The Chinese spy group TA416 has resurfaced, targeting EU and NATO organizations. Meanwhile, the U.S. introduced the MATCH Act to tighten semiconductor export controls to China. In labor news, the NLRB has ordered Amazon to negotiate with its Staten Island union. Additionally, X plans to auto-lock accounts posting about crypto, as Chinese firms strengthen their humanoid robot supply chains.
π€ Artificial Intelligence
Mercor asked pros to sell work materials for AI training, even if IP belongs to ex-employers.
Mercor, a $10 billion startup, has begun approaching professionals in industries such as entertainment to purchase their previous work materials for AI training. However, many of those approached may not legally hold the rights to the intellectual property, as ownership often belongs to their former employers.
- Mercor asked pros to sell work materials for AI training, even if IP belongs to ex-employers. β wsj.com
Musk requires SpaceX IPO banks to use Grok and X ads; some spend millions on Grok integration
Elon Musk is requiring banks and advisers seeking to participate in the SpaceX initial public offering to subscribe to his Grok AI chatbot and advertise on X. Some financial institutions are reportedly spending tens of millions of dollars to integrate the chatbot into their IT systems to secure roles in the massive upcoming deal.
- Musk requires SpaceX IPO banks to use Grok and X ads; some spend millions on Grok integration β nytimes.com
Lacking advanced chips, startups use ‘frugal AI’ to build smaller models on open-weight systems.
Researchers and startups are adopting a “frugal AI” approach by building smaller, open-weight models that require significantly less computing power and energy. These efficient systems are designed to run on low-end devices and low-bandwidth networks, helping to bridge the global AI adoption gap in resource-limited regions.
- Lacking advanced chips, startups use ‘frugal AI’ to build smaller models on open-weight systems. β restofworld.org
AI-native design tool Noon raises $44M from Chemistry, First Round Capital, and others
San Francisco-based startup Noon has emerged from stealth mode with $44 million in funding from investors including Chemistry and First Round Capital. The company is developing an AI-native product design tool that integrates directly with a team’s codebase and design system to bridge the gap between design and engineering.
- AI-native design tool Noon raises $44M from Chemistry, First Round Capital, and others β economictimes.indiatimes.com
Chatbots are now prescribing psychiatric drugs
Utah is piloting an AI chatbot system that allows for the automated renewal of 15 low-risk psychiatric medications for stable patients. While state officials hope the program will reduce costs and address healthcare shortages, some psychiatrists warn the system is risky and unlikely to expand care to those with more complex needs.
- Chatbots are now prescribing psychiatric drugs β theverge.com
Economists Once Dismissed the A.I. Job Threat, but Not Anymore
Economists are shifting from historical skepticism toward recognizing the potential for artificial intelligence to disrupt the labor market. Although widespread displacement has not yet occurred, experts warn that rapid technological advancements could lead to significant inequality and mass job losses, potentially leaving policymakers unprepared.
- Economists Once Dismissed the A.I. Job Threat, but Not Anymore β nytimes.com
Apfel β The free AI already on your Mac
Apfel is a free AI application designed for macOS users. The project is available for use via its GitHub repository.
- Apfel β The free AI already on your Mac β apfel.franzai.com
AI’s fluency in other languages hides a Western worldview that can mislead users
Large language models exhibit “epistemological persistence,” providing linguistically fluent responses in various languages while maintaining an underlying Western worldview. This occurs because these models are trained predominantly on English-language data, causing them to prioritize Western values over the local cultural norms of other language speakers.
- AI’s fluency in other languages hides a Western worldview that can mislead users β theconversation.com
Claude Code Found a Linux Vulnerability Hidden for 23 Years
Anthropic researcher Nicholas Carlini used Claude Code to discover multiple remotely exploitable vulnerabilities in the Linux kernel. Notably, the tool’s analysis uncovered a security flaw in the NFS driver that had remained undetected for 23 years.
- Claude Code Found a Linux Vulnerability Hidden for 23 Years β mtlynch.io
apfel: Free AI already on your Mac
Apfel is a Swift-based utility that exposes the built-in Apple Silicon LLM as a command-line tool, an interactive chat, and an OpenAI-compatible HTTP server. The tool enables local, on-device AI processing via the FoundationModels framework, allowing users to seamlessly integrate Apple Intelligence into shell scripts and existing OpenAI-compatible applications.
- apfel: Free AI already on your Mac β apfel.franzai.com
π» Software & Development
Sony acquires Cinemersive Labs to convert 2D photos and videos into 3D volumetric content
Sony Interactive Entertainment has acquired UK-based AI startup Cinemersive Labs, which specializes in converting 2D photos and videos into 3D volumetric images. The startup’s team will join Sony’s Visual Computing Group to help advance graphical technologies and enhance gameplay visuals through machine learning.
- Sony acquires Cinemersive Labs to convert 2D photos and videos into 3D volumetric content β engadget.com
Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M
Via Licensing Alliance has replaced its $100,000 annual cap for H.264 streaming licenses with a tiered system that can reach up to $4.5 million for large platforms. The new rates apply to unlicensed implementers seeking licenses in 2026 or later, while existing licensees are grandfathered under their original terms.
- Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M β tomshardware.com
I prefer OG style websites β what are yours?
The author expresses a preference for “OG style” websites that prioritize functionality over aesthetic design. After highlighting an example found via Wikipedia, they invite readers to share their favorite older-style, actively maintained websites.
ctx β an Agentic Development Environment (ADE)
ctx is an Agentic Development Environment (ADE) that provides a unified interface for managing various coding agents, such as Claude Code and Cursor, within a single workflow. The platform offers secure, containerized workspaces with isolated disk and network controls, allowing teams to centralize reviews, transcripts, and task history across local or remote environments.
Big-Endian Testing with QEMU
Developers can use QEMUβs user-mode emulation and GCC cross-compilers to test code for big-endian architectures, such as MIPS or IBM z/Architecture, on standard little-endian systems. This approach allows for verifying how byte order affects memory storage without the need for access to physical hardware.
- Big-Endian Testing with QEMU β hanshq.net
H.264 Streaming Fees: What Changed, Who’s Affected, and What It Means
Starting in 2026, the Via Licensing Alliance will implement a tiered H.264 streaming royalty structure that significantly increases annual fees for large-scale platforms to as much as $4.5 million. This new model applies only to new licensees, while those with active agreements through 2025 are permitted to retain their original terms.
- H.264 Streaming Fees: What Changed, Who’s Affected, and What It Means β streamingmedia.com
Bun: cgroup-aware AvailableParallelism / HardwareConcurrency on Linux
Bun has implemented cgroup-aware CPU detection for Linux, updating APIs such as navigator.hardwareConcurrency and os.availableParallelism(). This update ensures that containers with CPU limits correctly report their allocated processor count instead of the host’s total core count.
Category Theory Illustrated β Types
This article introduces type theory as a mathematical foundation and a powerful alternative to set and category theory. It explains how the development of type theory was motivated by the need to resolve logical paradoxes, such as Russell’s paradox, inherent in naive set theory.
- Category Theory Illustrated β Types β abuseofnotation.github.io
HarfBuzz Slug Support with WebGL
The article outlines the implementation of HarfBuzz slug support using WebGL. It provides a comprehensive list of keyboard, mouse, and touch-based shortcuts for navigating and interacting with the interface.
- HarfBuzz Slug Support with WebGL β harfbuzz.github.io
Microsoft wants Edge to automatically open by default at Windows 11 boot
Microsoft is testing a new feature in the Edge Beta build for Windows 11 that automatically launches the browser upon system startup. This implementation is currently an opt-out process, requiring users to manually disable the behavior via a notification banner.
- Microsoft wants Edge to automatically open by default at Windows 11 boot β windowscentral.com
I Built an SMS Gateway with a $20 Android Phone β Jonno.nz
This guide explains how to create a cost-effective SMS gateway by using an inexpensive Android phone and the “SMS Gateway for Android” app. By utilizing a REST API and webhooks, developers can bypass expensive services like Twilio and send messages using their existing mobile plan rates.
Why the heck are we still using Markdown??
An article critiques the Markdown markup language, arguing that its syntax is inherently ambiguous and inconsistent across different implementations. The author highlights how redundant syntaxes can produce identical HTML output, potentially leading to confusion and parsing vulnerabilities.
- Why the heck are we still using Markdown?? β bgslabs.org
A Discontinuity Meshing Algorithm for Accurate Radiosity (1992)
The provided text contains a title for a 1992 paper regarding a discontinuity meshing algorithm for accurate radiosity. The article’s content is unavailable due to a network security verification error.
- A Discontinuity Meshing Algorithm for Accurate Radiosity (1992) β researchgate.net
Babyβs Second Garbage Collector
The article explores the evolution of the garbage collector used in the lone lisp programming language, building upon Bob Nystrom’s original design. It describes how the current precise collector uses a census to track all objects, ensuring they are reclaimed even when they escape the stack.
- Babyβs Second Garbage Collector β matheusmoreira.com
Signals, the push-pull based algorithm
The article examines the push-pull based algorithm and reactive programming paradigm that enable the functionality of Signals in modern front-end frameworks. It details how changes in data sources automatically propagate through a dependency graph using a push-based mechanism for notifying subscribers.
- Signals, the push-pull based algorithm β willybrauner.com
Lisette β Rust syntax, Go runtime
Lisette is a new programming language designed for seamless interoperability with the Go ecosystem, featuring a syntax similar to Rust. It utilizes a Hindley-Milner type system with pattern matching and algebraic data types to provide robust compile-time error detection.
- Lisette β Rust syntax, Go runtime β lisette.run
Idiomatic Lisp and the nbody benchmark
A debate regarding Lisp’s performance relative to C has been sparked by a benchmark claiming the Koru language is significantly faster using “idiomatic” implementations. The author critiques the use of the term “idiomatic” and argues that true idiomatic Lisp programming involves using metaprogramming and multi-paradigm features to adapt the language to specific problems.
- Idiomatic Lisp and the nbody benchmark β stylewarning.com
Open Source, Incentives, and Why ‘Monetize Later’ Often Backfires
The “open source first, monetize later” strategy often leads to license changes and community fragmentation as economic pressures force projects to prioritize revenue. To maintain developer trust, creators should either commit to long-term open infrastructure or implement transparent monetization models from the outset.
- Open Source, Incentives, and Why ‘Monetize Later’ Often Backfires β kaluvuri.com
800 Rust terminal projects in 3 years
An author who has shared approximately 800 open-source Rust CLI projects over the past three years has released a ranked list of the “Top 99 Rust terminal projects.” The ranking was determined by analyzing engagement metrics, such as favorites and reblogs, collected from Mastodon posts.
- 800 Rust terminal projects in 3 years β blog.orhun.dev
When a billboard survives the wind, but not the boot
A digital billboard in Cheyenne, Wyoming, recently displayed a Linux GRUB bootloader error following severe storms in the area. Although the physical structure survived high winds, the digital display malfunctioned, revealing a system error to passing drivers.
- When a billboard survives the wind, but not the boot β go.theregister.com
Contractor quaffed his way through Y2K compliance while the client scowled
A contractor named Marcus managed Y2K compliance for a large Dutch company while drinking beer from a briefcase during his shift. Despite being accused of intoxication by a project manager, he successfully resolved technical errors to ensure a smooth transition.
- Contractor quaffed his way through Y2K compliance while the client scowled β go.theregister.com
π‘οΈ Cybersecurity & Privacy
Chinese spy group TA416 is back after years of silence, now targeting EU and NATO
The Chinese spy group TA416 has resurfaced after several years of inactivity. The group is now reportedly targeting organizations within the EU and NATO.
Benefits of SSH Certificates
To improve SSH security and user experience, the articles describe how to mitigate “Trust on First Use” risks by verifying server fingerprints. They also provide instructions for implementing passwordless authentication using SSH key pairs and an SSH agent.
- SSH certificates: the better SSH experience β jpmens.net
Proton meet isn’t what they told you it was
Proton Meet, which is marketed as a privacy-focused alternative to platforms subject to the US CLOUD Act, relies on infrastructure from US-based providers such as LiveKit Cloud, Oracle, and Amazon. This dependency on American companies means that call data could potentially be accessible to US law enforcement under existing legal mandates.
- Proton meet isn’t what they told you it was β sambent.com
New Rowhammer attacks give complete control of machines running Nvidia GPUs
Two new Rowhammer attacks targeting Nvidia high-performance GPUs allow malicious users in shared cloud environments to gain full root control of host machines. These attacks exploit bit flips caused by rapid memory access, representing a significant escalation from previous methods that were only capable of minor data degradation.
- New Rowhammer attacks give complete control of machines running Nvidia GPUs β arstechnica.com
Offensive Cybersecurity Time Horizons
AI offensive cybersecurity capabilities are accelerating, with a doubling time of 5.7 months for models released since 2024. The study suggests that current estimates likely understate the true extent of progress and highlights the potential for rapid diffusion of these capabilities into open-weight models.
