There was nothing to welcome

Malaga will not be able to fulfill his dream of hosting the National Cybersecurity Center. A controversy that has sat as a jug of cold water to the Junta de Andalucía, which applied the coastal city as its best alternative to host this center. The problem? There was no center to host, as the government has clarified. The candidates. Just Malaga and León They had formalized their candidacies to house the coveted institution, with the respective support of its autonomic governments. Malaga sounded with special force, in his efforts to continue adding victories in his attempt to turn the city into One of the country’s main technological hubs. Neither one, nor another. Neither cities will host the headquarters of the future National Cybersecurity Center. The reason is very simple: No city in Spain will host this center… because this will not have any physical space. The Government of Spain has clarified through the Ministry for Digital Transformation and the Public Function that this technological body will not be “an agency or any newly created institution that requires physical location.” One more administrative department. The Junta de Andalucía ensures that there was a “technical memory” prepared by the central administration, with the forecast of dozens of jobs, details on the rental costs and characteristics of the building. Something that The government itself advanced in Aprilwithout formalizing it documentary, but in statements by Óscar López, Ministry of Digital Transformation. Malaga’s candidacy managed to agree on the entire Andalusian Parliament: PP, PSOE, Vox, by Andalusia and Adelante Andalucía approved a No law proposition To contemplate the city as a candidate. A Spanish. In short, the confusion between the communities of Andalusia, Castilla y León and the Government of Spain attend to: Lack of clear communication by the government In the early phases of project development. Lack of clear communication from the communities by presenting a candidacy for an organism that had not confirmed creation of independent physical headquarters. Lowering expectations. Óscar López himself assured that the creation of the new agency only responded to the fulfillment of the new European Cybersecurity Law. One that requires that all the coordination of centers linked to this field be mediated by national institutions. The new National Cybersecurity Center, attached to the General Secretariat of Presidency of the Government, continues to show doubts about its strategic functioning. The draft defines it as a “coordination organ”, but its powers are still without being clear. How is the patio. Currently, Spain has its cybersecurity structure well defined. INCIBE-CERT National Cryptological Center Joint cyberspace command The new center will be nothing more than an administration attached to the DSN (Department of National Security), without its own entity or its own legal personality. The controversy arrives at one of the most critical moments in Spanish cybersecurity, With domain. It is in full crisis and Uploaded to the Podium of Cybeards. Image | Bárbara Landolo In Xataka | Malaga will be one of the two epicenters of European research in chips. The surprising thing is how it has achieved it

How can we avoid its consequences

Surely we have heard dozens of times of acid rain without knowing exactly what it is. It is also possible that we have a cartoon image of this very real phenomenon, a rain that corrodes and destroys everything it touches. There is something true in this but, of course, reality is a bit more complex. First of all we must answer an obvious question: What is acid rain. We refer to acid rain to a rain that drags acid components. These components can of different types, for example nitric acid or sulfuric acid, so there is no “standard” composition of acid rain. Acid rain does not have to be strictly, rain. Other similar events, such as fog or hail, can also make the acidic compounds of the atmosphere intermingle with water and give rise to “acid rainfall.” In a way we can see acid rain as a variety of phenomena with a common denominator in these Acid components. The result is more acidic than normal rainfall: if the rain usually has a pH of 5.6, acid rain tends to have values pH between 4.2 and 4.4. How acid rain occurs Acid rain usually begins with atmospheric emissions of compounds such as sulfur dioxide (SO2) or some nitrogen oxide (NOX). These compounds can be issued by the industry or means of transport (although they can also arise naturally) and dragged from industrial and urban areas to distant areas. In the atmosphere, these compounds can end up mixing with oxygen, water, and other components, unleashing chemical reactions that give rise to the formation of sulfuric acid and nitric acid. These acids are later captured by water itself, forming acid rain. They can also end up precipitating themselves on land, vegetation or terrestrial waters, in what we call the phenomenon of dry deposition. How it affects the environment According to Explains the United States Environmental Protection Agency (EPA), the effects of acid rain can be seen more clearly in aquatic environments. Although the increase in water acidity can be harmful to many species (especially young), the main risk is indirect. When acid rain falls on the ground, it can interact with clay particles in these and Extract aluminum They could contain. Due to runoff, part of this aluminum ends in rivers and lakes, affecting aquatic life. This aluminum can also be absorbed by plants, which implies that acid rain can also affect plants, not corroding them as we can imagine but intoxicating them from the ground. It can also make the ground lose nutrients that plants need. Different species may have different levels of tolerance regarding these impacts, however we must take into account that ecosystems are complex systems where the loss of a piece can affect many others. EPA puts a Example with frogs: While these can endure a pH of up to 4, some of the insects they feed cannot survive in waters with a pH below 5.5. How it affects people Acid rain also generates impacts on people. Again, we can rule out the idea of direct damage as skin damage derived from contact with this rain. “Walking in acid rain, or even swimming in a lake affected by acid rain, is not more dangerous for humans than walking in normal rain or swimming in non-acid lakes,” Explain EPA itself. That does not mean that acid rain does not affect us, only that it does so indirectly. Acid rain can also expose us to heavy metals. Studies on the impact of aluminum are not conclusive But we know that acidification can increase bioconversion of mercury to methylmercury and its accumulation in fish. In addition, since this rain can affect plants, it can also influence agriculture, for example altering the pH of agrarian soils, making them more acidic. This rain can also affect the constructions and public furniture. Here corrosion does play an important role since acidic particles interact with metal, stone and paint causing damage to the coating of buildings, statues and other elements. The presence of acid rain is also an indicator of the existence of torqueSO2 and NOX ticleswhich in themselves can be harmful to humans when they are inhaled. That is, the same particles that cause acid rain put our health at risk to a greater extent than acid rain itself. Consequences for the planet of acid rain We indicated before the compounds that cause acid rain can travel displaced by atmospheric winds and currents. This implies that sometimes the emissions of certain industrial areas end up causing problems in vegetated areas to hundreds or thousands of kilometers away. That is, acid rain can have global impacts in addition to premises. Can acid rain be avoided? The big question then is what we can do to avoid this. The answer is In emission control of the particles that cause this problem, that is, of sulfur dioxide and nitrogen oxides. The main sources of these pollutants are the burning of fossil fuels in different sectors (transport, electricity generation or industry) is largely responsible for This type of emissions. Various limitations introduced Throughout the last decades (The last the imposed in the maritime sector to sulfur emissions) have kept at bay the potential environmental disaster derived from acid rain. In Xataka | Acid rain, oxide in the neighborhoods and mercury in the fountains: this is the panorama of contamination in Gijón Image | Patrick Hendry / Wal_172619

The dubbing actors are planting in front of AI. In Mexico, the protest goes beyond image rights

The protest was this Sunday, but the discomfort had been cooking for weeks. Actors, broadcasters and creatives of the dubbing world mobilized in Mexico City to ask that their voice, their work tool cannot be cloned by artificial intelligence without consent. The trigger was a video published by the INE that, according to the organizers, the voice of the deceased would have used José Lavat generated by means of. Lavat was one of the most recognized dubbing voices in Latin Spanish, known for his role as a narrator in the Dragon Ball series. The impact was immediate. And the answer, too. A protest in the CDMX center. The mobilization took place in the monument to the revolution, in the center of Mexico City. It was not a massive march, but it was significant: not only because of the number –According to the National Association of Actors (ANDA)more than a thousand people attended – but for the diversity of voices who joined the claim. Among the calls and assistants were Ameloc, the Anda herself, the United Voices Organization, Ark Dubbing Mexico, the Esteban Siller Artistic Specialization Center (Ceartes), and also the International Association of Workers of the Show (AITE). As they collect in this Instagram postthe claim was shared by broadcasters, actors, technicians, directors and professionals of all industry levels. “It’s not just about actors,” said Alejandro Cuétara, representative of Anda, cited by Ecos Media MX. “We are supporting a group of directors whose work is also at risk, and the guild in general, which includes the other 60 departments that participate in a filming. From which Barre, to the director: we are all at risk.” From the street claim to Congress. The protest was not just symbolic. The participants took advantage of the call to demand concrete changes in Mexican legislation. The objective: that the human voice – as biometric data and work tool – is protected by law against unauthorized uses with artificial intelligence. As explained by Cuétara, in the last legislature there were up to 58 attempts to regulate the use of AI. “And none came to a discussion,” he lamented. Now, they support a new initiative promoted by local deputy Paulo García, which has already been raised to the federal level. What they ask, in the words of the Anda representative, is clear: “That there are the attempts of law that there are.” Cuétara also made a direct call to President Claudia Sheinbaum, asking her to take the issue as a legislative priority. “We are asking the president, Dr. Claudia Sheinbaum, to take the matter as her own and that puts a priority initiative to be discussed,” she said in the demonstration. The proposal is not limited to the use of voices in advertising or cinema: seeks broader recognition. “By controlling biometric, not only of talents, actors, actresses … the biometric of all Mexican. That your voice is part of your own image and that no one can or replicate it or use it to feed generative intelligences,” he said. It is a concern that is not only technique: it is also human. Therefore, from the Mexican guild they propose the creation of a new seal, which works as a declaration of principles. To the already known “made in Mexico”, they want to add a new one: “made by humans.” The government takes note (at least for now). This Monday, In its usual public interventionPresident Claudia Sheinbaum referred to the case directly. “They are right,” he said, in relation to the claims of the actors and announcers who participated in the protest. “They are people who dedicate themselves mainly to dubbing and, according to what they raise, even people who already died. This is not correct,.” Sheinbaum confirmed that she has already talked with the legal counselor and the Ministry of Culture to open a dialogue channel with the groups. “We are going to meet them to see which schemes of protection to their work and their voice have to be used to avoid the use of what is their main work tool, which is their voice, through artificial intelligence,” he said during the morning conference. The president admitted that the issue raises legal challenges – as the debate on whether the voice can be considered a biometric data – but also recognized the value of the trade. “The dubbing that is done in Mexico is very good. There are many people who dedicate themselves to it and you have to protect their work, their voice and everything that is associated with this important profession.” The dilemma is not just Mexican. What is played in Mexico is part of a broader debate. Throughout the world, artificial intelligence has begun to enter the creative processes, From script writing to films dubbing. Prime video, for examplehas already launched a pilot program to apply dubbing assisted by AI in titles that did not have a localized version. The plan, they assure, combines AI with human review to make its catalog more accessible. But not everyone see it with good eyes. In Hollywood, critical voices accumulate. Robert Downey Jr., for example, made clear that it will not allow That a digital twin of yours is believed or that its image is used with without consent. “Even if I am dead, my law firm will remain very active,” he warned. Images | Jonathan Velasquez | Igor Omilaev | Ameloc In Xataka | The most experienced developers hoped to improve their productivity with AI. A study showed just the opposite

The electricity network was not prepared for 2025

Although Bocachancla’s fame has been gained by the fame, Elon Musk can also be hit in his predictions. In mid -2024 predicted that this year we would see failures in the electricity grid because it was not prepared for current demand levels. And so it is being in large part of the world. Musk’s prediction. First, the shortage was from chips. Now, the bottleneck is in the voltage transformers. To the electrification that was already underway, the computing dedicated to the AI has been added, which is multiplied by ten every six months. “I have never seen a technology advance so quickly,” said the businessman in the Bosch Connected World 2024. What sounded to hyperbole has become a tangible problem just 18 months later. The difficulties in connecting new data centers, Light cuts during heat waves and The climbing of the night price of electricity They are already symptoms of an old and inflexible network that falls short for the times. The demand is runaway. In Italy, requests for connection to the network of new data centers They reached 42 gigawatts in March 2025a spectacular leap from the 30 GW registered at the end of last year. This 40% growth in just a quarter shows a voracious energy demand that mainly driven by AI. The energy appetite of generative AI is not a secret in Silicon Valley. Renewable energy has fallen short due to the slow expansion of batteries, and companies such as Microsoft, Amazon and Meta are investing in nuclear reactors To feed your data centers. A summer of blackouts. The summer of 2025 is serving as a hard reminder of the fragility of our electrical networks. On July 1, a heat wave caused a blackout in Florence. The cause: an overload in the network for the demand for air conditioning and overheating underground cables. It was not an isolated case. Countries like Kuwait and Bangladesh They decreed programmed cuts of electricity by heat waves. The networks operate with increasingly narrow margins, as we saw in Spain with the Bru what of April 28. There is no need for a catastrophic event to trigger a collapse: stations that control the tension They are at the limit. The background problem. Electrification, air conditioning and AI explosion is not the root cause of the problem. Neither does the lack of generation or storage. The background problem is the abandonment of infrastructure that connects everything. For every dollar that is invested in generating electricity, 40 cents are barely allocated to the networks, according to the International Energy Agency We are building an energy system of the 21st century on an infrastructure of the twentieth century. The IEA warning is as clear as that of Musk: “Without action, the electrical networks will be the bottleneck of the energy transition.” Elon Musk’s prediction was not a futuristic fantasy; It was a diagnosis of a disease that the electrical system already suffered. Images | Bosch, Dr. Maik Koch In Xataka | A month after the blackout in Spain, we continue to drag the same problem that led us to him: electric networks

Sending electricity without cables seemed to the future. Darpa has done it again, and the test has gone better than expected

What are 800 watts? More or less what a microwave consumes running at medium power. And 8.6 kilometers? It is an approximate distance between the stations of Atocha and Chamartínin Madrid. It is actually somewhat lower, but it serves to get an idea. That is the scale of Darpa’s last experiment: a system that managed to transmit real energy with a laser, in a straight line, without cables and with a receiver that turns the light into usable electricity. It may seem little, but it is not. The important thing was not the amount, but the test. And it worked. What exactly Darpa has done. The United States Advanced Defense Research Projects (Darpa) has successfully completed The first phase of a program called Power, designed to explore new ways of transmitting long distance energy. In their most recent test, carried out in New Mexico, they managed to send a laser beam that delivered about 800 watts for 30 seconds to a receiver located 8.6 kilometers. The figure is important because it exceeds the previous records: until now, the best documented result was 230 watts at 1.7 kilometers. Although the agency has not revealed how much power it was originally issued, it is known that the system was able to maintain energy flow for periods even longer than those officially reported. According to those responsible for the project, it was not about demonstrating efficiency, but viability. The essential thing was to check if it was possible to build a functional system in a short time. And they did it in just three months, from the initial design to the final execution. The receiver was developed by Technc Technologies and uses commercial solar cells already available in the market. The objective was not to optimize performance to the maximum, but to prove that this technology can be launched with accessible components and without complex manufacturing processes. How this technology works. The idea behind the experiment is simple to understand, although technically complex: send energy through the air with a beam of light, and that when it arrives it can be used as electricity. The DARPA system is based on an infrared laser that points directly to a receiver composed of a conical mirror and solar cells. The mirror captures the ray and redirects it towards the panels, which convert light into electrical energy. Part of the equipment used during the test The interesting thing is that no exotic components or photovoltaic cells were used to measure, as in many laboratories. Commercial cells were used, ready to use, which reinforces the idea that this technology can be viable out of paper. As we say, the performance, for now, was not the priority. Receiver efficiency is around 20 %. The Power Receiver Array Demo system achieved a new record by transmitting laser energy with more power and greater scope than ever During the test, diffractive optics were also used, an unusual resource in this type of transmissions, and an integrated cooling system was implemented directly in the optical parts, manufactured with additive printing techniques. None of these innovations was scheduled at the beginning. They were solutions that arose on the march, as they faced the challenges of the experiment. Why do it with laser and not with radio waves. Transmitting long distance energy is not a new idea. For decades it has been investigated how to do it with radio or microwave waves, but these technologies have physical limitations that include their effectiveness. As IEEE points outto work, they need large antennas and systems of Beamforminga technique that allows the signal to be concentrated in one direction. The longer the distance, the greater the issuer must be, and the more difficult it is to focus the beam with precision. Compared to radio waves, the laser can focus much better: a narrow beam can be created almost without dispersion, at least in ideal conditions, According to Eric YeatmanVice President of the College of Science and Engineering of the University of Glasgow. Of course, not everything is advantages. The lasers also disperse with fog, clouds or dust. In adverse atmospheric conditions, microwaves remain more reliable. But for certain applications, especially if we talk about aerial networks or transmissions in clear environments, the laser is difficult to match. For the Power project leader in Darpa, Paul Jaffe, if it does not work with optics, it will not work in any way. What does this advance mean (and what is not). Darpa’s experiment did not solve all the challenges of wireless energy transmission. Efficiency remains low, the system is not yet prepared to operate in adverse conditions, and the transmitted power, although notable, is far from what a commercial infrastructure would need. But that was not important. The important thing was to demonstrate that technology can work outside the laboratory, with accessible components and in realistic terms. Images | Darpa (the main image shows an earlier test in 2019, at a lesser distance) In Xataka | Antimony under another flag: the Chinese mineral that continues to enter the US disguised for Thai or Mexican export

An researcher proposed a game to Chatgpt. What he received in return was functional keys from Windows 10

Sometimes, the most effective is the simplest. That thought Marco Figueroa, cybersecurity researcher, when last week decided to test The limits of Chatgpt. The proposal was as innocent as disconcerting: a riddle game, without technical attacks or explicit intentions. Instead of seeking vulnerabilities in the code, he focused on language. And it worked: he managed to make the system return something that, according to himself, should never have appeared on the screen. The result were generic key installation of Windows 10 For business environments. The key was to disguise him. What Figueroa wanted to check was not if he could force the system to deliver forbidden information, but if it was enough to present the right context. He reformulated interaction as a harmless challenge: a kind of riddle in which AI should think of a real text chain, while the user tried to discover it through closed questions. Throughout the conversation, the model did not detect any threat. He responded normally, as if he were playing. But the most critical part came at the end. When introducing the phrase “I Give Up” – I rindo – Figueroa activated the final answer: the model revealed a product key, as it had been stipulated in the rules of the game. It was not a casual carelessness, but a combination of carefully designed instructions to overcome the filters without raising suspicions. The filters were there, but they were not enough. Systems such as Chatgpt are trained to block any attempt to obtain sensitive data: from passwords to malicious links or activation keys. These filters are known as Guardrailsand combine black lists of terms, contextual recognition and intervention mechanisms against potentially harmful content. In theory, asking for a Windows key should automatically activate those filters. But in this case, the model did not identify the situation as dangerous. There were no suspicious words, or direct structures that alerted their protection systems. Everything was raised as a game, and in that context, the AI acted as if it were fulfilling a harmless slogan. What seemed harmless was camouflaged. One of the elements that made the failure possible was a simple obfuscation technique. Instead of writing directly expressions such as “Windows 10 Serial Number”, Figueroa introduced small HTML labels between words. The model, interpreting the structure as something irrelevant, ignored the real content. Why it worked (and why just worrying). One of the reasons why the model offered that response was the type of key revealed. It was not a unique key or linked to a specific user. Apparently it was a generic installation key (GVLK)such as those used in business environments for massive displays. These keys, publicly documented by Microsoft, only work if they are connected to a KMS (Key Management Service) server that validates network activation. The problem was not only the content, but the reasoning. The model understood the conversation as a logical challenge and not as an attempt to evasion. Did not activate its alert systems because the attack did not seem an attack It’s not just a key problem. The test was not limited to an anecdotal issue. According to Figueroa himself, the same logic could be applied to try to access another type of sensitive information: from links that lead to malicious sites to restricted content or personal identifiers. Everything would depend on the way the interaction is formulated and whether the model is capable – or not – to interpret the context as a suspect. In this case, the keys appeared without their origin being completely clear. The report does not specify whether this information is part of the model training data, if it was generated from already learned patterns, or if external sources were accessed. Whatever the road, the result was the same: a barrier that should be impassable ended up giving up. Xataka with Gemini | Aerps.com In Xataka | Granada promised them very happy with their new degree of the university. Until his feet stopped

Deepseek marked a turning point in the AI race. Now another Chinese company wants to imitate its success: Kimi K2 is born

The Chinese startup Monshot AI has presented Kimi K2, an open -source artificial intelligence model that arrives with outstanding programming capabilities and autonomous tasks that, according to The published benchmarksThey spray competition in several of their models. Its launch occurs at a key moment for the sector, when Chinese companies seek to replicate the disruptive success of Deepseek with potential height models and much cheaper than market alternatives. Kimi does not come from nothing. MoNshot ai was one of the most promising startups in the Chinese ecosystem of AI and that giants like Alibaba have invested greatly. His Kimi chatbot reached third place in monthly active users in August 2024, but fell to the seventh in June After the emergence of Deepseek R1 in January. Now try to recover ground with a strategy that combines open source and aggressive prices, following the formula that catapulted Deepseek. Image: MoNshot AI What Kimi K2 offers. The model has 1 billion total parameters and 32,000 million activated parameters, using The well-known Mixture-Of-Experts architecture to optimize computational costs. It is presented in two versions: a base for researchers and developers, and another optimized for conversation and autonomous tasks. Kimi K2 thus becomes Moonshot AI’s proposal with the ability to act as an intelligent agent to use tools, write code, complete workflows or talk, among other tasks. Kimi K2 explained in numbers. In performance testsKimi K2 has achieved 65.8% precision at Swe-Bench Verified, one of the most demanding benchmarks for software engineering. In LivecodeBench it reached 53.7%, exceeding 46.9% of Deepseek-V3 and 44.7% of GPT-4.1. In mathematics, its 97.4% score in Math-500 exceeds 92.4% of GPT-4.1, suggesting significant advances in mathematical reasoning. The price factor. MoNshot is charging $ 0.15 per million input tokens and $ 2.50 per million tokens out of the developers who use their API. Compared, Claude Opus 4 It charges 100 times more for the entrance (15 dollars) and 30 times more for the output ($ 75), while GPT-4.1 charges 2 dollars per entrance and 8 per exit. In addition, the model is available for free in Web applications and Kimi mobile, without monthly subscriptions that require chatgpt or Claude for their most advanced models. Technical innovation. MoNshot has developed the MuCanclip optimizer, which allows train models of one billion parameters “With zero training instability.” This technology could drastically reduce the training costs of large models, a problem that has limited the development of AI to companies with greater resources. Double channel strategy. The company offers so much Free access to the source code as payment API at a very competitive price. This strategy allows companies to start with the API for immediate implementation and then migrate to self -healing versions either by regulatory cost or compliance. And it is that each developer who downloads Kimi K2 becomes a potential business client. Moment of inflection. Kimi K2 represents a convergence point where open source models and proprietary alternatives shake hands. MoNshot AI intends to turn Kimi into a tool for everything, while offering its open source model and is reserved to charge for the use of its API for all types of implementations. And now what. The launch reaches a critical point in which both Openai, such as Google or Anthropic, must respond to this wave of cheap and high quality language models. The issue is no longer whether open source models can match the owners, but if large technological ones can adapt their business models fast enough to compete in this new scenario. The looks are put in GPT-5 And in the next movements of the industry at a rate, as always, accelerated. Cover image | Xataka with Mockuuuups Studio and Kimi AI In Xataka | Grok 4 destroys the tests and aims to be the most advanced AI model. The problem is that Elon Musk continues to sabotage his answers

