Model Comparison
Model Editorial Structural Class Conf SETL Theme
deepseek/deepseek-v3.2-20251201 +0.13 -0.20 Neutral 0.03 0.24 Privacy & System Order
@cf/meta/llama-3.3-70b-instruct-fp8-fast lite 0.00 ND Neutral 0.90 0.00 Technical Rights
@cf/meta/llama-4-scout-17b-16e-instruct lite 0.00 ND Neutral 0.90 0.00 Technology Hardware
Section deepseek/deepseek-v3.2-20251201 @cf/meta/llama-3.3-70b-instruct-fp8-fast lite @cf/meta/llama-4-scout-17b-16e-instruct lite
Preamble ND ND ND
Article 1 ND ND ND
Article 2 ND ND ND
Article 3 ND ND ND
Article 4 ND ND ND
Article 5 ND ND ND
Article 6 ND ND ND
Article 7 ND ND ND
Article 8 ND ND ND
Article 9 ND ND ND
Article 10 ND ND ND
Article 11 ND ND ND
Article 12 -0.02 ND ND
Article 13 ND ND ND
Article 14 ND ND ND
Article 15 ND ND ND
Article 16 ND ND ND
Article 17 0.10 ND ND
Article 18 ND ND ND
Article 19 ND ND ND
Article 20 ND ND ND
Article 21 ND ND ND
Article 22 ND ND ND
Article 23 ND ND ND
Article 24 ND ND ND
Article 25 ND ND ND
Article 26 ND ND ND
Article 27 0.20 ND ND
Article 28 0.10 ND ND
Article 29 ND ND ND
Article 30 ND ND ND
+0.13 80386 Protection (nand2mario.github.io S:-0.20 )
114 points by nand2mario 3 days ago | 29 comments on HN | Neutral Editorial · v3.7 · 2026-02-28 07:41:15
Summary Privacy & System Order Neutral
The content is a technical blog post about the hardware design of the Intel 80386 CPU's memory protection features. It engages human rights only indirectly, mentioning hardware mechanisms that support program isolation (security) and describing features for OS memory management (privacy/data integrity). The structural inclusion of Google Analytics creates a mild negative signal for privacy. Overall, the content is technically focused and neutral with respect to human rights advocacy.
Article Heatmap
Preamble: ND — Preamble Preamble: No Data — Preamble P Article 1: ND — Freedom, Equality, Brotherhood Article 1: No Data — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: ND — Life, Liberty, Security Article 3: No Data — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: -0.02 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: +0.10 — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: ND — Freedom of Expression Article 19: No Data — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: +0.20 — Cultural Participation 27 Article 28: +0.10 — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.13 Structural Mean -0.20
Weighted Mean +0.10 Unweighted Mean +0.10
Max +0.20 Article 27 Min -0.02 Article 12
Signal 4 No Data 27
Confidence 3% Volatility 0.08 (Low)
Negative 1 Channels E: 0.6 S: 0.4
SETL +0.24 Editorial-dominant
FW Ratio 50% 4 facts · 4 inferences
Evidence: High: 0 Medium: 0 Low: 4 No Data: 27
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.00 (0 articles) Security: 0.00 (0 articles) Legal: 0.00 (0 articles) Privacy & Movement: -0.02 (1 articles) Personal: 0.10 (1 articles) Expression: 0.00 (0 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.20 (1 articles) Order & Duties: 0.10 (1 articles)
HN Discussion 6 top-level · 9 replies
icanhasjonas 2026-02-27 06:06 UTC link
Made me think of the old Desqview
jejgkgkldl 2026-02-27 06:45 UTC link
Article states that win 3.0 used 32-bit flat addressing mode, but when win 95 launched ms said win 3.0 didn’t (in 386 mode).
4j452j45nj 2026-02-27 08:30 UTC link
ah, PDE/PTE A/D writes... what a source of variety over the decades!

some chips set them step by step, as shown in the article

others only set them at them very end, together

and then there are chips which follow the read-modify-write op with another read, to check if the RMW succeeded... which promptly causes them to hang hard when the page tables live in read-only memory i.e. ROM... fun fun fun!

as for segmentation fun... think about CS always being writeable in real mode... even though the access rights only have a R but no W bit for it...

dsign 2026-02-27 08:45 UTC link
I've wondered for a long time if we would have been able to make do without protected mode (or hardware protection in general) if user code was verified/compiled at load, e.g. the way the JVM or .NET do it...Could the shift on transistor budget have been used to offset any performance losses?
inigyou 2026-02-27 09:47 UTC link
Interesting to see how hardware designers of yesteryear did things, and why CPUs are so complicated and have so many bugs.
fortran77 2026-02-27 09:51 UTC link
> These features made possible Windows 3.0, OS/2, and early Linux.

