Hackernews Daily

The Podcast Collective

Steam and Itch.io face backlash over adult game bans driven by payment processors' censorship pressure 💳

7/26/2025

Steam and Itch.io Adult Game Removals Driven by Payment Processor Pressure

  • Conservative group Collective Shout pressured Mastercard and Visa to threaten cutting services to platforms hosting adult-themed games involving sensitive topics like incest, abuse, and rape.
  • Payment processors leverage financial control to enforce content removals, effectively acting as censors by proxy, impacting even non-explicit, award-winning, and queer-focused games.
  • Developers like Robert Yang report abrupt, non-transparent takedowns without notification.
  • The ethical debate centers on corporate gatekeeping, activist censorship, and free speech tensions in digital marketplaces.
  • Calls for clearer policies and consideration of marginalized voices clash with activist aims to limit harmful sexualization.

Tea App Data Breach Exposes Sensitive User IDs on Public Firebase

  • Women’s safety dating app Tea inadvertently exposed users' government IDs, selfies, and some direct messages via an unauthenticated Firebase database accessible publicly for up to two years.
  • The breach, shared on 4chan, highlights severe security oversights despite the app’s privacy-focused mission.
  • Criticism targets app developers’ negligence in protecting sensitive identity data and the risks of demanding government IDs without robust safeguards.
  • Raises broader concerns on cloud storage misconfigurations, authentication failures, and potential identity theft risks.

Do Not Download the App, Use the Website — Native Apps vs. Web Privacy

  • Native apps collect extensive personal data (contacts, precise location, microphone access, installed apps) through deep system integration, exceeding browser capabilities by design.
  • Websites offer substantial functional parity (streaming, graphics, multimedia) while preserving greater user control and privacy via explicit permission prompts.
  • Companies aggressively push app downloads primarily to access richer user data, often using dark patterns that compromise user autonomy.
  • Advocates suggest favoring well-built web apps to minimize intrusive data collection and maintain digital sovereignty.

Startup Equity Is Overpromised; Employees Rarely Cash Out Significantly

  • Equity in startups often serves as speculative “lottery tickets,” with employees receiving little real financial return after acquisition payouts primarily satisfy investors and executives first.
  • Transparency around valuations, liquidation preferences, and dilution is frequently lacking, leaving employees blindsided by devalued or worthless shares.
  • Experienced voices advise prioritizing higher salaries over equity and treating stock options as highly uncertain bonuses rather than guaranteed wealth.
  • Commentary underscores the disconnect between founders/investors and rank-and-file employees, urging aggressive negotiation and caution.

The Future Is NOT Self-Hosted — Toward Community-Hosted Digital Infrastructure

  • Digital ownership is mostly illusory; platform restrictions (e.g., Kindle backups) demonstrate how users effectively rent access under corporate control.
  • A personal self-hosted cloud setup can reclaim privacy and control but remains technically complex, isolated, and inefficient, likened to suburban siloing.
  • The article advocates for decentralized, publicly funded, community-hosted infrastructure combining privacy, interoperability, and utility-like access.
  • Emphasizes collective digital freedom over individualism, proposing cooperative models as the path beyond vendor lock-in and techno-feudalism in cloud computing.

Steam, Itch.io are pulling ‘porn’ games. Critics say it's a slippery slope

The removal and deindexing of adult-themed games by major digital storefronts, notably Steam and Itch.io, is driven by financial pressure from payment processors such as Mastercard and Visa. These actions follow lobbying by advocacy groups who cite concerns about potentially harmful sexual content, leading payment companies to threaten discontinuation of services to platforms hosting such material. The resulting platform response has been swift and expansive, with numerous “NSFW” classified games—including those with LGBTQ+ themes or narratives around mental health and abuse—vanishing without warning or due process.

This broad and opaque enforcement has drawn sharp criticism from developers and digital rights advocates, who argue the mechanisms extend far beyond legitimate moderation. Many affected games were neither pornographic nor exploitative, but fell within general adult or sensitive story spaces. Indie developers, particularly those from marginalized communities, report feeling targeted and defenseless as third-party financial entities set the boundaries for artistic expression, often in the absence of clear platform policies or notifications.

The Hacker News community has been particularly vocal, emphasizing the power imbalance created when payment processors dictate content boundaries, effectively deputizing private corporations as de facto censors. Commenters underscore the chilling effect on creative communities—especially among LGBTQ+ developers—and challenge whether financial entities should have this level of cultural influence. There is a consensus demand for transparent, principle-driven content moderation, and considerable debate over possible ways creators and platforms can resist indirect censorship while maintaining commercial viability.

Women dating safety app 'Tea' breached, users' IDs posted to 4chan

The breach of Tea, a women-centered dating safety app, resulted in the public exposure of user government IDs and selfies, with the records discovered on an openly accessible Firebase database and circulated via 4chan. The compromised data included not only identity verification materials but also messages, affecting app users dating back two years. This incident is particularly notable due to Tea’s positioning as a safety-focused platform reliant on strict identity verification for its 1.6 million users, making the mishandling of this highly sensitive data especially damaging.

Additional reports confirm that inadequately secured cloud storage—specifically a Firebase bucket lacking authentication—was the root cause of the breach. The app’s design required women to upload facial scans and government IDs to participate, a high-risk workflow that backfired in the absence of basic security measures. Tea acknowledged both the scope of exposed information and that some of it was legacy data, but could not immediately confirm all impacted accounts or the downstream risks, such as identity theft or targeted harassment.

Hacker News commentary largely echoed the criticism of the app’s security model and the notion of “vibe coding,” with participants attributing failures to a lack of technical leadership and prioritization of user trust over robust safeguards. The event triggered debate about the ethics and practicality of demanding high-assurance IDs from users without adequate protection, and many called for stronger regulation and legal accountability. Some users further highlighted the irony and risk amplification when safety apps themselves become sources of harm, while others shared practical advice on exercising caution with sensitive data on nascent platforms.

Do not download the app, use the website

The central argument of the article is a critique of the strong push from companies to download native mobile apps instead of using browser-based websites. The author emphasizes that, while mobile apps promise convenience, they primarily benefit companies through the extensive personal data they can access via app permissions—far beyond what is possible with browser-based services. Modern web browsers are already capable of supporting advanced features such as video streaming, graphics rendering, and device hardware access in a controlled manner, eliminating the necessity for many standalone apps.

The article notes that native apps routinely request permissions for contacts, exact location, microphone access, and sometimes even a comprehensive list of installed apps, which greatly increases user exposure to privacy risks. Websites, in contrast, are limited by browser sandboxes and typically require explicit user consent for each sensitive action, enhancing control and minimizing background data collection. The irreversible nature of data leaks is highlighted—a regulatory framework can’t always reclaim lost privacy. The author underscores that the marginal gains in usability offered by most apps rarely justify the cost of diminished privacy and control over personal information.

Hacker News commenters broadly echo the article’s caution, underscoring the privacy threat posed by aggressive app permission models and the prevalence of “dark patterns” to coerce downloads. The community draws technical comparisons between the evolving capabilities of browsers and native apps, often asserting that most app functionality is replicable via modern web technologies. Humor and skepticism intermingle in the discussion, with remarks likening apps to “digital stalkers” and suggestions that apps will soon demand DNA samples—reflecting a mix of amusement and concern. There is also practical guidance on routinely reviewing and restricting app permissions, alongside references to progressive web app alternatives and experiences resisting unnecessary downloads.

Windsurf employee #2: I was given a payout of only 1% what my shares where worth

The central focus is the precariousness of employee equity in startups, especially as illustrated by an employee who received only 1% of their shares' estimated value during an acquisition. The account highlights a consistent reality in tech startups, where equity is often dangled as a primary incentive but proves unreliable during company exits or acquihires. While founders and investors benefit from liquidation preferences and priority payout structures, rank-and-file employees frequently find their expected windfalls whittled down to negligible sums due to opaque terms and anti-dilution clauses.

A significant secondary insight is the lack of transparency and power imbalance inherent in equity arrangements. Employees are seldom informed about crucial details such as 409A valuations, liquidation preferences, or convertible note structures, leaving them vulnerable to unexpected dilution and unfavorable buyout structures. Many employees recount similar experiences—years of service rewarded with unenforceable promises, while post-acquisition bonuses seem designed only to prevent mass departures. Executive and investor payouts stand in sharp contrast to the disappointing returns for the broader workforce, evidencing a systemic gap in how equity compensation is communicated and shared.

The Hacker News community reacts with a blend of pragmatism, cynicism, and humor. The prevailing sentiment is that "salary is money in the bank; equity is a lottery ticket," with numerous voices urging fellow engineers to negotiate hard for base pay and approach equity as a speculative bonus at best. Commenters debate the realities behind headline-making acquisition figures, pointing out that engineering staff rarely see transformative payouts. Others share cautionary tales and witticisms about "confederate dollars" and the illusory nature of stock options, reinforcing a hard-learned industry lesson: trust in founder integrity, demand transparency, but above all, do not bet your future on equity alone.

The future is not self-hosted

The article contends that self-hosting, while offering individuals greater control and privacy over their digital assets, is ultimately not a scalable or universally accessible solution to the problems of digital ownership and cloud centralization. Using the recent example of Amazon limiting Kindle book backups, the author highlights the ongoing erosion of digital ownership—content purchased is licensed, not owned, and subject to corporate control. Attempts at self-hosting, such as constructing a personal cloud using open-source tools, demonstrate that regaining control is possible but involves significant technical complexity, maintenance overhead, and limited interoperability.

The author’s technical journey underscores that self-hosting provides empowerment at the cost of usability and community. Solutions like Immich for photos or Jellyfin for media streaming offer privacy advantages, but require sustained effort and expertise, and often isolate their users from broader collaborative or sharing opportunities. This “digital suburbia” metaphor encapsulates the fragmentation and inefficiency that widespread self-hosting could foster—each person managing a siloed infrastructure instead of leveraging the widespread connectivity and seamless user experience of commercial clouds.

Hacker News commenters strongly resonate with the skepticism toward real digital ownership in the cloud era and the burdens of self-hosting. They emphasize that while self-hosting appeals to technical enthusiasts, it is impractical for most due to the steep skill, maintenance, and hardware requirements. Many endorse the author’s call for community-hosted, cooperative digital infrastructure as a plausible compromise, noting public libraries and cooperatives as promising stewards of shared, privacy-centered services. The consensus is that meaningful digital sovereignty requires collective, not just individual, action—a philosophical shift that garnered widespread agreement, curiosity, and discussion.