Techmeme
April 15, 2022, 5:05 PM

Top News

Axios:
Twitter adopts a “poison pill” to thwart Elon Musk's $43B takeover, giving shareholders time to purchase additional shares at a discount to dilute 15%+ stakes  —  Twitter's board on Friday enacted a defensive measure meant to deter Elon Musk's $43 billion hostile takeover bid.
Matt Levine / Bloomberg:
Elon Musk's hostile offer may not be viable, but it opens Twitter to an acquisition; should Twitter fend off Musk, the company will watch its stock drop  —  Oh Elon  —  Well that was weird.  On Tuesday I wrote a column saying it was unlikely that Elon Musk will buy Twitter Inc. On Wednesday I left on a family vacation.
@yishan:
[Thread] Ex-Reddit CEO warns Elon Musk that he doesn't understand current internet culture enough to handle the challenges of large social networks like Twitter  —  I've now been asked multiple times for my take on Elon's offer for Twitter. So fine, this is what I think about that. I will assume the takeover succeeds, and he takes Twitter private. (I have little knowledge/insight into how actual takeover battles work or play out) (long 🧵)
@rabble:
[Thread] After Bill Gross' 2015 hostile takeover attempt, Twitter locked down the API and limited third-party clients to 100K users until Jack Dorsey's return  —  Twitter is important, but it's always been vulnerable as a company. When Twitter does something which upsets the community of users, it is often due to this vulnerability. Let me tell you a little known story about an earlier time a billionaire tried a hostile takeover of twitter
Bloomberg:
Mia Sato / The Verge:
Wayne Ma / The Information:
Sources: Apple doesn't collect much user data from its services and staff can't easily access the data it does collect, making it harder to compete with rivals  —  Privacy is one of the selling points of Apple products.  But for employees who develop these products, it can be a pain.
Mark Gurman / Bloomberg:
Developer App Store logs and sources: Apple is testing third-party apps on four M2 chips across a MacBook Air, a Mac mini, three MacBook Pros, and a Mac Pro  —  Apple Inc. has started widespread internal testing of several new Mac models with next-generation M2 chips, according to developer logs …
Jeff Burt / The Register:
Google updates Chrome to fix a type confusion vulnerability actively exploited in the wild and another security flaw, the third Chrome emergency patch in 2022  —  The latest patch is aimed at a type confusion vulnerability that is actively being exploited  —  Google is issuing fixes …
Cristina Criddle / Financial Times:
Sources: TikTok is under investigation by US government agencies over its handling of CSAM and how a specific privacy feature is being exploited by predators  —  Short-video app with young user base accused of being ‘perfect place for predators’ by Homeland Security
Lorenzo Franceschi-Bicchierai / VICE:
A look at independent investigators, like @zachxbt and YouTuber @coffeebreak_YT, who are uncovering crypto and Web3 scams, often using pseudonymous identities  —  A handful of skilled independent investigators are uncovering high profile scams and hacks in the crypto and web3 world.
Nikhilesh De / CoinDesk:
An interview with Senator Cynthia Lummis on advocating for the crypto industry, educating members of Congress, buying $100K+ in bitcoin and holding, and more  —  The Wyoming senator, a speaker at CoinDesk's Consensus festival, holds plenty of BTC and champions crypto whenever she can.

Sponsor Posts

Google:
Try Gemini 3 Pro  —  Google's newest and most intelligent AI model that helps you bring any idea to life
Shopify:
Shopify's new AI commerce stack  —  Their VP of Product digs into just-launched products to help entrepreneurs and developers build with the latest AI and tech.
Zoho:
Enhancements to Zoho Writer's automation flow designer: New PDF operations, password protection, and more  —  Once we rolled out the automation flow designer in Zoho Writer's merge templates …
IDrive:
Protecting your Cloud Applications Data  —  Backing up Office 365, Google Workspace, Dropbox & Box data is critical to preventing data loss or corruption, complying with laws and avoiding critical downtime in case of a disaster.

Featured Podcasts

Big Technology Podcast:
2025 In Review, 2026 Predictions — With Reed Albergotti
The Big Technology Podcast takes you behind the scenes in the tech world featuring interviews with plugged-in insiders and outside agitators.
Subscribe to Big Technology Podcast.
Channels with Peter Kafka:
Podcast Pioneer PJ Vogt's Second Act: Less Budget, More Control
Media and tech aren't just intersecting - they're fully intertwined. To understand how those worlds work, Peter Kafka talks to industry leaders, upstarts and observers.
Subscribe to Channels with Peter Kafka.
BG2 Pod:
AI Enterprise - Databricks & Glean
Open-source podcast on all things tech, markets, investing, and capitalism, hosted by Brad Gerstner.
Subscribe to BG2 Pod.
Great Chat:
The stories we told ourselves in 2025
A podcast mostly about tech. Brought to you weekly by Angela Du, Sally Shin, Mac Bohannon, Helen Min, and Ashley Mayer.
Subscribe to Great Chat.
Grit:
How Brands Stay Visible When AI Decides | Profound CEO James Cadwallader
Grit explores what it takes to create, build and scale world-class organizations.
Subscribe to Grit.
Tools and Weapons with Brad Smith:
Ted Sarandos: Netflix and how tech changed storytelling
Microsoft Vice Chair and President Brad Smith speaks with leaders in government, business, and culture to explore the most critical challenges at the intersection of technology and society.
Subscribe to Tools and Weapons with Brad Smith.
 

About This Page

This is a Techmeme archive page. It shows how the site appeared at 5:05 PM ET, April 15, 2022.

The most current version of the site as always is available at our home page. To view an earlier snapshot click here and then modify the date indicated.

More News

Earlier Picks

CoinDesk:
Sarah Perez / TechCrunch: