Technology
Who is Soham Parekh, the serial moonlighter Silicon Valley startups can’t stop hiring?

In the last week, social media users have shared dozens of stories about encounters with Soham Parekh, a software engineer who seems to have been simultaneously working at multiple Silicon Valley startups — unbeknownst to the companies — for the last several years.
But who is Parekh, how did he pull off his career as a serial moonlighter, and why can’t Silicon Valley get enough of him?
Origins of virality
The saga all started when Suhail Doshi — CEO of image generation startup Playground AI — shared a post Tuesday on X that began: “PSA: there’s a guy named Soham Parekh (in India) who works at 3-4 startups at the same time. He’s been preying on YC companies and more. Beware.”
Doshi claims that, roughly a year ago, he fired Parekh from Playground AI after he found out he was working at other companies. “[I] told him to stop lying/scamming people. He hasn’t stopped a year later,” Doshi wrote.
That post from Doshi received roughly 20 million views and prompted several other founders to share their run-ins with Parekh as well.
Flo Crivello, the CEO of Lindy, a startup that helps people automate their workflows with AI, said he hired Parekh in recent weeks, but fired him in light of Doshi’s tweet.
Matt Parkhurst, the CEO of Antimetal, a startup that does automated cloud management, confirmed that Parekh was the company’s first engineering hire in 2022. Parkhurst tells TechCrunch that Antimetal let Parekh go in early 2023 after they realized he was moonlighting at other companies.
Parekh also seems to have worked at Sync Labs, a startup that makes an AI lip-synching tool, where he even starred in a promotional video. He was ultimately let go.
At some point, Parekh applied to several Y Combinator-backed startups. Haz Hubble, the co-founder of Pally AI, a Y Combinator-backed startup building an “AI relationship management platform,” says he offered Parekh a founding engineer role. Adish Jain, the co-founder of YC-backed Mosaic — an AI video editing startup — said he interviewed Parekh for a role, too.
TechCrunch has reached out to these companies for comment, but they did not immediately respond.
It turns out that Parekh did quite well in many of these interviews and received offers, largely because he’s a gifted software engineer.
For instance, Rohan Pandey, a founding research engineer of the YC-backed startup Reworkd, told TechCrunch that he interviewed Parekh for a role and he was a strong candidate. Pandey, who is no longer with the startup, says Parekh was one of the top three performers on an algorithms-focused interview they gave candidates.
Pandey said the Reworkd team suspected something was off with Parekh. At the time, Parekh told Reworkd he was in the U.S. — a requirement for the job — but the company didn’t believe him. They ran an IP logger on a Zoom link from Parekh and located him in India.
Pandey recalled other things Parekh said often didn’t add up, and some of his GitHub contributions and previous roles didn’t quite make sense either. That seems to be a common experience when dealing with Parekh.
Adam Silverman, co-founder of the AI agent observability startup, Agency, told TechCrunch his company also interviewed Parekh. Silverman said Parekh sent him a cold DM about a job opening at Agency, and they set up a meeting. Parekh had to reschedule that meeting five times, according to Silverman and emails from Parekh viewed by TechCrunch.
Silverman says he was also impressed by Parekh’s technical ability, but in the interview, he insisted on working remotely. Much like with Reworkd, that was a red flag for Agency.
Roy Lee, the CEO of the “cheat on everything” AI startup, Cluely, tells TechCrunch he interviewed Parekh twice for a role. Lee said Parekh interviews quite well and “seemed to have strong react knowledge,” referencing a popular JavaScript library for building user interfaces.
Lee says Cluely did not end up hiring Parekh. However, several other companies clearly did.
Parekh’s perspective
Parekh made an appearance on the Technology Business Programming Network (TBPN) on Thursday to tell co-hosts John Coogan and Jordi Hays his side of the story and explain why he’s worked at so many companies.
He admitted that he’s been working at multiple jobs simultaneously since 2022. Parekh claims he was not using AI tools or hiring junior software engineers to assist him with his workload.
All that work has made Parekh a much better programmer, he believes, but notes that it’s taken a toll.
Parekh said he’s notorious among his friends for not sleeping. He repeated several times throughout the interview that he works 140 hours a week, which comes out to 20 hours a day, seven days a week. That seems to be borderline impossible — or at the very least, extremely unhealthy and unsustainable.
Parekh also said he took multiple jobs because he was in “financial jeopardy,” implying he needed all the income he could get from his various employers. He claims he deferred going to a graduate school program he had been accepted to, and instead decided to work at several startups simultaneously.
Notably, Doshi shared a copy of Parekh’s resumé that claims he received a masters degree from Georgia Institute of Technology.
When TBPN’s co-hosts asked why Parekh didn’t just ask one company to raise his salary and help with his financial struggles, Parekh said he liked to keep a boundary between his professional and private life. (But he had also opted for low salaries and high equity at all his jobs, which doesn’t quite add up with his financial crisis story. However, Parekh declined to share more about it.)
Parekh told the hosts he genuinely loved his work, and it was not solely about the money. He says he was very invested in the missions of all the companies where he worked.
He also admitted that he’s not proud of what he’s done, and he doesn’t endorse it.
What now?
Some are calling Parekh a scam artist and a liar, but in classic Silicon Valley fashion, Parekh appears to be trying to turn his viral moment into a business.
Parekh announced his newest employer, which he claims to be exclusively working at: Darwin Studios, a startup working on AI video remixing.
However, Parekh quickly deleted the post after announcing it, as did the founder and CEO of the startup, Sanjit Juneja.
TechCrunch has reached out to Parekh requesting an interview regarding this article, however, he has not yet accepted. Instead, a spokesperson representing him sent TechCrunch a statement from Darwin’s CEO.
“Soham is an incredibly talented engineer and we believe in his abilities to help bring our products to market,” said Juneja.
We’ve seen countless startups turn their viral, often controversial, moments into businesses in the last year. One of the most famous is Cluely, which is known for creating provocative marketing campaigns. It’s rage bait, but it’s attention-grabbing, and it was enough to land Cluely a $15 million seed round from Andreessen Horowitz.
Perhaps Parekh will land a similar fortune in the future.
Update: This story has been updated to reflect TBPN’s current name and include additional comments from Antimetal.

A blog which focuses on business, Networth, Technology, Entrepreneurship, Self Improvement, Celebrities, Top Lists, Travelling, Health, and lifestyle. A source that provides you with each and every top piece of information about the world. We cover various different topics.
Technology
Chinese authorities are using a new tool to hack seized phones and extract data

Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more.
On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.
Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn’t know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool’s existence and the risks it poses.
“It’s a big concern. I think anybody who’s traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that’s on it could be collected,” Kristina Balaam, a researcher at Lookout who analyzed the malware, told TechCrunch ahead of the report’s release. “I think it’s something everybody should be aware of if they’re traveling in the region.”
Balaam found several posts on local Chinese forums where people complained about finding the malware installed on their devices after interactions with the police.
“It seems to be pretty broadly used, especially from what I’ve seen in the rumblings on these Chinese forums,” said Balaam.
The malware, which must be planted on an unlocked device, and works in tandem with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico’s website.
Balaam said Lookout couldn’t analyze the desktop component, nor could the researchers find a version of the malware compatible with Apple devices. In an illustration on its website, Xiamen Meiya Pico shows iPhones connected to its forensic hardware device, suggesting the company may have an iOS version of Massistant designed to extract data from Apple devices.
Police do not need sophisticated techniques to use Massistant, such as using zero-days — flaws in software or hardware that have not yet been disclosed to the vendor — as “people just hand over their phones,” said Balaam, based on what she’s read on those Chinese forums.
Since at least 2024, China’s state security police have had legal powers to search through phones and computers without needing a warrant or the existence of an active criminal investigation.
“If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it,” said Balaam. “I don’t think we see any real exploits from lawful intercept tooling space just because they don’t need to.”

The good news, per Balaam, is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer.
The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person’s data.
According to Lookout, Massistant is the successor of a similar mobile forensic tool, also made by Xiamen Meiya Pico, called MSSocket, which security researchers analyzed in 2019.
Xiamen Meiya Pico reportedly has a 40% share of the digital forensics market in China, and was sanctioned by the U.S. government in 2021 for its role in supplying its technology to the Chinese government.
The company did not respond to TechCrunch’s request for comment.
Balaam said that Massistant is only one of a large number of spyware or malware made by Chinese surveillance tech makers, in what she called “a big ecosystem.” The researcher said that the company tracks at least 15 different malware families in China.

A blog which focuses on business, Networth, Technology, Entrepreneurship, Self Improvement, Celebrities, Top Lists, Travelling, Health, and lifestyle. A source that provides you with each and every top piece of information about the world. We cover various different topics.
Technology
Meta fixes bug that could leak users’ AI prompts and generated content

Meta has fixed a security bug that allowed Meta AI chatbot users to access and view the private prompts and AI-generated responses of other users.
Sandeep Hodkasia, the founder of security testing firm Appsecure, exclusively told TechCrunch that Meta paid him $10,000 in a bug bounty reward for privately disclosing the bug he filed on December 26, 2024.
Meta deployed a fix on January 24, 2025, said Hodkasia, and found no evidence that the bug was maliciously exploited.
Hodkasia told TechCrunch that he identified the bug after examining how Meta AI allows its logged-in users to edit their AI prompts to re-generate text and images. He discovered that when a user edits their prompt, Meta’s back-end servers assign the prompt and its AI-generated response a unique number. By analyzing the network traffic in his browser while editing an AI prompt, Hodkasia found he could change that unique number and Meta’s servers would return a prompt and AI-generated response of someone else entirely.
The bug meant that Meta’s servers were not properly checking to ensure that the user requesting the prompt and its response was authorized to see it. Hodkasia said the prompt numbers generated by Meta’s servers were “easily guessable,” potentially allowing a malicious actor to scrape users’ original prompts by rapidly changing prompt numbers using automated tools.
When reached by TechCrunch, Meta confirmed it fixed the bug in January and that the company “found no evidence of abuse and rewarded the researcher,” Meta spokesperson Ryan Daniels told TechCrunch.
News of the bug comes at a time when tech giants are scrambling to launch and refine their AI products, despite many security and privacy risks associated with their use.
Meta AI’s standalone app, which debuted earlier this year to compete with rival apps like ChatGPT, launched to a rocky start after some users inadvertently publicly shared what they thought were private conversations with the chatbot.

A blog which focuses on business, Networth, Technology, Entrepreneurship, Self Improvement, Celebrities, Top Lists, Travelling, Health, and lifestyle. A source that provides you with each and every top piece of information about the world. We cover various different topics.
Technology
Meta is reportedly using actual tents to build data centers

Meta and Mark Zuckerberg are in a hurry to build their superintelligence tech. The company has been poaching AI researchers, while CEO Mark Zuckerberg announced on Monday that Meta is building a 5-gigawatt data center called Hyperion.
The urgency is palpable. As SemiAnalysis reported last week and Business Insider noted, Meta is so eager to boost its computing power that it’s literally erecting tents for temporary data center capacity while its facilities are still under construction.
These are all signs that Meta wants to build up its AI capacity faster after falling behind competitors like OpenAI, xAI, and Google — and that Zuckerberg isn’t willing to wait for typical construction timelines to close the gap.
“This design isn’t about beauty or redundancy. It’s about getting compute online fast!” SemiAnalysis said in its report. “From prefabricated power and cooling modules to ultra-light structures, speed is of the essence as there is no backup generation (ie, no diesel generators in sight),” it added.
As for its Hyperion data center, Meta spokesperson Ashley Gabriel tells TechCrunch that it will be located in Louisiana and will likely have a capacity of 2 gigawatts by 2030.

A blog which focuses on business, Networth, Technology, Entrepreneurship, Self Improvement, Celebrities, Top Lists, Travelling, Health, and lifestyle. A source that provides you with each and every top piece of information about the world. We cover various different topics.
-
Technology3 weeks ago
OpenAI hires team behind AI recommendation startup Crossing Minds
-
Travel3 weeks ago
12 Things Florida Grandparents Always Had in Their Kitchens That Made You Feel at Home
-
News3 weeks ago
Trump Warns U.S. Will Strike Again if Iran Resumes High-Level Uranium Enrichment
-
Life Style2 weeks ago
How to Do What Matters in a Self-Kind Way
-
Technology3 weeks ago
Google launches Doppl, a new app that lets you visualize how an outfit might look on you
-
Entertainment3 weeks ago
Billy Crudup and Mary-Louise Parker’s Son, 21, Makes Rare Appearance
-
Technology3 weeks ago
Rob Biederman join the stage at All Stage 2025
-
Entertainment3 weeks ago
‘Bachelor’ alum Madi Prewett admits she struggled to ‘break free from porn and masturbation’ addictions