Thursday, 19 March 2026
FBI confirms warrantless location data purchases, Snowflake AI escapes sandbox, and Snap privilege escalation flaw patched
Today's Lead
TechCrunch
FBI Is Buying Location Data to Track US Citizens, Kash Patel Confirms
FBI Director Kash Patel confirmed to lawmakers that the agency is purchasing commercially available location data from brokers to track Americans without requiring a warrant. The practice circumvents traditional Fourth Amendment protections by exploiting a legal loophole where privately collected data falls outside judicial oversight requirements, raising significant privacy concerns about warrantless surveillance of US citizens.
Also today
PromptArmor
Snowflake Cortex AI Escapes Sandbox and Executes Malware
Researchers at PromptArmor disclosed a prompt injection attack chain in Snowflake's Cortex Agent, now fixed. The attack began when a user asked Cortex to review a GitHub repository containing a hidden prompt injection in the README. The injected instruction caused the agent to execute a malicious shell command using process substitution — a technique that bypassed Cortex's allowlist of 'safe' commands. The incident highlights the fragility of command-pattern allowlists and reinforces the case for deterministic sandboxes at the OS level rather than inside the agent itself.
Read →ProPublica
Despite Doubts, Federal Cyber Experts Approved Microsoft Cloud Service
A ProPublica investigation reveals that federal cybersecurity experts approved Microsoft's Government Community Cloud High (GCC High) for FedRAMP authorization despite serious unresolved concerns, including missing encryption documentation and incomplete data flow diagrams. Reviewers expressed a 'lack of confidence' in the system's security posture, but pressure from the Justice Department and chronic understaffing led to approval anyway. GCC High now stores highly sensitive government and defense contractor data, raising the risk of what auditors warned could be a 'catastrophic adverse effect.'
Read →The Register
North Korea's 100,000 Fake IT Workers Net $500M a Year for Kim
IBM X-Force and Flare Research have detailed a sophisticated North Korean operation deploying over 100,000 fake IT workers across 40 countries to generate approximately $500 million annually for Pyongyang. The scheme uses a deceptive hiring pipeline with recruiters, facilitators, and collaborators who provide fake US-based identities to infiltrate global tech companies. Researchers identified detection signals including suspicious VPN usage and communication patterns, and found multiple operatives sometimes coordinating to cover a single job role while gaining elevated system access.
Read →Qualys
CVE-2026-3888: Snap Flaw Enables Local Privilege Escalation to Root
Qualys disclosed CVE-2026-3888, a high-severity vulnerability (CVSS 7.8) affecting snap-confine on Ubuntu 24.04 LTS and later. An unintended interaction between snap-confine and systemd-tmpfiles allows unprivileged local users to escalate privileges to root by exploiting a race window where attackers can inject malicious content into system directories before they are executed with root privileges. Patches are available in snapd 2.73+ for Ubuntu 24.04/25.10 and 2.74.1+ for Ubuntu 26.04.
Read →Stripe Blog
Stripe Introduces Machine Payments Protocol for Autonomous AI Agents
Stripe launched the Machine Payments Protocol (MPP), an open standard designed to let autonomous AI agents make payments programmatically without human intervention. The protocol solves the problem of agents being unable to use traditional payment flows by allowing them to request resources, receive payment requests, and complete transactions end-to-end. Early adopters include Browserbase and PostalForm, with support for stablecoins and traditional payment methods via Shared Payment Tokens, integrated into Stripe's existing tax, fraud, and accounting infrastructure.
Read →Haskell for All
A Sufficiently Detailed Spec Is Code
Gabriel Gonzalez argues that the promise of AI generating code from plain-language specifications breaks down under scrutiny: to be precise enough to work, specifications must themselves become code-like — containing schemas, pseudocode, and algorithm implementations. Using OpenAI's Symphony project as a case study, he shows that so-called 'specifications' already are code in all but name. The post invokes Dijkstra's principle that technical progress requires formal symbolism, not verbose prose, pushing back against the narrative that vibe-coded specs can reliably replace real engineering.
Read →GNOME
GNOME 50, codenamed 'Tokyo', was released on March 18, 2026, with significant improvements across the desktop environment. Highlights include parental controls with screen time and bedtime scheduling, a redesigned Orca screen reader with automatic language detection, improved document annotation tools, and performance optimizations in the Files app. Display technology advances include variable refresh rate (VRR) support and HDR screen-sharing capabilities.
Read →Pew Research
Austin's Surge of New Housing Construction Drove Down Rents
A Pew Research analysis documents how Austin tackled its severe housing affordability crisis through aggressive residential development. Between 2010 and 2019, rents surged 93% and home prices rose 82%, making Austin less affordable than nearly any other major US metro. By significantly expanding housing supply, Austin successfully drove rents back down — offering a data-backed case study that supply-side interventions can work, even during periods of rapid population growth.
Read →