- Offensive Cybersecurity Time Horizons β lyptusresearch.org
βοΈ Hardware & Infrastructure
Chinese firms strengthen humanoid robot supply chains as Tesla turns to China for strategic parts
Chinese companies are securing their position in the humanoid robot supply chain by providing essential components for advanced robotics projects. As major Western firms increasingly rely on these Chinese parts, the trend underscores a strategic technological competition between the U.S. and China.
- Chinese firms strengthen humanoid robot supply chains as Tesla turns to China for strategic parts β wsj.com
DIY Raspberry Pi Dial-up ISP
A new project demonstrates how to emulate a local dial-up ISP using a Raspberry Pi, a 56K USB modem, and a phone line simulator. By utilizing the Linux tools mgetty and PPP, the setup allows remote computers to connect via dial-up to a local network.
- Build your own Dial-up ISP with a Raspberry Pi β jeffgeerling.com
Switzerland hosts ‘CERN of semiconductor research’
Switzerland is utilizing the open-source RISC-V architecture to bypass the proprietary restrictions of companies like Intel and ARM, fostering innovation in semiconductor design. Rather than competing in mass manufacturing, Swiss institutions are focusing on developing specialized, energy-efficient chips for applications such as AI and machine learning.
- Switzerland hosts ‘CERN of semiconductor research’ β swissinfo.ch
βοΈ Policy & Regulation
Elon Musk’s X is planning to auto-lock accounts that post about crypto for the first time
Elon Musk’s social media platform, X, is planning to implement a feature that automatically locks accounts when they post about cryptocurrency for the first time. This measure is intended to regulate the platform’s interaction with crypto-related content.
- Elon Musk’s X is planning to auto-lock accounts that post about crypto for the first time β cybernews.com
NLRB Orders Amazon to Negotiate with Union
The National Labor Relations Board has ruled that Amazon must enter collective bargaining negotiations with the Amazon Labor Union, which represents approximately 5,000 workers at a Staten Island warehouse. The decision follows findings that the company engaged in unfair labor practices, though Amazon intends to appeal the ruling.
- US NLRB rules Amazon must negotiate with Amazon Labor Union; Amazon plans to appeal β reuters.com
- Amazon must negotiate with 5,000 Staten Island warehouse workers after labor board ruling β cybernews.com
Dutch regulators demand total nudify ban beyond EU rules
Dutch regulators are calling for a total ban on “nudify” technology that exceeds existing European Union regulations. The proposal seeks to implement stricter controls to prevent the unauthorized creation of explicit content.
- Dutch regulators demand total nudify ban beyond EU rules β cybernews.com
US bill seeks DUV lithography export ban to China as chip equipment imports surge to ~$51B
U.S. lawmakers have introduced the bipartisan MATCH Act, which aims to tighten export controls on advanced semiconductor manufacturing equipment to China and other countries. The bill seeks to close existing loopholes to prevent China from establishing a domestic supply chain for critical AI chipmaking technology.
- US bill seeks DUV lithography export ban to China as chip equipment imports surge to ~$51B β nbcnews.com
Tech Companies Are Trying to Neuter Colorado’s Landmark Right-to-Repair Law
Colorado lawmakers have advanced bill SB26-090, which aims to exempt IT equipment used in critical infrastructure from the state’s existing right-to-repair laws. While tech manufacturers support the measure citing cybersecurity concerns, repair advocates warn that the bill’s vague language could restrict the repair of essential technologies like servers and routers.
Trump Administration Orders Dismantling of the U.S. Forest Service
The Trump administration has announced a major restructuring of the U.S. Forest Service, which includes relocating its headquarters to Salt Lake City and closing all ten regional offices. The plan also involves dismantling more than fifty research facilities, a move critics argue is intended to replace scientific expertise and career professionals with political appointees.
- Trump Administration Orders Dismantling of the U.S. Forest Service β morethanjustparks.substack.com
Adult German men must request permission to leave Germany for more than 3 months
Under Germany’s newly enacted Military Service Modernization Act, men aged 17 and older must obtain permission from the Bundeswehr to reside outside the country for more than three months. This regulation is part of a broader government initiative to reintroduce military registration and increase the nation’s troop strength by 2035.
‘Fatal decision’: EU slammed for caving to US pressure on digital rules
EU lawmakers are criticizing the European Commission’s plan to initiate discussions with the U.S. regarding digital regulations such as the Digital Services Act and Digital Markets Act. Critics warn that this dialogue could allow the Trump administration to influence EU tech laws, potentially undermining European sovereignty.
European alternatives to Google, Apple, Dropbox and 120 US apps
A new directory offers a curated selection of European software, products, and services as alternatives to major US companies like Google, Apple, and Dropbox. The platform highlights European-made solutions that prioritize strict standards for privacy, environmental sustainability, and product quality across various categories.
NHS staff resist Palantir software
NHS staff are boycotting Palantirβs Β£330 million Federated Data Platform due to ethical, privacy, and data security concerns regarding the company’s links to the US defense sector. This resistance, which includes reported work slowdowns, has prompted medical unions and MPs to call for the government to terminate the contract.
- NHS staff resist using Palantir software β go.theregister.com
- NHS staff refusing to use FDP over Palantir ethical concerns β freevacy.com
RFC 9948: Internet Protocol Police (IPP) - Schedule of Punishments
RFC 9948 establishes a formal schedule of punishments for violations of IETF community principles by the Internet Protocol Police (IPP). The document aims to provide transparency and accountability for disciplinary measures that were previously applied in an informal manner.
- RFC 9948: Internet Protocol Police (IPP) - Schedule of Punishments β rfc-editor.org
π Science & Society
iNaturalist
iNaturalist allows users to record biological observations that contribute to global biodiversity science repositories. The platform also enables individuals to connect with experts, participate in scientific projects, and engage with a community of naturalists.
- iNaturalist β inaturalist.org
Mercurial Dyson β a plan for the disassembly of planet Mercury
An engineering analysis explores the rapid disassembly of Mercury into Dyson swarm components using a self-replicating industrial seed. The study concludes that the process must eventually transition from Mercury-based mining to a larger heliocentric power and logistics system to overcome sunlight and waste heat constraints.
F-15E jet shot down over Iran
A US F-15E Strike Eagle was shot down over Iran during the ongoing five-week conflict. While one US service member has been successfully rescued, search and rescue operations are continuing to locate the second crew member.
- F-15E jet shot down over Iran β theguardian.com
U.S. fighter jet shot down in Iran, search underway for crew
A U.S. fighter jet has been shot down in Iran, resulting in the rescue of one crew member. Search efforts are currently ongoing for the remaining crew.
F-15E wreckage photos amid Iranian claims it shot down an American fighter
Iran claims its air defenses shot down a U.S. F-35 fighter jet, yet photographic evidence of wreckage appears to depict an F-15E Strike Eagle instead. It remains unconfirmed whether the images are authentic or if the aircraft was lost due to combat, a previous incident, or other causes.
The more evidence behind a therapy, the less the public trusts it
A growing trend in consumer health shows that public trust in medical therapies is increasingly inversely correlated with the volume of scientific evidence available. Consequently, many patients are abandoning proven, evidence-based treatments like statins in favor of unproven, unregulated substances promoted through online platforms and podcasts.
- The more evidence behind a therapy, the less the public trusts it β statnews.com
The Technocracy Movement of the 1930s
Led by Howard Scott, the 1930s Technocracy movement proposed replacing democratic governance with a centralized state managed by engineers focused on scientific efficiency. Although the movement’s popularity declined after Scottβs credentials were discredited, its core ideas regarding social engineering and resource management continue to find modern echoes.
- The Technocracy Movement of the 1930s β donotresearch.substack.com
Untaxed Wealth of Richest 0.1% Is More Than Assets of Worldβs Poorest Half
An Oxfam International report reveals that the world’s richest 0.1% are hiding more than $2.8 trillion in offshore tax havens to avoid taxation. This amount of untaxed wealth exceeds the total assets held by the bottom half of the global population. While global reforms have reduced the percentage of untaxed wealth, overall global inequality continues to increase.
- Untaxed Wealth of Richest 0.1% Is More Than Assets of Worldβs Poorest Half β commondreams.org
The open web isn’t dying, we’re killing it
The author argues that the decline of the open web is driven by a long-standing preference for the convenience of centralized platforms rather than just the recent rise of AI. The piece contends that users and creators have actively contributed to this enclosure by choosing the ease of private, walled gardens over the higher costs of maintaining an open web.
- The open web isn’t dying, we’re killing it β ouvre-boite.com
Tesla March car registrations soar in key European markets
Tesla’s car registrations surged in March, tripling in France and more than doubling in several Nordic countries. This recovery in European sales follows the rollout of more affordable versions of the Model Y and Model 3.
- Tesla March car registrations soar in key European markets β reuters.com
What are you doing this weekend?
Individuals are invited to share their upcoming weekend plans or seek feedback on their activities. The post also emphasizes that having no plans is perfectly acceptable.