Skip to main content

Question archive

Each day, we pose a question inspired by the daily news brief and answer it using our database of indexed AI/ML articles. Browse and search past questions below.

2026-04-13

Why does putting facial recognition in smart glasses change abuse risk more than putting it in a phone?

Wearables shift facial recognition from an intentional “capture event” to passive, always‑on sensing, collapsing bystander notice/consent and enabling continuous ID at scale.

2026-04-12

How does OpenAI’s plan shift the tax base from human wages to automated labor profits?

The shift works by re-anchoring revenue collection on AI’s ownership layer—corporate income/capital gains—capturing automation value even when payroll shrinks.

2026-04-11

What makes Musk’s OpenAI suit a control fight—removing leaders and rerouting money—more than a damages case?

By seeking leader removal and profit reallocation, the suit targets OpenAI’s governance plumbing—who controls the entity and where surplus flows—over damage valuation.

2026-04-10

Why does targeting infinite scroll and push notifications matter more than targeting teen posts in the Meta lawsuits?

Attacking engagement mechanics (infinite scroll, notifications) targets Meta’s own product conduct—outside Section 230’s user-content shield—so liability anchors on design control.

2026-04-09

How did “sovereign UK compute” collapse into an electricity-and-grid-connection problem for 8,000 GPUs?

“Sovereign compute” fails when data-center build timelines decouple from grid-connection lead times, turning GPU scale into a power+permitting scheduling constraint.

2026-04-08

Which “durable advantage” matters more in an AI rebound—chip leadership, ad-driven AI monetization, or defense-adjacent analytics?

In AI rebounds, “durability” tracks control of scarce compute supply via custom-chip contracts, which locks in future demand before ad/analytics monetization shows up.

2026-04-07

Why do APT28 router DNS hijacks turn “TLS is safe” into a credential-harvesting advantage?

DNS hijack moves the attack below TLS: by controlling name→IP resolution, attackers proxy “valid” TLS to steal OAuth tokens and creds without endpoint malware.

2026-04-06

How did one La7 copyright claim cascade into blocking NVIDIA’s own DLSS 5 announcement video?

YouTube’s Content ID keys ownership to the first registered/broadcast fingerprint, not provenance, so a rebroadcaster can “claim” the hash and auto-block the creator.

2026-04-05

Why is a French LLM lab negotiating “AI memory” supply with Samsung like a chipmaker, not a cloud buyer?

As LLM labs build their own EU compute, memory becomes a binding scaling input, so they buy HBM supply like OEMs to lock capacity in a tight market.

2026-04-04

Why buy an AI‑biology startup for $400M in stock instead of just hiring a few specialists?

Buying the startup captures a cohesive “capability bundle”—domain-tuned models plus the team and workflow—faster than hiring, since tacit know‑how isn’t separable.