An AI startup with six months of life and six employees has sold for 80 million dollars. Vibe-Coding, of course

Maor Shlomo is 31 years old, is Israeli and six months ago created a small platform of Vibe Coding. He did it almost like a secondary project, but the growth of the project has been vertiginous. So much that after that time the company has just sold for 80 million dollars. We are facing a sign of the times that come to us. AI as a unicorn promoter. There are more “unicorns” than ever. None has become a true giant, but reaching an assessment of 1,000 million dollars has become something relatively normal. Achieving something like that seems very complicated, but there is already talk of how the irruption of AI will make many entrepreneurs convert their startups into unicorns. Uniquersonal unicorns. The difference With the current unicorns It is that these future business successes may be created and managed by a single person. It is at least what it promises according to some AI, which will multiply productivity and avoid having to depend on other people to generate spectacular value. It is already spoken of “Only Unicorns” either “One-Person Unicorns“And the impact that AI agents can have in this type of startups. An example that brings us closer to that future. Shlomo created his little startup, called Base44just six months ago, but at that time the growth of it was such that it ended up hiring six employees According to Ctech. This week he announced that he had sold his company to Wix – a Platform to create blogs and websites – for 80 million dollars. 25 of them which will go to Shlomo and their team as “bonus” to retain them and continue working in Wix – also Israeli – although there are no data for how long they will have to stay in the company to collect said bonus. Vibe Coding. The platform created by Shlomo Perimte users create applications or games without having programming experience. It is an example of That fever for Vibe Coding that we are seeing in the world of programming. In just a few months Base44 managed to attract 100,000 users, in addition to signing various agreements with several Israeli companies known as Etoro or Similarweb. A singular entrepreneur. Shlomo had already co -founded Explorium, a predictive analysis company of Big Data, at age 24. He also made her In a successbut he had to comply with Israeli military service. After completing the service at the end of 2024, he preferred not to return to Explorium and work on another project. He counting The origin and its progress when creating base44 through Your X account. In less than 60 days I already had 100,000 users and two weeks ago indicated that he had generated a benefit of $ 189,000. Far from being a unicorn. Shlomo’s success is remarkable, but of course it is far from being considered a unicorn and much less One of those “only unicorns” “It has several employees in your team,” that is spoken so much and that the theoretically promotes. And yet, it is a good example that artificial intelligence raises the future. The AI ​​agents are in diapers, but the promise is that they will automate a lot of processes for those who use them. That could impact significantly on the template that these future startups will need, but for now everything is, we insist, a promise. One that Shlomo has become a reality. Image | Christina In Xataka | India has its own ‘Silicon Valley’ in Bangladés. The problem is that it is a ghost city

The filtration of 16,000 million passwords would be the largest in history. If it weren’t because it’s a gigantic refrito

