Alvaro Lopez Ortega / 2026-04-03 Briefing

Created Fri, 03 Apr 2026 19:33:31 +0000 Modified Fri, 03 Apr 2026 19:35:28 +0000
3992 Words

The Chinese spy group TA416 has resurfaced, targeting EU and NATO organizations. Meanwhile, the U.S. introduced the MATCH Act to tighten semiconductor export controls to China. In labor news, the NLRB has ordered Amazon to negotiate with its Staten Island union. Additionally, X plans to auto-lock accounts posting about crypto, as Chinese firms strengthen their humanoid robot supply chains.

πŸ€– Artificial Intelligence

Mercor asked pros to sell work materials for AI training, even if IP belongs to ex-employers.

Mercor, a $10 billion startup, has begun approaching professionals in industries such as entertainment to purchase their previous work materials for AI training. However, many of those approached may not legally hold the rights to the intellectual property, as ownership often belongs to their former employers.

Musk requires SpaceX IPO banks to use Grok and X ads; some spend millions on Grok integration

Elon Musk is requiring banks and advisers seeking to participate in the SpaceX initial public offering to subscribe to his Grok AI chatbot and advertise on X. Some financial institutions are reportedly spending tens of millions of dollars to integrate the chatbot into their IT systems to secure roles in the massive upcoming deal.

Lacking advanced chips, startups use ‘frugal AI’ to build smaller models on open-weight systems.

Researchers and startups are adopting a “frugal AI” approach by building smaller, open-weight models that require significantly less computing power and energy. These efficient systems are designed to run on low-end devices and low-bandwidth networks, helping to bridge the global AI adoption gap in resource-limited regions.

AI-native design tool Noon raises $44M from Chemistry, First Round Capital, and others

San Francisco-based startup Noon has emerged from stealth mode with $44 million in funding from investors including Chemistry and First Round Capital. The company is developing an AI-native product design tool that integrates directly with a team’s codebase and design system to bridge the gap between design and engineering.

Chatbots are now prescribing psychiatric drugs

Utah is piloting an AI chatbot system that allows for the automated renewal of 15 low-risk psychiatric medications for stable patients. While state officials hope the program will reduce costs and address healthcare shortages, some psychiatrists warn the system is risky and unlikely to expand care to those with more complex needs.

Economists Once Dismissed the A.I. Job Threat, but Not Anymore

Economists are shifting from historical skepticism toward recognizing the potential for artificial intelligence to disrupt the labor market. Although widespread displacement has not yet occurred, experts warn that rapid technological advancements could lead to significant inequality and mass job losses, potentially leaving policymakers unprepared.

Apfel – The free AI already on your Mac

Apfel is a free AI application designed for macOS users. The project is available for use via its GitHub repository.

AI’s fluency in other languages hides a Western worldview that can mislead users

Large language models exhibit “epistemological persistence,” providing linguistically fluent responses in various languages while maintaining an underlying Western worldview. This occurs because these models are trained predominantly on English-language data, causing them to prioritize Western values over the local cultural norms of other language speakers.

Claude Code Found a Linux Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to discover multiple remotely exploitable vulnerabilities in the Linux kernel. Notably, the tool’s analysis uncovered a security flaw in the NFS driver that had remained undetected for 23 years.

apfel: Free AI already on your Mac

Apfel is a Swift-based utility that exposes the built-in Apple Silicon LLM as a command-line tool, an interactive chat, and an OpenAI-compatible HTTP server. The tool enables local, on-device AI processing via the FoundationModels framework, allowing users to seamlessly integrate Apple Intelligence into shell scripts and existing OpenAI-compatible applications.

πŸ’» Software & Development

Sony acquires Cinemersive Labs to convert 2D photos and videos into 3D volumetric content

Sony Interactive Entertainment has acquired UK-based AI startup Cinemersive Labs, which specializes in converting 2D photos and videos into 3D volumetric images. The startup’s team will join Sony’s Visual Computing Group to help advance graphical technologies and enhance gameplay visuals through machine learning.

Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M

Via Licensing Alliance has replaced its $100,000 annual cap for H.264 streaming licenses with a tiered system that can reach up to $4.5 million for large platforms. The new rates apply to unlicensed implementers seeking licenses in 2026 or later, while existing licensees are grandfathered under their original terms.

I prefer OG style websites – what are yours?

The author expresses a preference for “OG style” websites that prioritize functionality over aesthetic design. After highlighting an example found via Wikipedia, they invite readers to share their favorite older-style, actively maintained websites.

ctx – an Agentic Development Environment (ADE)

ctx is an Agentic Development Environment (ADE) that provides a unified interface for managing various coding agents, such as Claude Code and Cursor, within a single workflow. The platform offers secure, containerized workspaces with isolated disk and network controls, allowing teams to centralize reviews, transcripts, and task history across local or remote environments.

Big-Endian Testing with QEMU

Developers can use QEMU’s user-mode emulation and GCC cross-compilers to test code for big-endian architectures, such as MIPS or IBM z/Architecture, on standard little-endian systems. This approach allows for verifying how byte order affects memory storage without the need for access to physical hardware.

H.264 Streaming Fees: What Changed, Who’s Affected, and What It Means

Starting in 2026, the Via Licensing Alliance will implement a tiered H.264 streaming royalty structure that significantly increases annual fees for large-scale platforms to as much as $4.5 million. This new model applies only to new licensees, while those with active agreements through 2025 are permitted to retain their original terms.

Bun: cgroup-aware AvailableParallelism / HardwareConcurrency on Linux

Bun has implemented cgroup-aware CPU detection for Linux, updating APIs such as navigator.hardwareConcurrency and os.availableParallelism(). This update ensures that containers with CPU limits correctly report their allocated processor count instead of the host’s total core count.

Category Theory Illustrated – Types

This article introduces type theory as a mathematical foundation and a powerful alternative to set and category theory. It explains how the development of type theory was motivated by the need to resolve logical paradoxes, such as Russell’s paradox, inherent in naive set theory.

HarfBuzz Slug Support with WebGL

The article outlines the implementation of HarfBuzz slug support using WebGL. It provides a comprehensive list of keyboard, mouse, and touch-based shortcuts for navigating and interacting with the interface.

Microsoft wants Edge to automatically open by default at Windows 11 boot

Microsoft is testing a new feature in the Edge Beta build for Windows 11 that automatically launches the browser upon system startup. This implementation is currently an opt-out process, requiring users to manually disable the behavior via a notification banner.

I Built an SMS Gateway with a $20 Android Phone – Jonno.nz

This guide explains how to create a cost-effective SMS gateway by using an inexpensive Android phone and the “SMS Gateway for Android” app. By utilizing a REST API and webhooks, developers can bypass expensive services like Twilio and send messages using their existing mobile plan rates.

Why the heck are we still using Markdown??

An article critiques the Markdown markup language, arguing that its syntax is inherently ambiguous and inconsistent across different implementations. The author highlights how redundant syntaxes can produce identical HTML output, potentially leading to confusion and parsing vulnerabilities.

A Discontinuity Meshing Algorithm for Accurate Radiosity (1992)

The provided text contains a title for a 1992 paper regarding a discontinuity meshing algorithm for accurate radiosity. The article’s content is unavailable due to a network security verification error.

Baby’s Second Garbage Collector

The article explores the evolution of the garbage collector used in the lone lisp programming language, building upon Bob Nystrom’s original design. It describes how the current precise collector uses a census to track all objects, ensuring they are reclaimed even when they escape the stack.

Signals, the push-pull based algorithm

The article examines the push-pull based algorithm and reactive programming paradigm that enable the functionality of Signals in modern front-end frameworks. It details how changes in data sources automatically propagate through a dependency graph using a push-based mechanism for notifying subscribers.

Lisette β€” Rust syntax, Go runtime

Lisette is a new programming language designed for seamless interoperability with the Go ecosystem, featuring a syntax similar to Rust. It utilizes a Hindley-Milner type system with pattern matching and algebraic data types to provide robust compile-time error detection.

Idiomatic Lisp and the nbody benchmark

A debate regarding Lisp’s performance relative to C has been sparked by a benchmark claiming the Koru language is significantly faster using “idiomatic” implementations. The author critiques the use of the term “idiomatic” and argues that true idiomatic Lisp programming involves using metaprogramming and multi-paradigm features to adapt the language to specific problems.

Open Source, Incentives, and Why ‘Monetize Later’ Often Backfires

The “open source first, monetize later” strategy often leads to license changes and community fragmentation as economic pressures force projects to prioritize revenue. To maintain developer trust, creators should either commit to long-term open infrastructure or implement transparent monetization models from the outset.

800 Rust terminal projects in 3 years

An author who has shared approximately 800 open-source Rust CLI projects over the past three years has released a ranked list of the “Top 99 Rust terminal projects.” The ranking was determined by analyzing engagement metrics, such as favorites and reblogs, collected from Mastodon posts.

When a billboard survives the wind, but not the boot

A digital billboard in Cheyenne, Wyoming, recently displayed a Linux GRUB bootloader error following severe storms in the area. Although the physical structure survived high winds, the digital display malfunctioned, revealing a system error to passing drivers.

Contractor quaffed his way through Y2K compliance while the client scowled

A contractor named Marcus managed Y2K compliance for a large Dutch company while drinking beer from a briefcase during his shift. Despite being accused of intoxication by a project manager, he successfully resolved technical errors to ensure a smooth transition.

πŸ›‘οΈ Cybersecurity & Privacy

Chinese spy group TA416 is back after years of silence, now targeting EU and NATO

The Chinese spy group TA416 has resurfaced after several years of inactivity. The group is now reportedly targeting organizations within the EU and NATO.

Benefits of SSH Certificates

To improve SSH security and user experience, the articles describe how to mitigate “Trust on First Use” risks by verifying server fingerprints. They also provide instructions for implementing passwordless authentication using SSH key pairs and an SSH agent.

Proton meet isn’t what they told you it was

Proton Meet, which is marketed as a privacy-focused alternative to platforms subject to the US CLOUD Act, relies on infrastructure from US-based providers such as LiveKit Cloud, Oracle, and Amazon. This dependency on American companies means that call data could potentially be accessible to US law enforcement under existing legal mandates.

New Rowhammer attacks give complete control of machines running Nvidia GPUs

Two new Rowhammer attacks targeting Nvidia high-performance GPUs allow malicious users in shared cloud environments to gain full root control of host machines. These attacks exploit bit flips caused by rapid memory access, representing a significant escalation from previous methods that were only capable of minor data degradation.

Offensive Cybersecurity Time Horizons

AI offensive cybersecurity capabilities are accelerating, with a doubling time of 5.7 months for models released since 2024. The study suggests that current estimates likely understate the true extent of progress and highlights the potential for rapid diffusion of these capabilities into open-weight models.

βš™οΈ Hardware & Infrastructure

Chinese firms strengthen humanoid robot supply chains as Tesla turns to China for strategic parts

Chinese companies are securing their position in the humanoid robot supply chain by providing essential components for advanced robotics projects. As major Western firms increasingly rely on these Chinese parts, the trend underscores a strategic technological competition between the U.S. and China.

DIY Raspberry Pi Dial-up ISP

A new project demonstrates how to emulate a local dial-up ISP using a Raspberry Pi, a 56K USB modem, and a phone line simulator. By utilizing the Linux tools mgetty and PPP, the setup allows remote computers to connect via dial-up to a local network.

Switzerland hosts ‘CERN of semiconductor research’

Switzerland is utilizing the open-source RISC-V architecture to bypass the proprietary restrictions of companies like Intel and ARM, fostering innovation in semiconductor design. Rather than competing in mass manufacturing, Swiss institutions are focusing on developing specialized, energy-efficient chips for applications such as AI and machine learning.

βš–οΈ Policy & Regulation

Elon Musk’s X is planning to auto-lock accounts that post about crypto for the first time

Elon Musk’s social media platform, X, is planning to implement a feature that automatically locks accounts when they post about cryptocurrency for the first time. This measure is intended to regulate the platform’s interaction with crypto-related content.

NLRB Orders Amazon to Negotiate with Union

The National Labor Relations Board has ruled that Amazon must enter collective bargaining negotiations with the Amazon Labor Union, which represents approximately 5,000 workers at a Staten Island warehouse. The decision follows findings that the company engaged in unfair labor practices, though Amazon intends to appeal the ruling.

Dutch regulators demand total nudify ban beyond EU rules

Dutch regulators are calling for a total ban on “nudify” technology that exceeds existing European Union regulations. The proposal seeks to implement stricter controls to prevent the unauthorized creation of explicit content.

US bill seeks DUV lithography export ban to China as chip equipment imports surge to ~$51B

U.S. lawmakers have introduced the bipartisan MATCH Act, which aims to tighten export controls on advanced semiconductor manufacturing equipment to China and other countries. The bill seeks to close existing loopholes to prevent China from establishing a domestic supply chain for critical AI chipmaking technology.

Tech Companies Are Trying to Neuter Colorado’s Landmark Right-to-Repair Law

Colorado lawmakers have advanced bill SB26-090, which aims to exempt IT equipment used in critical infrastructure from the state’s existing right-to-repair laws. While tech manufacturers support the measure citing cybersecurity concerns, repair advocates warn that the bill’s vague language could restrict the repair of essential technologies like servers and routers.

Trump Administration Orders Dismantling of the U.S. Forest Service

The Trump administration has announced a major restructuring of the U.S. Forest Service, which includes relocating its headquarters to Salt Lake City and closing all ten regional offices. The plan also involves dismantling more than fifty research facilities, a move critics argue is intended to replace scientific expertise and career professionals with political appointees.