And also--before Linux--SCO Xenix and then SCO Unix. It was finally possible to run a real Unix on a desktop or home PC. A real game changer. I paid big $$$ (for me at the time) to get SCO Xenix for my 386 so I could have my own Unix system.

shakna 2026-02-27 07:04 UTC link
Pretty sure Enhanced Mode, that only came later in Windows 3.11 for Workgroup, is the one that supported the flat addressing mode.
this-is-why 2026-02-27 07:36 UTC link
It used segmented 32-bit mode. Flat mode doesn’t support virtual addressing which was accomplished with the descriptor tables (and the ES register) if I recall correctly. lol it’s been 33 years since I wrote windows drivers. Had to use masm to compile the 16-bit segments to thunk to the kernel
st_goliath 2026-02-27 09:02 UTC link
Microsoft Research had an experimental OS project at one point that does just that with everything running in ring 0 in the same address space:

https://en.wikipedia.org/wiki/Singularity_(operating_system)

Managed code, the properties of their C# derived programming language, static analysis and verification were used rather than hardware exception handling.

rwmj 2026-02-27 10:14 UTC link
I think the interesting thing about having protection in software is you can do things differently, and possibly better. Computers of yesteryear had protection at the individual object level (eg https://en.wikipedia.org/wiki/Burroughs_Large_Systems). This was too expensive to do in 1970s hardware and so performance sucked. Maybe it could be done in software better with more modern optimizing compilers and perhaps a few bits of hardware acceleration here and there? There's definitely an interesting research project to be done.
whobre 2026-02-27 13:24 UTC link
Xenix 2.1 could run on the IBM PC XT with Intel 8088 in late 1983, IIRC, and even before that on the Altos 586 which had MMU as an external chip.
rwallace 2026-02-27 13:45 UTC link
I looked into that, concluded the spoiler is Specter.

Basically, you have to have out of order/speculative execution if you ultimately want the best performance on general/integer workloads. And once you have that, timing information is going to leak from one process into another, and that timing information can be used to infer the contents of memory. As far as I can see, there is no way to block this in software. No substitute for the CPU knowing 'that page should not be accessible to this process, activate timing leak mitigation'.

rep_lodsb 2026-02-27 13:59 UTC link
That's because CS in real/V86 mode is actually a writable data segment. Most protection checks work exactly the same in any mode, but the "is this a code segment?" check is only done when CS is loaded in protected mode, and not on any subsequent code fetch.

Using a non-standard mechanism of loading CS (LOADALL or RSM), it's possible to have a writable CS in protected mode too, at least on these older processors.

There's actually a slight difference in the access rights byte that gets loaded into the hidden part of a segment register (aka "descriptor cache") between real and protected mode. I first noticed this on the 80286, and it looks to be the same on the 386:

- In protected mode, the byte always matches that from the GDT/LDT entry: bit 4 (code/data segment vs. system) must be set, the segment load instruction won't allow otherwise, bit 0 (accessed) is set automatically (and written back to memory).

- In real and V86 mode, both of these bits are clear. So in V86 mode the value is 0xE2 instead of the "correct" 0xF3 for a ring 3 data segment, and similarly in real mode it's 0x82 (ring 0).

The hardware seems to simply ignore these bits, but they still exist in the register, unlike other "useless" bits. For example, LDT only has bit 7 (present), and GDT/IDT/TSS have no access rights byte at all - they're always assumed to be present, and the access rights byte reads as 0xFF. At least on the 286 that was the case, I've read that on the Pentium you can even mark GDT as not-present, and then get a triple fault on any access to it.

Keeping these bits, and having them different between modes might have been an intentional choice, making it possible to determine (by ICE monitor software) in what mode a segment got loaded. Maybe even the two other possible combinations (where bit4 != bit0) have some use to mark a "special" segment type that is never set by hardware?

classichasclass 2026-02-27 17:57 UTC link
Don't forget Venix. It was the first true Unix that could run on a stock IBM PC, and beat Xenix on that platform by months.
Editorial Channel
What the content says
+0.20
Article 27 Cultural Participation
Low Coverage Practice
Editorial
+0.20
SETL
ND

Article is a detailed technical blog post describing the design and implementation of hardware-level protections, an example of sharing technical knowledge and participating in cultural life of technology.

+0.10
Article 12 Privacy
Low Framing Practice
Editorial
+0.10
SETL
+0.24

Article mentions 'A/D bits' (Accessed/Dirty) as hardware mechanisms that exist for the OS's benefit in memory management, a technical implementation of system efficiency that indirectly relates to data integrity.

+0.10
Article 17 Property
Low Practice
Editorial
+0.10
SETL
ND

Content describes hardware mechanisms (protection, segmentation, paging) that enable isolation and secure ownership of memory for programs, a technical foundation for property rights in computing.

+0.10
Article 28 Social & International Order
Low Framing
Editorial
+0.10
SETL
ND

The article's subject—hardware-level memory protection—is a foundational component of a social and international order where programs can securely co-exist.

ND
Preamble Preamble

ND
Article 1 Freedom, Equality, Brotherhood

ND
Article 2 Non-Discrimination

ND
Article 3 Life, Liberty, Security

ND
Article 4 No Slavery

ND
Article 5 No Torture

ND
Article 6 Legal Personhood

ND
Article 7 Equality Before Law

ND
Article 8 Right to Remedy

ND
Article 9 No Arbitrary Detention

ND
Article 10 Fair Hearing

ND
Article 11 Presumption of Innocence

ND
Article 13 Freedom of Movement

ND
Article 14 Asylum

ND
Article 15 Nationality

ND
Article 16 Marriage & Family

ND
Article 18 Freedom of Thought

ND
Article 19 Freedom of Expression

ND
Article 20 Assembly & Association

ND
Article 21 Political Participation

ND
Article 22 Social Security

ND
Article 23 Work & Equal Pay

ND
Article 24 Rest & Leisure

ND
Article 25 Standard of Living

ND
Article 26 Education

ND
Article 29 Duties to Community

ND
Article 30 No Destruction of Rights

Structural Channel
What the site does
Domain Context Profile
Element Modifier Affects Note
Privacy
No privacy policy or cookie notice found on page.
Terms of Service
No terms of service found on page.
Accessibility
No accessibility features or statements found on page.
Mission
No mission or values statement found on page.
Editorial Code
No editorial code or standards found on page.
Ownership
No ownership, sponsorship, or funding information found on page.
Access Model
No access model information (paywall, login) found on page.
Ad/Tracking
Google Analytics script present (G-HPP04YGFN2). No other ads or tracking scripts observed.
-0.20
Article 12 Privacy
Low Framing Practice
Structural
-0.20
Context Modifier
0.00
SETL
+0.24

Page includes a Google Analytics script (G-HPP04YGFN2).

ND
Preamble Preamble

ND
Article 1 Freedom, Equality, Brotherhood

ND
Article 2 Non-Discrimination

ND
Article 3 Life, Liberty, Security

ND
Article 4 No Slavery

ND
Article 5 No Torture

ND
Article 6 Legal Personhood

ND
Article 7 Equality Before Law

ND
Article 8 Right to Remedy

ND
Article 9 No Arbitrary Detention

ND
Article 10 Fair Hearing

ND
Article 11 Presumption of Innocence

ND
Article 13 Freedom of Movement

ND
Article 14 Asylum

ND
Article 15 Nationality

ND
Article 16 Marriage & Family

ND
Article 17 Property
Low Practice

Content describes hardware mechanisms (protection, segmentation, paging) that enable isolation and secure ownership of memory for programs, a technical foundation for property rights in computing.

ND
Article 18 Freedom of Thought

ND
Article 19 Freedom of Expression

ND
Article 20 Assembly & Association

ND
Article 21 Political Participation

ND
Article 22 Social Security

ND
Article 23 Work & Equal Pay

ND
Article 24 Rest & Leisure

ND
Article 25 Standard of Living

ND
Article 26 Education

ND
Article 27 Cultural Participation
Low Coverage Practice

Article is a detailed technical blog post describing the design and implementation of hardware-level protections, an example of sharing technical knowledge and participating in cultural life of technology.

ND
Article 28 Social & International Order
Low Framing

The article's subject—hardware-level memory protection—is a foundational component of a social and international order where programs can securely co-exist.

ND
Article 29 Duties to Community

ND
Article 30 No Destruction of Rights

Supplementary Signals
Epistemic Quality
0.83 low claims
Sources
0.9
Evidence
0.9
Uncertainty
0.6
Purpose
1.0
Propaganda Flags
0 techniques detected
Solution Orientation
0.46 solution oriented
Reader Agency
0.1
Emotional Tone
measured
Valence
0.0
Arousal
0.1
Dominance
0.7
Stakeholder Voice
0.30 1 perspective
Speaks: individuals
About: corporation
Temporal Framing
retrospective historical
Geographic Scope
unspecified
Complexity
technical high jargon domain specific
Transparency
0.00
✗ Author
Audit Trail 61 entries
2026-02-28 08:29 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 08:29 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 08:29 rater_validation_warn Light validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 08:19 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 08:19 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 08:19 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 08:01 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 08:01 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 08:01 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 07:41 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 07:41 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 07:41 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 07:41 eval_success Evaluated: Neutral (0.10) - -
2026-02-28 07:41 eval Evaluated by deepseek-v3.2: +0.10 (Neutral) 12,386 tokens +0.06
2026-02-28 06:59 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:59 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 06:59 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 06:58 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:58 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 06:58 rater_validation_warn Light validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 06:46 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 06:46 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:46 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 06:41 rater_validation_warn Light validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 06:41 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:41 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 06:41 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:41 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 06:41 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 06:19 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 06:19 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 05:47 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 05:44 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 05:40 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 05:28 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 05:25 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 05:21 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 05:10 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 05:07 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 05:00 eval Evaluated by deepseek-v3.2: +0.03 (Neutral) 14,240 tokens -0.04
2026-02-28 04:42 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 04:12 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 04:09 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 03:36 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 03:31 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 03:29 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 03:20 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 02:58 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 02:47 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 02:41 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 02:41 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 02:30 eval Evaluated by deepseek-v3.2: +0.07 (Neutral) 13,136 tokens
2026-02-28 02:28 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 01:55 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 01:48 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 01:35 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 01:33 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 01:24 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
2026-02-28 01:24 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 00:51 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral)
2026-02-28 00:47 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral)