通过与机构签订合同获利,因为做采购决定的管理层并不直接承担费用,这种情况类似教材定价或监狱电话的垄断。
• 有评论质疑租赁比购买更经济的说法,指出清洗、检修和重新分配二手礼服的成本可能高于直接制造新礼服;也有评论提到像 Aliexpress 上存在廉价替代品。
• 许多毕业生因为不想付租赁费而选择不去参加典礼,指出不参加典礼也能拿到学位证书,有人认为仪式更多是为学校和家庭而非真正为毕业生本人举办的。
• 讨论显示学术礼服的做法在国际上差异很大,英国大学也普遍租赁礼服,但经常参加典礼的学者通常会买自己的礼服,有时还会额外定制口袋等细节。
• 有人分享了毕业礼服的创意替代用途,包括用作万圣节服装、捐给今后的毕业生,甚至有人开玩笑建议把学位帽纳入葬礼安排。
• LED 毕业帽项目本身引发了关于不同微控制器平台适用场景的讨论,有人指出 ATtiny85 板在低成本、简单 GPIO 和 HID 项目中表现出色。
• 评论还谈到在毕业典礼上戴 LED 帽的社会接受度问题,许多学校有严格的装饰规定,突然亮起的灯光在正式典礼上可能会造成干扰或惊吓。
• 对话还涉及大家对高校从学生体验各环节(从礼服到项目关闭)中牟利的普遍不满,一位评论者提到他们的 CS 研究生项目在他毕业当年被关闭。
总体讨论反映出人们对学术里程碑商业化的不满,尤其对许多人认为给学生增加不必要经济负担的礼服租赁模式抱怨最多。尽管各机构做法差异很大,普遍共识倾向于认为这些费用具有剥削性,尤其是学校不提供购买选项时。 LED 毕业帽作为一个轻松的切入点,引发了关于机构定价、仪式传统价值以及在面对任意限制时人们如何创造性地解决问题的更深入讨论。
• The author chose to use Rust for an LED graduation cap project despite it being more difficult than using Arduino libraries, motivated primarily by wanting a catchy blog post title, which commenters found amusingly relatable.
• Graduation cap and gown rental practices vary significantly by institution in the US, with some schools requiring expensive rentals (around $94) while others offer affordable purchase options or even provide them for free, highlighting inconsistent approaches across universities.
• The rental model for academic regalia exemplifies captive audience pricing, where companies like Jostens exploit institutional contracts since administrators making purchasing decisions aren't the ones bearing the costs, similar to textbook and prison telephone monopolies.
• Some commenters question the economic logic of renting versus buying, noting that the logistics of cleaning, inspecting, and redistributing used gowns might actually cost more than manufacturing new ones, while others point out that cheap alternatives exist on platforms like Aliexpress.
• Many graduates choose not to participate in ceremonies altogether to avoid rental fees, noting that diplomas are awarded regardless of ceremony attendance, and some view the ritual as being more for the institution and families than for the graduates themselves.
• The discussion reveals that academic regalia practices differ internationally, with UK universities also commonly renting gowns, though academics who attend multiple ceremonies often purchase their own and sometimes customize them with extra pockets.
• Several commenters share creative alternative uses for graduation regalia, including Halloween costumes, donations to future graduates, or even the humorous suggestion of incorporating the cap into funeral arrangements.
• The LED graduation cap project itself sparked discussion about appropriate use cases for different microcontroller platforms, with some noting that ATtiny85 boards are excellent for simple GPIO and HID projects at low cost.
• Commenters debated the social acceptability of wearing an LED-equipped cap at graduation, with some noting that many schools have strict decoration policies and that sudden light activation could be disruptive or startling in a formal ceremony.
• The conversation touches on broader frustrations with how universities monetize every aspect of the student experience, from regalia to program closures, with one commenter noting their CS graduate program was shuttered the year they graduated.
The discussion reveals widespread frustration with the commercialization of academic milestones, particularly the rental model for graduation regalia that many see as an unnecessary financial burden on students. While practices vary significantly between institutions, the consensus leans toward viewing these costs as exploitative, especially when schools don't offer purchase alternatives. The LED graduation cap project served as a lighthearted entry point into deeper conversations about institutional pricing, the value of ceremonial traditions, and the creative problem-solving that emerges when people refuse to accept arbitrary constraints.
Cloudflare 的开源 QUIC 实现 quiche 默认使用 CUBIC 拥塞控制算法来管理 TCP 和 QUIC 连接的带宽。近期工程师发现了一个 bug:在发生拥塞崩溃后,CUBIC 的拥塞窗口(cwnd)会永久卡在最小值,即使网络条件恢复也无法增长。这个问题在大量丢包的集成测试中暴露出来,约 60% 的测试未能在预期时间内完成。 Cloudflare's open-source QUIC implementation, quiche, uses the CUBIC congestion control algorithm as its default, which governs how TCP and QUIC connections manage bandwidth. Recently, engineers discovered a bug where CUBIC's congestion window (cwnd) would get permanently stuck at its minimum size after a congestion collapse, preventing recovery even when network conditions improved. This issue surfaced during integration tests involving heavy packet loss, where about 60% of tests failed to complete within the expected timeframe.
Cloudflare 的开源 QUIC 实现 quiche 默认使用 CUBIC 拥塞控制算法来管理 TCP 和 QUIC 连接的带宽。近期工程师发现了一个 bug:在发生拥塞崩溃后,CUBIC 的拥塞窗口(cwnd)会永久卡在最小值,即使网络条件恢复也无法增长。这个问题在大量丢包的集成测试中暴露出来,约 60% 的测试未能在预期时间内完成。
问题追溯到 2017 年 Linux 内核为防止空闲期后 cwnd 膨胀而做的一项优化。将该修复移植到 quiche 时引入了一个细微错误:实现用最后发送数据包的时间来度量空闲时长,而不是用最后收到 ACK 的时间。在最小 cwnd(仅两个数据包)情况下,这会让算法在每个往返时间都错误地判断为空闲,从而不断把恢复开始时间往前推移。结果形成了一个自我延续的循环:拥塞窗口被钉在最小值,在恢复和拥塞避免之间来回振荡,却始终无法增长。
修复只需一个关键的小改动:把空闲时长的起点改为 bytes_in_flight 实际降为零时的时刻(用最后 ACK 时间近似),而不是最后发送时间。这样避免了导致恢复边界不断追赶发送时间的 delta 值膨胀。仅三行代码的改动就使拥塞窗口在丢包后能按预期的 CUBIC 曲线正常增长,性能恢复如常。该方案既保留了原始优化对真正空闲连接的好处,又消除了最小 cwnd 处的"死亡螺旋"。
这一案例说明,"空闲"的定义比表面看起来更复杂,尤其在窗口很小时,管道延迟可能被误判为空闲。该 bug 在正常运行时不可见,仅在严重拥塞后显现。尽管工程师们使用 qlog 和可视化工具进行了数周调查,最终的修复却非常简单,证明有时最难捉的 bug 也有优雅的解决方案。该修复已提交到 cloudflare/quiche 仓库,提升了使用 CUBIC 拥塞控制的 QUIC 连接的可靠性。
Cloudflare's open-source QUIC implementation, quiche, uses the CUBIC congestion control algorithm as its default, which governs how TCP and QUIC connections manage bandwidth. Recently, engineers discovered a bug where CUBIC's congestion window (cwnd) would get permanently stuck at its minimum size after a congestion collapse, preventing recovery even when network conditions improved. This issue surfaced during integration tests involving heavy packet loss, where about 60% of tests failed to complete within the expected timeframe.
The problem was traced to a Linux kernel optimization from 2017 designed to prevent cwnd inflation after idle periods. When this fix was ported to quiche, it introduced a subtle bug. The implementation incorrectly measured idle time by using the last packet sent time rather than the last ACK received time. At minimum cwnd (just two packets), this caused the algorithm to falsely detect an idle period every round trip, pushing the recovery start time forward repeatedly. This created a self-perpetuating cycle where the congestion window remained pinned at its minimum, oscillating between recovery and congestion avoidance states without ever growing.
The fix involved a small but crucial change: measuring idle duration from when bytes_in_flight actually transitioned to zero (approximated by the last ACK time) instead of the last send time. This prevented the inflated delta calculation that was causing the recovery boundary to chase the send time. With this three-line change, the congestion window could properly grow along the expected CUBIC curve after loss events, restoring normal performance. The solution preserved the original optimization's benefits for genuinely idle connections while eliminating the death spiral at minimum cwnd.
This case highlights how defining "idle" is more complex than it appears, especially at small window sizes where pipeline delays can mimic idleness. The bug was invisible during normal operation and only manifested after severe congestion events. Despite weeks of investigation using qlog instrumentation and visualization, the final fix was remarkably simple, demonstrating that sometimes the most elusive bugs have elegant solutions. The fix has been contributed to the cloudflare/quiche repository, improving reliability for QUIC connections using CUBIC congestion control.
文章写作风格有明显的 AI 辅助痕迹——随机加粗的词、不自然的铺垫,以及在裁员 20% 后只发布一个工程实习生的招聘广告,这些都让人怀疑其判断力,甚至让人怀疑公关团队是否也受影响。
Cloudflare 用 Rust 在用户空间重写 QUIC 的决定是合理的,但在维护自有实现时必须保持警惕,避免错过内核中关键错误修复,因为这些用户态实现通常比内核代码接受的审查要少得多。
CUBIC 算法中,静默期后拥塞窗口突然跳跃的 bug 最早于 2015 年在 Google 的 QUIC 库中被发现,随后报告给了 TCP 内核团队。这说明拥塞控制算法容易出现微妙的逻辑错误,并可能产生严重的现实后果。
采用经过实战检验的拥塞控制实现很有价值:这些实现已经在各种真实互联网流量中经受过考验,能够发现内部实现可能忽略的故障模式。
文章没有明确定义"CCA"(拥塞控制算法),即便有专门章节解释,这对不熟悉该术语的读者来说是重大疏忽。
在大带宽的数据中心环境下,CUBIC 的恢复速度很慢:丢包后需要接近两秒才能达到带宽 - 延迟积,并且在接近上限时会反复自伤;相比之下,BBR 采用基于模型的方法,保留了余量,能够在不对丢包过度反应的情况下实现更高吞吐量。
文章的结构和小标题给人强烈的 AI 生成感,后半部分尤为明显,写作更注重营造感受而非有意义地组织内容,这不同于更自然的技术文章。
尽管由于 LLM 处理导致文章质量下降、出现不必要的"手把手"指导,底层工程工作仍然扎实:设计良好的测试在图表异常时揭示了 CUBIC 的 bug,体现了真正的工程严谨性。
文章标题本可以更准确地反映问题根源——复制 Linux 内核代码却未完全理解、错过后续修复,并且缺乏防止此类问题的建议;鉴于该 bug 本可预防,这是一个可惜的遗漏。
多年来 Cloudflare 博客文章的质量明显变化,最近的帖子更显怪异而非彰显工程卓越,引发了对其招聘实践或工程文化变化的质疑。
总体讨论暴露出人们对文章真实性和质量的怀疑,许多评论者识别出 AI 辅助写作的模式和糟糕的编辑决策。虽然 CUBIC bug 的技术内容得到了肯定,但因呈现缺乏清晰性和自然结构而遭到批评。大家对 Cloudflare 近期的博客和工程文化表示担忧,但普遍认为底层技术工作仍然扎实;讨论还强调了采用经充分测试的拥塞控制实现以及通过严格测试发现微妙算法缺陷的重要性。
• The article's writing style feels AI-assisted, with random bold words and an unnatural buildup, and the inclusion of a recruitment plug just days after laying off 20% of the company, with only one engineering intern role currently open, raises questions about judgment and whether the PR team was also affected.
• Cloudflare's decision to rewrite QUIC in Rust for userspace makes sense, but maintaining an in-house implementation requires vigilance to avoid missing critical bug fixes from the kernel, as these implementations typically receive less scrutiny than kernel code.
• The specific CUBIC bug involving a sudden congestion window jump after quiescence was originally discovered in Google's QUIC library in 2015 and later reported to the TCP kernel team, highlighting how congestion control algorithms are prone to subtle logic bugs with dramatic real-world consequences.
• Using battle-tested implementations of congestion control algorithms is valuable because they've been tested across diverse real-world Internet traffic, catching failure modes that in-house code might miss.
• The article fails to define "CCA" (Congestion Control Algorithm) despite having a dedicated section explaining it, which is a significant oversight for readers unfamiliar with the term.
• CUBIC's recovery in datacenters with large pipes is slow, taking nearly two seconds to reach bandwidth-delay product after loss, and it repeatedly shoots itself in the foot upon hitting the ceiling, whereas BBR uses a model-based approach with headroom to achieve higher throughput without reacting as aggressively to loss.
• The article's structure and subtitles feel very AI-generated, with the second half being particularly obvious, and the writing is engineered to make you feel rather than to structure content meaningfully, unlike more natural technical writeups.
• Despite the LLM pass making the article worse with unnecessary hand-holding, the underlying engineering work is solid, with a well-designed test that revealed the CUBIC bug when the graph didn't match expectations, demonstrating genuine engineering rigor.
• The article's title could more accurately reflect that the issue stemmed from copying Linux kernel code without fully understanding it and missing subsequent fixes, and it lacks takeaways on preventing such issues, which is a missed opportunity given the preventable nature of the bug.
• There's a noticeable shift in Cloudflare's blog post quality over the years, with recent posts exposing weirdness rather than highlighting engineering excellence, raising questions about changes in hiring practices or engineering culture.
The discussion reveals skepticism about the article's authenticity and quality, with multiple commenters identifying AI-assisted writing patterns and poor editorial decisions. The technical content about the CUBIC bug is appreciated, but the presentation is criticized for lacking clarity and natural structure. There's concern about Cloudflare's recent blog posts and engineering culture, with the consensus suggesting a decline in quality despite the underlying technical work being sound. The conversation also highlights the importance of using well-tested congestion control implementations and the value of rigorous testing to uncover subtle algorithm bugs.
Kraftwerk 于 1976 年发行的单曲 "Radioactivity",出自他们的专辑《 Radio-Activity 》。五十年来,这首歌从一首开创性的电子曲目演变为一首有力的反核抗议颂歌。它以脉冲般的盖革计数器声、层层推进的合成器音色和令人难忘的口语化副歌为特征,最初颂扬科学创新,随后转向对核能的批判。这一变化体现了 Kraftwerk 将作品与当下议题相结合的能力,使 "Radioactivity" 成为一首与全球关于核能与环境安全关切持续共鸣的经典之作。 Kraftwerk's 1976 single "Radioactivity," from their album Radio-Activity, has evolved from a groundbreaking electronic track into a powerful anti-nuclear protest anthem over its 50-year history. The song, characterized by its pulsing Geiger counter sounds, escalating synths, and haunting spoken-word refrain, initially celebrated scientific innovation but later transformed into a critique of nuclear power. This shift reflects Kraftwerk's ability to adapt their music to contemporary issues, making "Radioactivity" a timeless piece that resonates with ongoing global concerns about nuclear energy and environmental safety.
Kraftwerk 于 1976 年发行的单曲 "Radioactivity",出自他们的专辑《 Radio-Activity 》。五十年来,这首歌从一首开创性的电子曲目演变为一首有力的反核抗议颂歌。它以脉冲般的盖革计数器声、层层推进的合成器音色和令人难忘的口语化副歌为特征,最初颂扬科学创新,随后转向对核能的批判。这一变化体现了 Kraftwerk 将作品与当下议题相结合的能力,使 "Radioactivity" 成为一首与全球关于核能与环境安全关切持续共鸣的经典之作。
1975 年发行的原版《 Radio-Activity 》专辑是电子音乐史上的重要里程碑,把实验性流行乐与冷战时期的忧虑融合在一起。 Kraftwerk 的经典阵容——Ralf Hütter 、 Florian Schneider 、 Karl Bartos 和 Wolfgang Flür——利用 Minimoog 合成器、 Vako Orchestron 等前沿设备,创造出既富未来感又带有不安氛围的声音。专辑以恐怖与美感交织的方式探讨放射性与信息时代的渗透问题,为这首歌后来被赋予政治意味奠定了基础。
到了 1990 年代,Kraftwerk 将 "Radioactivity" 重新塑造为一首明确的反核颂歌,最显著的是他们 1991 年的混音专辑 The Mix 。在这个版本中,原本颂扬性的基调被声码器主导的核灾难点名所取代,歌词点出了 Chernobyl 、 Harrisburg 、 Sellafield 和 Hiroshima 等事件。更新后的内容强调了核能的危险,把这首歌变成了抗议曲目,Kraftwerk 也在如 1992 年由 Greenpeace 组织的 Stop Sellafield 音乐会上演出过这一版本。尽管乐队通常保持神秘的公共形象,这一转变仍凸显了他们对当代政治议题的回应与参与。
此后数十年里,随着诸如 2011 年 Fukushima 事故等事件的发生,这首歌的相关性愈加凸显。 2012 年,Kraftwerk 在东京的 No Nukes 音乐会上演唱 "Radioactivity",并将歌词扩展到包括 Fukushima,显示出这首歌对新危机的适应性。这种持续的演变证明了它既是音乐作品又是政治宣言的持久力量,能够与全球关注核安全和环境恶化的听众产生共鸣。
Kraftwerk 的影响远超 "Radioactivity" 本身,他们的作品启发了从嘻哈到 techno 等各类艺术家。乐队在电子声音运用和概念化创作上的创新使他们成为领域先驱。正如 The Human League 与 Heaven 17 的 Martyn Ware 所言:"我们那个时期的许多艺术家,如果不是因为 Kraftwerk,就不会以现在的方式存在。"当代音乐人不断从他们的蓝图中汲取灵感,确保了 Kraftwerk 在数字时代依然具有重要影响力。
如今,"Radioactivity" 依然被各种风格的艺术家翻唱与再造,从 Fatboy Slim 的放克版本到 Haruomi Hosono 的乡村民谣式演绎不一而足。它在电影和电视剧原声中的出现也进一步巩固了其文化地位。正如 Nabihah Iqbal 所观察:"令人惊叹的是,即使现在,你也能听出这些作品如何渗透到如此多样的音乐类型中。"对新一代而言,Kraftwerk 的音乐不仅是怀旧的遗产,更是塑造现代电子音乐的重要活力。
当世界在核能与环境问题上徘徊不定时,"Radioactivity" 既是对过去的深刻提醒,也是对未来的行动召唤。它从科学颂歌到抗议颂歌的转变,展示了 Kraftwerk 愿景的持久相关性。正如 Yin Yin 的 Kees Berkers 所说:"真的难以置信,Radioactivity 是 50 年前发布的。那些高莫尔斯电码脉冲、半速电鼓和史诗般的合成贝斯,完全可以成为一首新的 vaporwave 曲目。"这种超越时代的特质注定使 Kraftwerk 的激进作品在未来多年继续激发思考与争论。
Kraftwerk's 1976 single "Radioactivity," from their album Radio-Activity, has evolved from a groundbreaking electronic track into a powerful anti-nuclear protest anthem over its 50-year history. The song, characterized by its pulsing Geiger counter sounds, escalating synths, and haunting spoken-word refrain, initially celebrated scientific innovation but later transformed into a critique of nuclear power. This shift reflects Kraftwerk's ability to adapt their music to contemporary issues, making "Radioactivity" a timeless piece that resonates with ongoing global concerns about nuclear energy and environmental safety.
The original Radio-Activity album, released in 1975, marked a significant moment in electronic music, blending experimental pop with Cold War-era anxieties. Kraftwerk's classic lineup—Ralf Hütter, Florian Schneider, Karl Bartos, and Wolfgang Flür—crafted a sound that was both futuristic and eerie, using innovative technology like the Minimoog synthesizer and Vako Orchestron. The album's themes of radioactivity and information age infiltration were presented with a mix of horror and beauty, setting the stage for the song's later political reinterpretation.
By the 1990s, Kraftwerk reimagined "Radioactivity" as an explicit anti-nuclear anthem, notably on their 1991 remix album The Mix. This version replaced the original's celebratory tone with a vocoder-led roll call of nuclear disasters, including Chernobyl, Harrisburg, Sellafield, and Hiroshima. The updated lyrics emphasized the dangers of nuclear power, turning the track into a protest song that Kraftwerk performed at events like the 1992 Stop Sellafield concert organized by Greenpeace. This transformation highlighted the band's engagement with contemporary political issues, despite their typically enigmatic public persona.
The song's relevance has only grown in the decades since, particularly in light of events like the 2011 Fukushima disaster. In 2012, Kraftwerk performed "Radioactivity" at the No Nukes concert in Tokyo, with lyrics expanded to include Fukushima, demonstrating the track's adaptability to new crises. This ongoing evolution underscores the song's enduring power as both a musical and political statement, resonating with audiences worldwide who are concerned about nuclear safety and environmental degradation.
Kraftwerk's influence extends far beyond "Radioactivity," as their work has inspired countless artists across genres, from hip-hop to techno. The band's innovative use of electronic sounds and conceptual approach to music has made them pioneers in the field. As Martyn Ware of The Human League and Heaven 17 notes, "Many of the artists from my period wouldn't have existed in the way that we do now, if it weren't for Kraftwerk." Their impact is evident in the way contemporary musicians continue to draw from their blueprint, ensuring that Kraftwerk's legacy remains vital in the digital age.
Today, "Radioactivity" continues to be covered and reinterpreted by artists in various styles, from Fatboy Slim's funk version to Haruomi Hosono's country-folk take. Its presence in film and television soundtracks further cements its cultural significance. As Nabihah Iqbal observes, "The amazing thing is that even now, you can hear how that work has gone on to permeate so many different types of music." For new generations, Kraftwerk's music is not just a nostalgic relic but a living influence that shapes the sound of modern electronic music.
As the world grapples with uncertainty over nuclear power and environmental issues, "Radioactivity" remains a poignant reminder of the past and a call to action for the future. Its ability to morph from a scientific hymn to a protest anthem demonstrates the enduring relevance of Kraftwerk's vision. As Kees Berkers of Yin Yin remarks, "It's really unbelievable that Radioactivity was released 50 years ago. With those high morse code pulses, half-tempo electro drums and epic synth bass, it could be a new vaporwave track." This timelessness ensures that Kraftwerk's radical track will continue to inspire and provoke thought for years to come.
Kraftwerk 的《 Radio-Activity 》最初灵感来自对 Billboard "Radio Action"榜单的误读,乐队最初是在颂扬广播作为一种民主媒介,反核主题后来才浮现,并延续到了福岛时代。
欧洲核电的衰落主要出于经济原因:太阳能和风能大规模发电后使电价在白昼时段经常出现负值;与对灵活储能和输电的投资相比,缺乏灵活性的基荷核电站失去了经济可行性。
尽管白昼电价很低,欧洲建筑中仍普遍缺少空调,原因包括以固定收入为主的老年人口难以负担前期投入、温带气候下的历史文化习惯,以及法规更重视节能而非舒适度。
核电未能扩张也与机构对其前景的一贯高估有关;类似太阳能的采用趋势曾被反复低估。此外,欧洲廉价天然气的可得性,比单纯的反核情绪更为重要。
瑞典的核电退出现象更多被看作政治驱动而非经济驱动,生产和容量税令许多核电站难以为继,直到政治立场转变才有所缓解;尽管如此,安全运行的核电站不应仅因经济原因被关闭。
德国的反核浪潮被描述为一种草根运动,根植于 1970s 的环保主义传统以及 Asse II 核废料储存丑闻,而不是像有人所说由像 Schröder 这种从俄罗斯天然气中获益的政客一手制造的。
切尔诺贝利对欧洲公众情绪影响深远,长期的健康后果包括癌症发病率上升、儿童甲状腺肿瘤增加,以及数十年来对野猪和蘑菇等食品的监管限制。
亲核者常因将合理的恐惧视为非理性而受到批评,而反核情绪往往源于真实的灾难经历以及对行业和监管机构责任能力的合理不信任。
核废料处置仍是一个关键且未解决的问题,英国现有废料管理被估算需花费约 1360 亿英镑。相比之下,可再生能源的副产品,如太阳能电池板中的镉虽无放射性衰变途径,但被认为危害较小。
德国退出核电后延长了对褐煤电厂的依赖,而褐煤产生的放射性排放和有毒废料在某些方面超过了核电,同时并未充分扩展可替代稳定核电供应的可再生基荷能力。
讨论揭示出两种根本不同的视角:一方面是从经济和技术角度看待核电,强调可再生能源的当前经济优势和核电相对于化石燃料的安全记录;另一方面是强调历史事故的实际后果、废料管理的挑战以及公众对机构长期承诺与监管能力的合理怀疑。围绕 Kraftwerk 那首不断演变的歌曲的讨论,也折射出核情绪如何从最初的庆祝转向抗议,反映了更广泛的社会焦虑。最终,参与者难以将核电的理论利益与常见的成本超支、需在地质时间尺度上管理的废料,以及灾难性风险所带来的心理负担调和起来,即便这些风险在统计上十分罕见。
• Kraftwerk's "Radio-Activity" was originally inspired by a misreading of Billboard's "Radio Action" chart, celebrating radio broadcasting as a democratic medium, with the anti-nuclear message emerging only later and being updated through the Fukushima era.
• Nuclear power's decline in Europe is attributed to economic forces, with solar and wind generating cheap electricity abundantly, making midday prices frequently negative and rendering inflexible baseload nuclear plants economically unviable compared to flexible storage and transmission investments.
• Air conditioning remains scarce in European buildings despite cheap midday electricity, due to high upfront costs for fixed-income elderly populations, cultural traditions in historically temperate climates, and regulations prioritizing power conservation over comfort.
• Nuclear power's failure to grow is linked to consistent overestimation of its prospects by agencies, similar to how solar adoption was repeatedly underestimated, with cheap gas availability in Europe being a more significant factor than anti-nuclear sentiment.
• Sweden's nuclear phase-out is viewed as politically driven rather than economically motivated, with production and capacity taxes making operations uneconomic until political positions shifted, though operating plants shouldn't be shut down purely for economic reasons when they remain safe.
• Anti-nuclear sentiment in Germany is described as grassroots and rooted in 1970s environmentalism and waste storage scandals like Asse II, rather than being solely manufactured by politicians like Schröder who enriched themselves on Russian gas.
• Chernobyl's impact on European nuclear sentiment was profound, with lasting health effects including increased cancer rates, thyroid tumors in children, and ongoing restrictions on food like wild boar and mushrooms in affected regions decades later.
• Pro-nuclear advocates are criticized for dismissing understandable fears as irrational, when anti-nuclear sentiment often stems from tangible experiences with disasters and legitimate distrust of industry and regulatory responsibility.
• Nuclear waste storage remains a critical unresolved issue, with the UK facing £136bn costs for existing waste management, while renewable energy byproducts like cadmium in solar panels lack radioactive decay pathways but are perceived as less threatening.
• Germany's nuclear phase-out led to extended reliance on brown coal plants, which produce more radioactive emissions and toxic waste than nuclear power, while failing to adequately expand renewable baseload capacity to replace steady nuclear supply.
The discussion reveals a deep divide between those viewing nuclear power through an economic and technological lens versus those emphasizing historical accidents, waste management challenges, and legitimate public distrust. Pro-nuclear voices highlight renewables' current economic advantages and nuclear's safety record compared to fossil fuels, while anti-nuclear perspectives stress the tangible consequences of disasters, unresolved waste storage, and the gap between institutional promises and long-term stewardship capabilities. The conversation around Kraftwerk's evolving song serves as a microcosm of how nuclear sentiment shifted from celebration to protest, reflecting broader societal anxieties. Ultimately, participants struggle to reconcile nuclear's theoretical benefits with practical realities of cost overruns, waste management across geological timescales, and the psychological weight of catastrophic risk, even when statistically rare.
222 comments • Comments Link
• localitymanagement.us 上的一个新的在线注册系统取代了原先基于电子邮件的流程,用于注册 locality 域名(如 city.state.us),这可能会让获取这些域名变得更容易。
• locality 域名生态系统非常脆弱,许多域名由个人或小型运营者维护,他们可能去世或停止运营;除非市政府提供公证信以转移控制权,否则存在域名丢失的风险。
• .us 域名通常不允许 WHOIS 隐私保护,会暴露注册人的个人信息,但 locality 子域在 WHOIS 中可能只显示注册商信息,因而存在例外情况。
• Optery 和 Incogni 等服务可以帮助将个人数据从公共数据库中删除;尽管 .us 缺乏 WHOIS 隐私保护,这类服务仍能在一定程度上提供隐私保障。
• 学区域名(例如 k12.oh.us)在逻辑上合理,但因结构复杂而不受欢迎,许多学区更倾向于使用 .com 或 .org,以获得更好的可用性和品牌效果。
• locality 域名在可用性方面面临挑战,非技术用户往往难以处理多部分的域名结构,通常更喜欢更短、更易记的替代方案。
• 仍有一些 locality 域名在使用中,例如 mission.sf.ca.us 重定向到 Noisebridge,表明这些域名对某些社区仍有持久价值。
• locality 域名的委托体系可能不一致,一些子域因为记录过时或随时间变化而不再正确解析。
• 美国地理上的特殊情况(例如 Virginia 的独立城市或跨县重复的城市名称)使 locality 域名的结构和命名规则变得复杂。
• 这篇文章重新激发了人们对 locality 域名的兴趣,但其实际使用仍受官僚障碍和更熟悉的顶级域(如 .com 和 .org)主导地位的制约。
讨论综合了对 .us TLD 中 locality 域名的怀旧情绪、技术见解和现实担忧。尽管这些域名提供了一种结构化且具有地理意义的命名系统,但采纳受制于官僚复杂性、可用性问题以及缺乏 WHOIS 隐私保护。许多参与者分享了管理或丢失 locality 域名的亲身经历,凸显出通常由个人或小运营者维护的系统的脆弱性。对话还涉及数字隐私、公共服务中品牌的重要性以及美国行政地理的种种怪异之处。尽管 locality 域名的流行度下降,但对于重视本地身份和互联网历史基础设施的人们来说,它们仍保持着小众吸引力。 • A new online registration system at localitymanagement.us has replaced the old email-based process for registering locality domains (like city.state.us), potentially making it easier to obtain these domains.
• The locality domain ecosystem is fragile, with some domains managed by individuals or small operators who may pass away or shut down, risking domain loss unless cities provide notarized letters to transfer control.
• .us domains generally do not allow WHOIS privacy, exposing registrants' personal information, though locality subdomains may be an exception since WHOIS only shows registrar details.
• Services like Optery and Incogni can help remove personal data from public databases, offering some privacy protection despite the lack of WHOIS privacy for .us domains.
• School district domains (e.g., k12.oh.us) were logical but unpopular due to complexity, leading many districts to switch to simpler .com or .org domains for better usability and branding.
• Locality domains face usability challenges, as non-technical users struggle with multi-part domain structures, often preferring shorter, more memorable alternatives.
• Some locality domains are still active and in use, such as mission.sf.ca.us redirecting to Noisebridge, showing enduring value for certain communities.
• The delegation system for locality domains can be inconsistent, with some subdomains no longer resolving accurately due to outdated records or changes over time.
• Edge cases in U.S. geography, like independent cities in Virginia or duplicate city names across counties, complicate the locality domain structure and naming conventions.
• The article has sparked renewed interest in locality domains, though their practical use remains limited by bureaucratic hurdles and the dominance of more familiar TLDs like .com or .org.
The discussion reveals a mix of nostalgia, technical insight, and practical concerns around locality domains in the .us TLD. While these domains offer a structured, geographically meaningful naming system, their adoption has been hampered by bureaucratic complexity, usability issues, and the lack of WHOIS privacy. Many participants shared personal experiences managing or losing locality domains, highlighting the fragility of a system often maintained by individuals or small operators. The conversation also touched on broader themes like digital privacy, the importance of branding in public services, and the quirks of U.S. administrative geography. Despite their decline in popularity, locality domains retain a niche appeal for those valuing local identity and historical internet infrastructure.