Adult German men must request permission to leave Germany for more than 3 months

Under Germany’s newly enacted Military Service Modernization Act, men aged 17 and older must obtain permission from the Bundeswehr to reside outside the country for more than three months. This regulation is part of a broader government initiative to reintroduce military registration and increase the nation’s troop strength by 2035.

‘Fatal decision’: EU slammed for caving to US pressure on digital rules

EU lawmakers are criticizing the European Commission’s plan to initiate discussions with the U.S. regarding digital regulations such as the Digital Services Act and Digital Markets Act. Critics warn that this dialogue could allow the Trump administration to influence EU tech laws, potentially undermining European sovereignty.

European alternatives to Google, Apple, Dropbox and 120 US apps

A new directory offers a curated selection of European software, products, and services as alternatives to major US companies like Google, Apple, and Dropbox. The platform highlights European-made solutions that prioritize strict standards for privacy, environmental sustainability, and product quality across various categories.

NHS staff resist Palantir software

NHS staff are boycotting Palantir’s Β£330 million Federated Data Platform due to ethical, privacy, and data security concerns regarding the company’s links to the US defense sector. This resistance, which includes reported work slowdowns, has prompted medical unions and MPs to call for the government to terminate the contract.

RFC 9948: Internet Protocol Police (IPP) - Schedule of Punishments

RFC 9948 establishes a formal schedule of punishments for violations of IETF community principles by the Internet Protocol Police (IPP). The document aims to provide transparency and accountability for disciplinary measures that were previously applied in an informal manner.

🌍 Science & Society

iNaturalist

iNaturalist allows users to record biological observations that contribute to global biodiversity science repositories. The platform also enables individuals to connect with experts, participate in scientific projects, and engage with a community of naturalists.

Mercurial Dyson – a plan for the disassembly of planet Mercury

An engineering analysis explores the rapid disassembly of Mercury into Dyson swarm components using a self-replicating industrial seed. The study concludes that the process must eventually transition from Mercury-based mining to a larger heliocentric power and logistics system to overcome sunlight and waste heat constraints.

F-15E jet shot down over Iran

A US F-15E Strike Eagle was shot down over Iran during the ongoing five-week conflict. While one US service member has been successfully rescued, search and rescue operations are continuing to locate the second crew member.

U.S. fighter jet shot down in Iran, search underway for crew

A U.S. fighter jet has been shot down in Iran, resulting in the rescue of one crew member. Search efforts are currently ongoing for the remaining crew.

F-15E wreckage photos amid Iranian claims it shot down an American fighter

Iran claims its air defenses shot down a U.S. F-35 fighter jet, yet photographic evidence of wreckage appears to depict an F-15E Strike Eagle instead. It remains unconfirmed whether the images are authentic or if the aircraft was lost due to combat, a previous incident, or other causes.

The more evidence behind a therapy, the less the public trusts it

A growing trend in consumer health shows that public trust in medical therapies is increasingly inversely correlated with the volume of scientific evidence available. Consequently, many patients are abandoning proven, evidence-based treatments like statins in favor of unproven, unregulated substances promoted through online platforms and podcasts.

The Technocracy Movement of the 1930s

Led by Howard Scott, the 1930s Technocracy movement proposed replacing democratic governance with a centralized state managed by engineers focused on scientific efficiency. Although the movement’s popularity declined after Scott’s credentials were discredited, its core ideas regarding social engineering and resource management continue to find modern echoes.

Untaxed Wealth of Richest 0.1% Is More Than Assets of World’s Poorest Half

An Oxfam International report reveals that the world’s richest 0.1% are hiding more than $2.8 trillion in offshore tax havens to avoid taxation. This amount of untaxed wealth exceeds the total assets held by the bottom half of the global population. While global reforms have reduced the percentage of untaxed wealth, overall global inequality continues to increase.

The open web isn’t dying, we’re killing it

The author argues that the decline of the open web is driven by a long-standing preference for the convenience of centralized platforms rather than just the recent rise of AI. The piece contends that users and creators have actively contributed to this enclosure by choosing the ease of private, walled gardens over the higher costs of maintaining an open web.

Tesla March car registrations soar in key European markets

Tesla’s car registrations surged in March, tripling in France and more than doubling in several Nordic countries. This recovery in European sales follows the rollout of more affordable versions of the Model Y and Model 3.

What are you doing this weekend?

Individuals are invited to share their upcoming weekend plans or seek feedback on their activities. The post also emphasizes that having no plans is perfectly acceptable.