Front-page articles summarized hourly.
HBO obtained a DMCA subpoena ordering X Corp. to identify the person behind the Euphoria spoiler account @maudesfancat (Lexi howard’s cat) that allegedly posted spoilers for unaired Season 3. It follows prior takedown notices from Warner Bros. Discovery in March. The subpoena, filed April 8 in the Northern District of California, seeks identifying information (names, addresses, IPs, etc.) and X has until April 23 to respond; both X and the account holder can challenge. The account appears now offline. Bentkover describes the material as summaries of unpublished episodes, which may affect copyright considerations.
An article outlining a repeatable template for writing engaging, skimmable content: cryptic, action‑oriented title; bold opening line; guiding second sentence and a tantalizing third; background with a prior-art link; segues and subheadings with bolded concepts; concise, context-rich paragraphs; a short attention grabber; detailed sections with bullet lists and an ordered set of instructions; deeper technical parts with code and comments; a concluding synthesis that ties the parts together; trust-building and peer-resource links; published April 9, 2026.
Twill automates software delivery with AI agents that read the codebase, plan, implement, build, test in sandbox, and open PRs around the clock. The fixed pipeline requires your approval before code runs. Assign tasks to agents (Claude, OpenCode, Codex), run multiple agents in parallel or repeat runs, and compare outputs. Agents spin up isolated sandboxes with logs and ports and SSH debugging. Integrates with GitHub, Linear, Slack; templates enable recurring workflows across GitHub, GCP, AWS, Sentry, Notion. No credit card required.
In the Lords, a government amendment to ban porn depicting sex acts between stepfamily members (step-incest) passed 144–143. The reform, led by Gabby Bertin, would criminalise possession or publication of such material, including impersonating someone under 18, with penalties of 2–5 years’ imprisonment. Some ministers opposed, noting enforcement challenges since English and Welsh law currently allows consensual step-relations. The move also follows plans to amend the crime and policing bill to hold tech bosses liable if platforms fail to remove non-consensual intimate images, with a 48‑hour removal rule and potential executive penalties.
Let’s Encrypt explains the challenge of ensuring a website serves a revoked or expired certificate for testing. They built a Go-based test-certs-site using Lego and ACME to host three sites per root certificate: valid, expired, and revoked. Revoked certs require CRL propagation (up to an hour); expired certs may wait until their date (often days). The system uses TLS-ALPN-01, an in-memory Go TLS server, and a “next” certificate to avoid premature switches. Four root certs (X1, X2, YE, YR) have corresponding test sites. Code is open-source; ISRG sponsors.
Freya India argues social media’s design feminises user behavior across sexes, turning everyone into emotionally reactive, adolescent-like critics. Since the early 2010s, platforms reward rumination, indirect aggression, and reputation management, shaping discourse from politics to dating and beauty. The trend isn’t limited to wokism; men and women converge on teen-girl patterns—self-surveillance, co-rumination, gossip, and performative appearance. Teen girls are the heaviest users, pulling others into the cycle, and adults are becoming infantilised. She calls for resisting mean-girl culture and dignity online to protect future generations.
An overview of building Clojure-like features for Fennel/Lua, via fennel-cljlib and the ClojureFnl prototype. The author rebuilt immutable data structures—HAMT-based persistent maps/sets, vectors with bit-partitioned tries, and a persistent red-black tree—plus lazy linked lists and a persistent queue. He moved from earlier copy-on-write hacks to a library (immutable.fnl) with transients and efficient interop, benchmarked against Lua tables, and salted hash keys to avoid collisions. The work aims to support a Clojure-to-Fennel compiler; the next post will cover the compiler itself.
Bild AI, a YC-backed early-stage startup building blueprint understanding, seeks a Founding Product Engineer (SF, full-time). Responsibilities: own end-to-end features, interview customers weekly, ship features quickly; build UI to simplify complex blueprint data; work full stack (React frontend, Python backend + infra); influence product direction; growth-minded, customer-facing. Bonus: construction background or startup founder experience. Compensation: $100k-$180k salary, 0.20%-0.80% equity. Interview: 15-min intro, 1h whiteboard, 1h coding, 3–5 day paid trial. Location: SF or willing to relocate; founders Roop Pal and Puneet Sukhija.
Keychron-Keyboards-Hardware-Design offers production-grade industrial design files for Keychron keyboards and mice, with 100+ models and CAD assets in STEP, DXF, DWG, and PDF. The repository is source-available; personal and educational use is allowed, and commercial use is permitted for compatible accessories within license terms. Users can study real designs, remix plates and cases, and develop compatible add-ons. Prohibitions: you may not copy or sell Keychron keyboards/mice or use Keychron trademarks as your own branding. Includes organized model directories, docs, and contribution guidelines.
Amid Broadcom’s VMware takeover, rivals claim mass migration to alternatives like Nutanix, with Nutanix CEO Rajiv Ramaswami stating about 30,000 VMware customers moved to Nutanix—especially in mid-market. Western Union is migrating 900–1,200 apps across 3,900 cores but reports challenges partnering with Broadcom and push to VMware Cloud Foundation. Microsoft Hyper-V and Proxmox are also wooing customers. Gartner projects about 35% of VMware workloads off by 2028. Despite migrations, Broadcom says the transition is a success, noting most large vSphere customers bought VCF and guiding a ~9% Q2 software revenue rise to $7.2B.
Freestanding vs hosted C++: freestanding runs without an OS; hosted assumes OS. Distinctions include concurrency, main(), standard headers, and OS services. In freestanding, startup/termination runs but details are implementation-defined; some features like heap, exceptions may be unavailable. The standard guarantees a small subset of library: headers like <cstdint>, <cstddef>, <limits>, <type_traits>, and parts of <new>; but no <thread>, <filesystem>, typically no <iostream>. Since C++20–C++26, the freestanding subset has expanded, adding features like std::span, std::expected, std::mdspan, and smart-pointer adapters, enabling more expressive code in constrained environments. The goal: make modern C++ usable in embedded/bare-metal contexts.
France plans to move some government computers from Windows to Linux to reduce reliance on U.S. tech and regain control of its digital destiny. Linux is open source and free, with various distributions. The switch will begin with machines at the digital agency DINUM; timelines and distributions are undisclosed. Microsoft did not comment. The move fits broader Europe-wide digital sovereignty efforts and follows EU moves to cut reliance on foreign providers, including migrating health data to a trusted platform and replacing Teams with a French/open-source tool based on Jitsi.
Bluesky’s Monday outage hit about half its users for ~8 hours. Root cause: a data-plane GetPostRecord endpoint lacked bounded concurrency, while a new internal service sent huge batches (15–20k URIs), overwhelming memcached and exhausting ports. Logging these errors caused a death spiral: blocking logs drove many OS threads, triggered long GC pauses, and led to intermittent OOMs and TIME_WAIT port exhaustion. A temporary fix used a random loopback dialer to expand ports. Root cause fixed by Wednesday; plan to improve observability and per-client metrics/tracing. Status page blamed a 3rd party provider; apology.
Attackers compromised CPUID’s backend for about six hours (April 9–10), swapping trusted download links for malware (affecting HWMonitor, CPU-Z). The signed installers were not altered, but users hitting the window downloaded malicious payloads. The 64‑bit HWMonitor variant used a fake CRYPTBASE.dll, reached a C2, and operated mostly in memory via PowerShell with .NET payloads and process injection, also targeting browser data through Chrome’s IElevation interface. The activity appears linked to a broader campaign. CPUID says the breach is fixed; exact scope and impact remain unclear.
1D-Chess is a minimalist chess variant where White plays an AI. The board uses three pieces: King (one square in any direction), Knight (two squares forward/back, jumping), and Rook (straight line any direction). Objective: checkmate the opponent king. Draws can occur via stalemate, threefold repetition, insufficient material (only kings), or repetition of a position. The rules include a sample move sequence. The variant was first described by Martin Gardner in Scientific American's July 1980 Mathematical Games column (cited on JSTOR).
WireGuardNT v0.11 and WireGuard for Windows v0.6 released. Adds removal of individual allowed IPs without dropping packets and very low IPv4 MTUs. Focuses on bug fixes, performance improvements, and code streamlining by raising the minimum supported Windows version. Toolchain updates (EWDK driver, Clang/LLVM/MingW, Go for UI) and EV signing. Test on Windows 10 1507 Build 10240; built-in updater and ~80 KB fetcher handle installs. Installers and project pages available. Microsoft signing hiccup resolved; account unblocked.
Helium, a byproduct of natural gas, faces supply risk after the Strait of Hormuz closure. Qatar provides about one-third of global supply; prices surged and force majeure was declared. The US sold its strategic helium reserve in 2024. Helium’s unique low boiling point and inertness limit substitutes, making many applications hard to replace. Major uses: MRI (~17% US demand), semiconductors (~25%), fiber optics (~5–6%), aerospace purging (~7%), lifting gas (~18%), diving (~5%), welding (~8%), and science. Recycling can dramatically cut use (notably aerospace and MRI); expanding production and policy could ease supply constraints.
An analysis showing that Privacy & Security 'Files & Folders' permissions aren’t trustworthy reflections of real access. The author uses an app, Insent, to show that with 'Open by consent' macOS prompts for Documents, but with 'Open from folder' it gains access via user intent without further consent. Even after disabling Documents in Settings, Insent can still read a Documents folder; only resetting TCC via tccutil reset All co.eclecticlight.Insent and restarting blocks it. The result: apps can retain or gain access to protected folders despite what the Privacy & Security UI shows, undermining trust in the controls.
Proton Mail introduces Born Private, letting parents reserve a private first email address for their child to start online with privacy. With 43% of under-18s already having an email and 74% of those using Gmail, children often begin digital life inside ad-supported systems. The reserved inbox stays sealed for up to 15 years—no data, no activity logs, no profiling—and is activated later with a secure voucher. A small donation (from $1) supports the Proton Foundation. Proton emphasizes end-to-end encryption, Switzerland-based privacy protections, and an open-source codebase as safer alternatives to Big Tech.
The article discusses potential supply‑chain attacks on Rust and offers strategies to mitigate the inevitable risks.
Made by Johno Whitaker using FastHTML