A team of CYBERNEWS researchers He has discovered A large library with 16,000 million filtered passwords. That would be long the theft of credentials in history, but it has not been. That library is actually a compilation of 30 large sets of data already filtered in the past. Should I reassure us “just” that? Enough, but not quite. It is not a new massive theft of data. Cybernews researchers do not show their sources, but they point out that this is in essence a compilation of “supermassive data sets containing billions of credentials.” In those leaks – ancient, but it is not known how much – data appears that according to Cybernews come from Google, Facebook or Apple users. Again, without offering evidence of it. They explain that none of these data sets had been discovered before, except for one with 184 million credentials that They mentioned in Wired At the end of May. But it is still dangerous. The problem of a compilation like this is that it can serve as a great starting point for all types of cyber attacks. It is very likely that in that large database there will be a significant amount of duplicate credentials. No one has stolen data from Google, Facebook or Apple (recently). Although media such as cybernews or forbes talk that there are credentials of these platforms, again if any will be belonging to old data theft – which Of course Yeah There has been-. There have been no robberies (much less massive) of credentials in these companies recently, and if there were them, they should have made a communication responsible for the incidents – in the US the US is used FORM 8-K OF THE SEC– They can affect their businesses. Should I be worried? Relatively. It must be aware that these data theft give access to cybercriminals to millions of credentials (user and password) in all types of services, and they can gain access to our accounts in those services thanks to them and then attack them or use them as the basis of other attacks. But this is true every day, not only when a new security filtration appears. Have Ien Pwned is a useful service that allows us to enter an email address to check it with the databases of previous data theft. A curiosity here: the number of accounts hacked on this platform is almost 15,000 million, very similar to the one indicated in Cybernews. Check if you have hacked you. There has been a simple way to check if our email and password has leaked in any of these data theft. THE SERVICE HAVE I BEEN PWNED allows us Do it quicklyand here we have discovered something interesting: the database with which this platform works has almost 15,000 million accounts hacked in its registry. Almost the same number they are talking about in Cybernews, as if their great library was in essence the same one that has this service created by Troy Hunt cybersecurity expert. And acts accordingly. When introducing your email, services may appear in which your account may have been compromised. What you should do in case this happens is to change your password as soon as possible in those services, and, if possible, strengthen the security of that password. There are several methods to do so: you can create a strong passworduse a Password manageruse the two -step authentication “Specially recommended,” or even make the leap to the passkeys If the service allows it. Be careful out there. Those measures that we talk about should not only be applied if we realize that something has happened, but before it happens. It is better to prevent than healing, and it is worth reviewing the safety of our accounts on the Internet, especially the most sensitive. The mail (Gmail, for example) is especially delicate, since it is usually used as a password rescue method in many other services. It is a good idea here to go to the tools that allow verifying the security status of our accounts to reinforce it if possible. Google, for example, Maintain a control panel which we can access at all times to configure what is necessary and Avoid scares after. In Xataka | The old dream of the cybersecurity of the future has just come true: Microsoft corner finally the passwords

Apple has confessed that you are using AI to design its next chips. What comes to us to users is anthological

American companies Cadence Design Systems and Synopys are the most important in the software industry specialized in Integrated circuit design automation, known as Eda for its English denomination (Electronic Design Automation). And both have taken the same path by integrating into their solutions models of artificial intelligence (AI) designed to optimize semiconductor design processes. Nvidia, AMD, Intel, Broadcom or Medialatek are some of the chip designers who use the EDA software of these two companies, and some of them are already starting to flirt with the design through AI. In fact, Johny Srouji, Senior Vice President of Apple hardware technologies, has confirmed That the apple company is interested in taking advantage of the generative artificial intelligence to design the integrated circuits that it incorporates into its devices. “EDA software companies have a critical role when supporting the complexity of our chips designs,” Soruji holds. “The generative the techniques have enormous potential that can help us carry out more design work in less time, so they can give us a great impulse in the field of productivity (…) Passing the Mac to Apple Silicon was a great bet for us. We did not have a plan B or we were going to divide the product line. We bet everything.” This is what we can expect from the chips designed with AI From Johny Srouji’s statements a very clear idea follows: his commitment to EDA software endowed with AI It is definitive. This is the reason why he recalled the moment in which Apple decided to leave Intel’s chips and bet on his own designs. Somehow this engineer is hinting that the use of the generative AI in the design of integrated circuits is a milestone for chips designers. And he is right. The main consequence derived from the use of EDA software is the acceleration of the integrated circuit design process The main consequence derived from the use of EDA software is the acceleration of the integrated circuit design process. Apple, Nvidia, Google, AMD or Intel, among other companies, already have on the table the possibility of invest much less time in design of their own semiconductors. However, this is not all. The AI ​​can also be responsible for carrying out a part of the work carried out by the engineers of these companies. The EDA software reinforced with AI is able to optimize the performance per watt of the chips and their gross productivity, two objectives that until now were in the hands of the experts in the design of the microarchitecture of the integrated circuits. For this reason Apple and the other semiconductor designers will be able to reduce the time between two generations of consecutive chips, and, more importantly, they will manage to adapt more quickly to the changing needs of the market. Somehow we have already revealed what implications the popularization of EDA software has from the user’s point of view. And it is that in all likelihood we can expect that the improvements implemented in two consecutive chips generations have a perceptibly greater than the current range. In practice this resource should allow integrated circuit designers to improve a lot both its gross performance and its performance per wattalthough it remains to be seen to what extent the limitations imposed by current silicon technology restrict the capacities of the next generations of semiconductors. Anyway, there is no doubt that a new and unexplored world opens before us. Image | Apple More information | Reuters In Xataka | Apple believes that its rivals are not doing well in ia. It is the perfect excuse to delay Siri one more year

Juan Roig, president of Mercadona

If someone put in the center of any city to ask passersby the name of the first business leader who came to mind, surely in their answers would appear names such as Amancio Ortega, Ana Botín, Florentino Pérez or Juan Roig. A similar exercise is what the corporate reputation consultant Merco has been doing in her Corporate and leaders business monitorcreating an annual ranking of leaders and companies with a better reputation. In the 2025 edition, the president of Mercadona appears as the best valued businessman in Spain. Juan Roig, the immutable It cannot be said that Juan Roig was surprised to lead this ranking. The president of Mercadona has been in this position for seven years, since in 2019 the founder of Mercadona dismissed Pablo Isla, at that time CEO of Inditex. This recognition of leadership is the result of the decisions that Roig has taken at the head of the supermarket chain that is transforming the Classic Supermarket Concepttowards a model in which Prima the profitabilitythe offer of New ways to consume its products and commitment to Mercadona digitalization. Beyond the immovable Juan Roig, in the list of improved leaders valued we find a greater female presence than previous years. The second position is occupied by Ana Botín, president of Banco Santander, followed closely by Amancio Ortega that, although it is true that he does not occupy an executive position or inditex or in Pontegadeahis leadership continues to be one of The best valued. Fourth, although a little further away, we find Marta Ortega, now leads with very good results The textile empire founded by his father. Close the Top 5 of this listing Ignacio Sánchez Galán, president of Iberdrola who asserts his two decades at the head of the energy to occupy this position. Leaders and their companies Although leadership influences largely the reputation of companies, there is not always a direct coincidence between the best valued leader and the best positioned company. An example of this is found in the RANKING OF BEST VALUED COMPANIES In Spain in 2025. This list is not headed by the Mercadona de Juan Roig as expected, but is Inditex, led by Marta Ortega that occupies fourth place in terms of better valued leaders. However, Mercadona occupies a very honorable second place on that list. Something similar happens with Banco Santander that, although it is true that its president occupies second place in leadership, we must go down to the ninth position of companies best valued in Spain to find Banco Santander. Inditex has monopolized the first position of that list for almost a decade thanks to Your successful modelwith the only exception of 2022. In that year, Mercadona dismissed Ortega’s textile, to lose the first position again the following year. The Top 10 of companies is completed by the Social Group Once, Repsol, Iberdrola, Coca-Cola, BBVA, CaixaBank and Mapfre. In Xataka | The list of the richest people in Spain in 2025: many changes in the figures, but not in the protagonists Image | Flikr (Informa Board), Gtres

Its offerton leaves it in less than 2 euros per month and with a gift included

Although very little is missing for summer to begin officially, the heat is already with us. That time comes in which many take advantage to make a getaway somewhere for a few days, most times in hotels. It may happen that one of these sites has very bad coverage, What leads us to use the wifi in its place And that is something that can house certain dangers. Are public Wi -Fi networks They can be controlled or intervened by a criminal who wants to steal information. The easiest way to protect us in them (and on the Internet in general) is with a VPN and very few have as cheap as Ipvanish is: it can come out from 1.97 euros a month. And eye: Because now comes with insured gift. IPVANISH VPN Subscription – Monthly * Some price may have changed from the last review An extra security layer and with a gift eSim A VPN is one of those things that are ever to take installed, either on PC or on the mobile. With it we will make sure that our Internet traffic is encrypted and safe, far from any possible danger. This ipvanish is fast, It has no transfer limits And we can install it in virtually any device where we need it. Another of those key points that you have is that, in addition to being safe, it is tremendously simple to use. Its application is intuitive And it is designed so that we do not have to complicate. You don’t have to configure just anything, just install it where we need it and use it. The promotion that is active IPvanish is not only related to the price, but also comes with insured gift. If we hire any of your plans, We will get a SIM for free with 3 GB of data. One of these will come great if we plan to travel and, once let’s activate the promo, we will have 30 days to spend that data as we want. As we have explained above, we can get with ipvanish from 1.97 euros a month. That means that two full years of the service will come out for only 47.30 euros, a discount if we take into account that its usual price is 11.99 euros per month. Between the price and the ESIM as a gift, A great moment to get a VPN for this summer. Some of the links of this article are affiliated and can report a benefit to Xataka. In case of non -availability, offers may vary. Image | Anastasiia Nelen in Unspash In Xataka | Why it is dangerous to connect to public wifis and what you should do to protect yourself In Xataka | The best solutions to protect your data and your company’s computer equipment

Something weird is happening with the clouds of the planet. Something that will bring not very pleasant consequences

Where are the clouds born? The answer to that question can become much more complex than it seems. Because yes, the clouds are formed in the sky, or in the atmosphere, but the layer of gases that surrounds our planet is vast and in it intermingle predictable factors with chaos. Complex and changing. Trying to answer this question, some scientists have encountered an additional problem: the place where the clouds are born It is changing. The area of ​​the earth’s surface in which these clusters arise has moved and has shrunk what has important implications in the climate and weather of the planet. They are the results of two studies published in recent years, The first In August 2024 in the magazine Climate Dynamicsand The second In May of this year in Geophysical Research Letters. Three cloud stripes. The first of the studies observed how the cloud areas located on the oceans of both hemispheres have moved and contracted throughout the last 35 years. The study focused on three zones: one, called Interopical Convergence Zone (ITCZ) located near Ecuador Earth; and the other two located in average latitudes, approximately between parallel and 60 north and south. Through observations of instruments such as the modis (Moderate Resolution Imptotroadiometer) On board the Aqua satellite, the team was able to map the areas of greatest cloudiness as well as their evolution over time. Interpreting the data. According to The US Space Agency explainsNASA, the tormentous clouds that run through our planet are usually forming in the vertices of large -scale atmospheric circulation areas, such as hagley cells, polar and hard -latter cells or average latitude cells. More specifically in the areas where the currents associated with these cells converge and make warm and humid air ascend. In contrast, the convergence areas where currents carry cold and dry air from upper layers of the atmosphere to lower altitudes correspond to the areas where the heavens tend to be more clear. Change in the trend. The study of the clouds gives us clues about the dynamics of these torments of the planet. The responsible team calculated for example that the area contracted between 1.5% and 3% per decade In recent years. As NASA details, the ITCZ ​​narrowed and the tormented areas in average latitudes moved to their respective poles at the same time that they also contracted. In contrast, the subtopics clear areas expanded. More than a matter of color. The most recent of the studies addresses the climatic implications of change in the cloud patterns of the planet. And it is that the climate our “blue marble” depends a lot on the clouds that overshadow the atmosphere and dye it occasionally in white since this layer of clouds depends on the amount of solar energy that reaches us due to the albedo. The clouds reflect the light and therefore the solar energy that reaches the surface of the Earth, so less clouds implies more energy and more heat. According to study estimates, change implies that oceans absorb 0.37 watts per square meter more per decade due to these changes. And climate change? We could fall into the error of assuming that this change explains the tendency towards global warming that we associate with anthropogenic climate change but the truth is that climatic models already incorporate these changes into them. In fact, a previous estimate made by the instruments of Ceres (Clouds and The Earth’s Radiant Energy System) estimated at 0.47 watts per square meter and for decade the increase in solar radiation that the planet receives as a whole. These changes contribute to the “energy imbalance” that implies heating, but they do not explain it for themselves. “These new findings suggest that the loss of oceanic tormented clouds is a key factor in the imbalance,” He explained George Tseliudis to NASAmember of the team responsible for the studies. According to the expert, these changes could also Help explain The anomalo oceanic warming seen a couple of years ago and that caused the North Atlantic to beat numerous temperature records. In Xataka | The clouds are each time a more scarce resource. And some countries are already “to war” for them Image | Michala Garrison, Modis Atmosphere Science Team / Tseliudis et al (2024), Dscovr Epic

An army of 25,000 North Koreans addresses Russia. They will not fight, they will build the biggest army of kamikaze drones

It is taking place A paradox in the war that is taking place in Europe. While Ukraine has weakened Russian artillery, another growing threat has been increasing more and more over the months. If kyiv became a industry of combat drones in record time, Moscow is determined to overcome. As? To begin with, with the arrival of thousands of North Koreans. Drones, workers and an alliance. The strategic alliance between Russia and North Korea has ceased to be a marginal cooperation to become a structural axis with direct implications in the evolution of the war in Ukraine and in the security architecture of Eastern Asia. According to diplomatic sources cited in media Japanese and Western, Pyongyang has begun to send an army of up to 25,000 workers to the Special Economic Zone of Alabuga, in the Russian Republic of Tartaristan. THE OBJECTIVE: Massive support the industrial production of Shahed dronesof Iranian origin, used by Moscow As a main weapon of saturation and attack in Ukraine. But there is more. This collaboration also includes knowledge transfer operational, training in the use of unmanned systems, and a component of reconstruction aid in combat areas, Like Kurskwhich has suffered important damage from the Ukrainian offensive of August 2024. The arrival of North Korean personnel not only represents a solution to the growing labor shortage qualified in Russia, but also contributes to consolidating a political and military axis based on convergent interests against the West. Mass kamikazes. The Alabuga factory, epicenter of the Russian Drones Shahed program, currently produces some 2,000 units per month with the objective of reach 5,000 Thanks to this new workforce. In fact, satellites They have detected an enormous expansion in the industrial zone, with the construction of Collective bedrooms designed to accommodate hundreds of workersfollowing an intensive and permanent occupation architecture. The logistics reinforcement aims to guarantee the continuity of production even under direct threat, since the plant has repeatedly suffered attacks by Ukrainian drones, as it happened June 15 with a Airrakt A-22 loaded with explosives that towed a glider, unpublished tactics Until then and capable of attacking two goals simultaneously. Russian Drones Shahed A key drone. The Russian need to maintain pressure on Ukrainian defenses has turned Shahed into the backbone of his aerial offensive. It We have counted before: these vehicles are modified to carry major explosive loads and, in some cases, elements of autonomy that make them more difficult to intercept. He massive use (With attacks that reach more than a hundred drones per night) it forces Ukraine to accelerate their anti -aircraft reserves, progressively weakening their defense and reaction capacity. Rebuild with military logic. The sending of North Korean workers is not limited to the production of weapons. After his visit to Pyongyang, Russian Defense Minister Serguéi Shoigú, confirmed the incorporation of about 1,000 North Korean and at least 5,000 civil workers which will participate in the reconstruction of destroyed infrastructure in Kursk. This region, invaded by Ukrainian forces In August 2024 And recovered by Russia after weeks of combat, it has been deeply damaged. Moscow considers its reconstruction essential both in terms of national morals and the logistics sustainability of the front. Not just that. They counted the Twz analysts that the initiative also responds to a Internal logic: Kremlin perceives Central Asian migrants as politically unstable and potentially vulnerable to recruitment for Western or Ukrainian intelligence services, which has driven the search of “Leales migrants”like North Koreans. A labor hybrid. According to General Ukrainian Kyrylo Budanovpart of these workers will end up signing Contracts with the Ministry Russian defense, constituting unofficial units of Russian nationality but North Korean origin, which would mark a new step in hybridization between foreign workforce and regular military structure. Inverse technological transfer. It is another leg to analyze. The alliance has an even deeper geopolitical dimension. According to BudanovRussia is actively helping North Korea to improve the accuracy of Your KN-23 ballistic missilesto Modernize your missiles long-range air-air and reinforce the capacities of Its nuclear submarinesparticularly in relation to missile launch from submerged platforms. Strategic evolution. In exchange for Labor and Cooperation Logistics, Moscow is consolidating a North Korean offensive capacity that could alter military balance in the Korean peninsula. In that sense and how We countPyongyang is developing (with Russian assistance) the necessary infrastructure to produce local versions Of the Shahed drones, which would endow the regime of Kim Jong-un of an arsenal capable of, for example, saturate the aerial defenses of South Korea through mass and simultaneous attacks. This change represents a strategic evolution for a country that until a few years ago operated outside the large global military production chains, but now emerges as a relevant actor in asymmetric technological warfare. “Other” world order. In short, the image of a giant factory where thousands of Russians and North Koreans come together In a Shahed drone assembly line, that Moscow-Pyongyang alliance at a new level. If you also want, it marks the emergence of an authoritarian axis not only military, but also economic and structuralthat frontally challenges the Western Alliances System. What doubt fits, if Russia manages to stabilize its forehead through Drones produced by mass With North Korean help and at the same time strengthens Pyongyang’s strategic capabilities in Asia, global security architecture will experience A dangerous mutation. Now it is not simply an exchange of resources for services, but the training of a Coordinated Interest Network With a shared narrative against the United States, Europe and its Asian allies. Image | KNCA, X. In Xataka | North Korea has been sending armament for months to Russia. In return, Russia is giving him what longs for her: a functional army In Xataka | Ukraine is surviving in the war thanks to the drones. Russia has an ally to change that: North Korea

The “rearme” in Europe has encountered an obstacle that neither US imagined: Spain

A few days after the NATO Summit in The Hague is held, the main concern among allied leaders does not revolve around To Ukraine or Russiabut how to prevent Trump from dynamite. The US president has become the axis around which he orbits the transatlantic policy, and in an effort to maintain their support (or at least their neutrality), the organizers have compressed the format less than two days. What nobody expected was the “bomb” that It had Spain. Spain and the rearme. Yes, the planned summit has been involved in a strong tension After the firm opposition of the president of the Spanish Government, Pedro Sánchez, to the new objective of military spending that the United States seeks to impose. In a categorical letter sent to the Secretary General of the Alliance, Mark Rutte, Sánchez qualifies “Irrazonable” The claim to raise the 5% defense expense of GDP, a requirement promoted by Trump under the threat of withdrawing US military protection to countries that do not comply. The Spanish refusal is not symbolic: it calls into question the political foundations of the summit and could dynamite a consensus that It was assured Among the 32 members, at a time of deep uncertainty About him future commitment Washington with European security. The Spanish model. Sánchez argues that a hurried adoption of such a threshold would have negative consequences both economic and social. In his opinion, fulfilling 5% would force Increase taxes On the middle classes, drastically reduce essential public services and sacrifice high economic impact investments in sectors such as education, health, technological research or ecological transition. Sánchez and two dangers. The warning according to Spain is double: on the one hand, Budgetwarning of a brake to growth derived with greater indebtedness and inflation. On the other, policypointing out that this sacrifice would fall on structural pillars of the welfare state. In Your letterthe president also emphasizes that this imposed goal would lead to countries to make hurried military purchases that would only increase the dependency of non -European suppliers and would erode the industrial base of defense of the continent. Beyond the economic, Spain exposes a strategic concern about the Interoperability and operational cohesion Within the alliance if the Member States begin to rearm without a common road map. Fracture within the alliance. The Financial Times counted that the Spanish position coincides with the resistance of few other members, although most have given their support to the Rutte proposal to reach an expense of 3.5% of GDP in direct defense plus 1.5% in critical infrastructures and cybersecurity, configuring a total equivalent to 5% required by Trumpbut more nuanced. However, the Negative of Spain It arrives at a time of special institutional fragility: Trump has demonstrated manifest disinterest by multilateral summits, leaving a G7 meeting after disregarding the meetings with Zelenski and showing irritation to Macron to hinder their aspirations on Greenland. European makeup According to the New York Timesthe (re) flag -bearer definition in the matter of “rearme” has generated a mixture of confusion and discomfort among the defense ministers, many of which are not clear about what can be included or when the objective should be achieved. The result is, in the words of European analysts, a makeup operation Political: an inflated figure with inaccurate concepts to satisfy Trump without really compromising the economic and social model of several countries. According to Nathalie Toccidirector of the Institute of International Affairs of Italy, “3.5% is real and responds to the needs of NATO, 1.5% is pure theater to calm Trump.” Without compass club. The scenario also reflects other tensions. The main one: the debate has revealed deep divisions Within the alliance. Some border countries with Russia demand Accelerate spending To dissuade a possible Russian offensive in the next five years, while others (such as Canada, Italy, Spain or Luxembourg) barely have just achieved the 2% target set a decade ago (Spain or that). Germany asks A “realistic commitment” between what is necessary and the feasible, while Luxembourg denounces that the figures should not guide securitybut real capacities. The Rutte proposal Nor has it managed to clarify whether part of military aid to Ukraine can Computing as an expense Internal defensive, a key aspect for countries that wish to sustain their contribution without weakening their own national capacities. This ambiguity has led to debates about what is considered military investment and what enters the “related” spending category, leaving the land paid to opportunistic interpretationsdouble computations and/or statistical divergences that can erode mutual trust. Europe under pressure. Even if governments promised to spend more, it is not clear that the defense industry (neither European nor American) can absorb quickly Those funds. The bottleneck It is not just prosecutorbut logistics, industrial and technological. In addition, increasing spending without a common strategy could be translated In precipitated purchasesuncoordinated and focused on external suppliers, aggravating operational fragmentation. While, I remembered the Times that the Russian threat is still tangible. NATO’s intelligence services estimate that, once the war in Ukraine ends, Moscow could reconstitute an offensive force capable of directing directly to the eastern flank of the alliance within five years. We have already told it, countries as Estonia or Finland consider that There is no time to lose and demand immediate actions. However, the United Kingdom will not reach 3% to 2034 And other allies continue to drag Structural delays that question their real commitment. The structural challenge. So, Spain, one of the few allied capitals that has not even reached the current threshold of that 2%, is now in the center of a pulse strategic that transcends the budget. The Sánchez letter raises Two outputs A RUTTE: to be exempt from any new approved objective or allow a flexible formula that volunteers will volunteer the 5%goal. Thus, what is at stake is not only spending, but Shared Defense Model and the principles of balance and proportionality between allies. Historical Summit. In short, Sanchez’s letter reveals a deep crack between the strategic priorities of … Read more

Iran has asked its citizens to uninstall WhatsApp. WhatsApp’s response has been outraged

He Application blocking during protests or armed conflicts is something that We have seen before. Although it is not a blockade for now, WhatsApp is in the spotlight in Iran. In the middle of Conflict with IsraelIranian state television asked a few days ago to its population that They will erase WhatsApp from their devices. The reason? According to them, the Meta app shares data with Israel. WhatsApp soon responded. Iran’s accusation. They tell it in AP news. Last Tuesday afternoon, on Iranian state television, the population to erase WhatsApp from their mobiles was urged. Iran ensures that the app is collecting user information, including your last locationand sharing it with Israeli intelligence, although without any proof that corroborates it. The WhatsApp response. In a Message posted in your X profileWhatsApp has responded bluntly, crossing this accusation of false information and highlighting that they use end -to -end encryption. This means that the information cannot be read if it is intercepted, it is only convenient when it reaches the recipient. They also emphasize that they do not keep registration of user location. Here the full message: This information is false and we are concerned that it will be used as an excuse to block whatsapp just when they need it most. All your personal messages and calls are encrypted from end to end, so we cannot see them. We do not track your exact location. We do not keep records of personal messages that are sent to each other. We do not provide massive information to any government. Can a government ask WhatsApp information? In a response to the WhatsApp publication in X, a user questioned if “we did not provide massive information to any government” meant that they do provide more detailed information. The truth is that there are cases in which yes They can share information before requests from order forcesfor example, given an emergency situation or investigation. In your response to this userWhatsApp insists that the Iran-Israel conflict is not one of these cases. In his Help centerWhatsApp explains how the process works when one of these applications occurs, which always has to meet the legal framework and its privacy policy. Among the data they can share with the authorities is the username, the date on which it started using WhatsApp, date of the last use, IP address, device information, your name, profile photo, contact list or its email. Goal provides details about government requests in its Transparency Centeralthough the data is updated every six months, so the most recent is from December 2024. Iran and WhatsApp have history. The finishing messaging app has already been in the spotlight of the Iranian government. In 2022, during Protests for the death of Masha Amini At the hands of the Iranian police, the government blocked Internet access in some parts of Tehran. Access to Instagram and WhatsApp was also blocked in an attempt to weaken the protests, it was not until late 2024 When they lifted the blockade. On the other hand, a few days ago The Internet connection will restrict throughout the country as a measure to prevent “cyber attacks from the enemy”, although They assured which would be a “temporary, specific and controlled.” Cover image | Pexels (1, 2) In Xataka | Israel is not only attacking Iran with missiles. He also just steal 90 million dollars in cryptocurrencies

It is possible that your gmail is destroying the emails that arrive and do not know. The fault is for forgotten adjustment

Dozens of readers of The country They complained that some of the Newsletters received contained “rude errata”. Meaningless phrases, words that seemed terribly chosen … When doing the checks, the technical team of The country realized that Newsletters They did not contain those errors, the writing was adequate. But in the receptor mailbox they were modified. Why is it important. The ruling was not in the newspaper, but in Gmail. Those who protested had activated the automatic translator into Spanish, so that any mail received was seen in this language. The problem is that this translator acts even in mails that are already in Spanish, turning words when detecting English where there was no. Where he put “secret military plans”, appeared “Airplanes Secret military “. Where he put “Trump uses the power of the State to blackmail institutions”, appeared “Trump uses the power of the State to sing to institutions “. The context. Gmail is The most used mail service in the world, and many users have activated their translator “always translate automatically.” This function, as we have seen, operates even about texts already written in your language. Between the lines. What began as a sum of readers complaints has exposed a much greater problem: platforms can alter content without anyone knowing, at least for a while. The issuer sends a message, the receiver reads another, and none suspects that there is a tool in the background by modifying words. The threat. If Gmail can change “siege” by “seminar”, another of the examples cited by the newspaper, can also introduce intentional biases. Or forced. For example, a government order can force automatically replace “Gulf of Mexico” by “Gulfo de América” In all emails. Users would read it and normalize without knowing that the content has been manipulated. Yes, but. This automatic customization is born from a good idea, is born from helping. The problem comes when the help becomes invasive, is not entirely well designed (no anglicisms in Spanish from homonymous words between languages) and is opaque. Nothing made those affected think that the fault came from there. It does not seem fair to trust years of use of a tool to which at the time the user activated it or granted certain permits if nothing that happens later acts as a subtle reminder. In the foreground. For the first time, readers were not reading what journalists had written. And neither the first nor the second were aware of it. It is the symptom of an era where sometimes machines make decisions about the information we consume without transparency or real control. In Xataka | Hotmail changed the storage, Gmail brought the search. What is coming now will eliminate writing Outstanding image | Xataka, Mockuuups Studio

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.