Hacker Newsnew | past | comments | ask | show | jobs | submit | atomicthumbs's commentslogin

And how much commercial development have NMC and LFP batteries had since they left the laboratory?

LFP was developed in the late 1990's and NCM in the early 2000.

They have already gone through multiple iterations: NCM523 first was mass-produced in 2007; the latest mainstream NCM is now NCM811, followed by the next-gen NCM9.5.5 (higher density). LFP is now up to the 4th generation.

That being said, the EV batteries aren't just driven by improvements in the cathode, but also in the anodes, such as silicon composite, or in this particular case, anode-free batteries.


LFP batteries are currently being used in newer EVs, most larger power banks, and in newer high-end phones and laptops.

LFP are common in EV’s and ‘solar generator’ style battery packs, but I’ve never seen them in phones or laptops (outside OLPC), reduced capacity makes them not great in these, better to go NMC.

which "high-end" phones and laptops use LFP? This makes no sense.

Also, LFPs are mostly deployed in low-range EVs and mostly in China. Most EVs outside China still favor NCM/NCA, but I suspect that LFP is going to gain market share in budget friendly, low-range EVs.


A number of Chinese brands use LFP batteries due to the local flight ban on lithium ion batteries.

You are conflating power banks and smartphones.

In China, the current trend in "high-end" smartphones/laptop is to switch to higher-energy silicon-anode batteries. LFP is primarily for low-energy dense (gravimetric/volumetric) storage devices, such as power banks; or in vehicles, low-end/low-range EVs, or stationary energy storage (ESS) -- BYD being one notable exception.

China implemented rules in mid-2025 banning uncertified (no 3C mark) and recalled power banks from Anker & Romoss models, from domestic flights due to fire risks.


Yes, I know. I'm pointing out they're comparing a laboratory prototype to a commercial product.

eBay Seller Research shows that the average sold price for a 5800X3D has increased by about $100 in the past 30 days, from ~$360 to ~$460.


not really, because all the sousveillance in the world doesn't grant the average joe the power of a single cop


There are more things in this world than software. Many of them are important!


100%


AIs think like a rock flies.


> Virtually all successful existing sequence models rely on mean squared error (MSE) or dot-product similarity for both their bias and retention. This reliance can make models sensitive to outliers and limit their expressive power.

[...]

> MEMORA: This model focuses on achieving the best possible memory stability by forcing its memory to act like a strict probability map. By using this constraint, it ensures that every time the memory state is updated, the changes are controlled and balanced. This guarantees a clean, stable process for integrating new information.Virtually all successful existing sequence models rely on mean squared error (MSE) or dot-product similarity for both their bias and retention. This reliance can make models sensitive to outliers and limit their expressive power.

so did a Titans write this


The person you're replying to asked for a source, not an anecdote.


Those aren't iMessage hardware backdoors.


You may have skipped my second link. Here it is a second time, with the important quote excerpted: https://www.theguardian.com/technology/2021/nov/23/apple-sue...

  The Pegasus project, an investigation into NSO by the Guardian and other media outlets, coordinated by the French media group Forbidden Stories, has documented dozens of examples in which NSO’s spyware was used to attack users of Apple’s iPhone. In some cases, a vulnerability in the company’s iMessage feature, which could be penetrated by Pegasus, was used against journalists, human rights activists and other members of civil society.
The source is describing an iMessage exploit known as FORCEDENTRY, which can be used to deliver a persistent hardware backdoor (Pegasus) to an iPhone. Often, Apple is unable to detect the persistent exploit and therefore incapable of warning the user that they have a backdoored device: https://9to5mac.com/2025/02/20/apple-currently-only-able-to-...


Do you have a testable hypothesis about this or are you flailing in the dark?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: