Friday, 03 April 2026

LinkedIn caught scanning browser extensions, Google drops Gemma 4 open models, and Cursor 3 launches multi-agent workspace

Today's Lead

BrowserGate (Fairlinked e.V.)

LinkedIn Is Illegally Searching Your Computer

A campaign called BrowserGate alleges that LinkedIn executes hidden code on users' computers to detect installed software and competing applications, transmitting sensitive data to LinkedIn servers and third parties without user consent. The unauthorized scanning reportedly captures personal information including religious beliefs, political opinions, and job search activity, while also conducting competitive intelligence by identifying over 200 competing products. The campaign claims LinkedIn is violating EU Digital Markets Act regulations and features invisible tracking elements from HUMAN Security and Google executing on every page load — and is now collecting evidence to support legal proceedings.

Read →

Also today

Google DeepMind

Gemma 4: Google DeepMind's Most Capable Open Models Yet

Google DeepMind released Gemma 4, a new family of open-source AI models built from Gemini 3 research and optimized for intelligence-per-parameter efficiency. The lineup spans from ultra-lightweight E2B and E4B variants for mobile and IoT devices, up to 26B and 31B parameter models for personal computers. The 31B model achieves 1452 on Arena AI, 85.2% on multilingual MMLU, 89.2% on AIME 2026 mathematics, and 80.0% on competitive coding, while adding native multimodal support for audio and visual reasoning, function calling for agentic use, and 140-language coverage. Models are available on Hugging Face, Ollama, Kaggle, and Vertex AI.

Read →

Cursor Blog

Cursor 3: Unified Workspace for Multi-Agent Development

Cursor released version 3, repositioning itself as a unified workspace for agent-driven software development. The central addition is multi-agent management — developers can run multiple agents in parallel from a single interface with oversight across mobile, web, desktop, Slack, GitHub, and Linear integrations. A local-to-cloud handoff feature lets cloud agents produce demos and screenshots for verification while background work continues offline. The release also ships enhanced diff viewing and pull request management for streamlined commit workflows, alongside a full IDE feature set including language server protocol support, an integrated browser for local testing, and hundreds of extensible plugins.

Read →

The Register

Renewables Reach 49.4% of Global Installed Electricity Capacity

Renewable energy sources hit a historic milestone in 2025, accounting for 49.4% of installed global electricity capacity according to IRENA's latest Renewable Capacity Statistics report. Of the 692 GW of new capacity added globally, renewables represented 85.6%, with solar comprising nearly three-quarters of those additions — a record 15.5% year-over-year growth rate. Variable renewables (solar and wind) now sit at approximately 35% of total installed capacity, bringing cumulative renewable capacity to 5.15 TW. IRENA warns the world still needs to reach 11 TW by 2030 to meet climate pledges, and notes that fossil fuel additions nearly doubled in 2025 compared to 2024.

Read →

TechCrunch

Delve Allegedly Forked an Open Source Tool and Sold It as Its Own

YC-backed compliance and AI agent startup Delve faces mounting reputational damage after allegations it violated open source licensing by misappropriating a customer's tool from Sim.ai without respecting the associated license terms. The incident compounds prior controversies involving Delve's security compliance work on the LiteLLM project, which was previously impacted by a malware incident. The pattern of alleged infractions across multiple incidents is eroding stakeholder trust in the company and raising broader questions about YC-backed startups operating in the AI security and compliance space.

Read →

slicker.me

Modern SQLite: Six Powerful Features Most Developers Overlook

A deep dive highlights six underutilized SQLite features that bring it closer to full database engines: JSON storage and querying natively, Full-Text Search (FTS5) for indexing without external services, window functions and CTEs for complex analytical queries, Strict Tables for enforced type constraints, Generated Columns for auto-computed derived data, and Write-Ahead Logging (WAL) mode that removes reader-writer blocking. Together these capabilities make SQLite a viable choice for local-first applications, desktop tools, and small services without sacrificing the simplicity of a single-file database.

Read →

Tailscale Blog

Escaping the Notch: Tailscale Launches a New Windowed macOS Interface

Tailscale's macOS menu bar icon was intermittently hidden behind the notch on newer MacBook Pro models, an issue that proved tricky to solve reliably — initial detection via `occlusionState` triggered false positives from unrelated events like lid opens and monitor switches. The permanent fix, shipped in version 1.96.2, is a new windowed macOS application that runs alongside the menu bar icon, offering a searchable device list, Taildrop file transfers, exit node switching, and a compact 'mini player' mode. The windowed interface reduces hard dependency on the menu bar entirely, providing a more robust and featureful experience regardless of display configuration.

Read →

Dropbox Tech

How Dropbox Reclaimed Exabyte-Scale Storage Efficiency in Magic Pocket

Dropbox's Magic Pocket immutable blob store suffered severe storage fragmentation after a new Live Coder service inadvertently created volumes with less than 5% capacity utilization, spreading live data across far more disks than necessary at exabyte scale. The team responded with a three-layer compaction strategy: L1 handles steady-state consolidation, L2 uses dynamic programming to group moderately under-filled volumes into dense destinations, and L3 runs a streaming pipeline to drain the sparsest outliers first. The layered approach reduced storage overhead by 30–50% within weeks and revealed that single-heuristic compaction strategies break down at scale — a dynamic control loop for host eligibility thresholds now adjusts automatically to fleet conditions to prevent future incidents.

Read →

Ben Hoyt

Every Dependency You Add Is a Supply Chain Attack Waiting to Happen

Ben Hoyt argues that dependency minimalism is a core security practice, pointing to real incidents including the XZ backdoor and compromises of Trivy and LiteLLM. He draws a sharp distinction between the initial vetting of a dependency — where hash pinning provides reasonable protection — and automatic update tools like Dependabot, which receive minimal scrutiny and create continuous vulnerability windows. His recommendations: disable automatic dependency updates, prefer older stable versions over constant churn, and exercise genuine restraint before adding new dependencies at all. Even dev-only dependencies carry credential theft risks, and the default posture should be skepticism rather than convenience.

Read →