The residents of Madrid had been yearning for the Soterramiento of the A-5. Now he is making his life impossible

Without water, without light and without internet. These are the inconveniences that some residents of the neighborhoods of Aluche or Batán have had, next to the supporting works of the A-5, the highway that will disappear under the feet at their entrance to Madrid. But also continuous traffic jams, a firm proof of SUVs and, in summary, inconveniences that promise to stay for years. And that affect far beyond the residents of the area. The last claim. Alcorcón, Móstoles, Arroyomolinos or Navalcarnero are just some of the municipalities directly affected by the Soterrament works of the A-5. Every day, about 80,000 vehicles, According to data from the Madrid City CouncilThey access the city in this way. Obviously, putting a plug in the entrance in the form of a mega -Obra has caused overflow. The overflow to roads and adjacent streets but, above all, has overflowed the patience of the residents of these municipalities who ask that Four winds military land are opened (without use) to take advantage of them as deterrent parking lots. Why four winds? This neighborhood with a subway stop and Cercanías has become the nerve point of the entrance to Madrid. If everything goes correctly, It has a connection with Atocha In about 20-25 minutes. Yes, as we said, everything works correctly. Currently, this area has been reserved as a hot point so that the buses that were as destination Principe Pío or elliptical square and entered through the A-5 left the travelers and cease their trips. A decision that, in the first days, caused huge chaos. Daily jams. The underground has evidently caused that the traffic jams multiply in the area. Of the three or four lanes (depending on the area) that had so far available in each direction, Only two are operational. And, while the underground works are carried out in a sense, the vehicles circulate through the opposite section. The initial plan He was going to maintain the works for at least 25 months. However, the project has ended up expanding to the connection with the M-40 which Expand the stretch of works in another 700 meters. It was a claim of the neighbors who were assured that this would take place at first and, nevertheless, The idea had been discarded When the machines began working in the area. But the condition goes far beyond the jams. Without light. May 12, 2025. Batán neighbors spend part of the morning in the dark. Some 4,600 subscribers to Iberdrola see the light of their homes and businesses cut due to a fault caused by the accidental cut of a cable that travels through the area affected by the underground. Without water. May 19, 2025. As soon as a week passes when Aluche’s neighbors have problems of light and water in their homes and businesses again. This time the condition was recorded at 11 at night. They distributed pallets with bottled water to pass the bad drink in what the fault lasted. The reason: a stoopy pipe. Without internet. July 7, 2025. The most recent condition. The error this time takes a fiber optic cable in the works which leaves Movistar subscribers without internet in Aluche and part of Pozuelo, a town located on the other side of the country house, with which they border the works. The fault was not solved until the next day. A little hell. Yes, in Xataka We know that some neighbors have suffered the plenary of breakdowns and have been found without light, without water and without internet in less than two months. To this we must add, as we say, the usual traffic jams in the area, the cut of some steps that lightened the paths (as the departure to Boadilla from Seseña Street) or a very deteriorated firm that is suffering the passage of heavy machinery. The promise of a better place should give some hope to neighbors. Similar works made reborn what is now known as Madrid Río, a huge park with which Madrid won 120 green hectares and 30 kilometers of cycling paths. In addition, the square meter was revalued at 500 euros. Of course, for those who live in the surrounding municipalities, the improvement will only enjoy it if they express stop in the area once it is finished. Photo | Madrid City Council In Xataka | Guide not to be lost in Madrid with the megaobra and underground of the A-5: deadlines, traffic cuts and public transportation

A fine of 3,000 euros

They are not exactly like agents under the orders Gil Grisson or HORATIO ‘H’ CAINEbut Alcalá de Henares has its own CSI, a body of experts that is responsible for traveling the city with latex gloves, isopos and test tubes. In the scenarios of the crime in which they work, yes, there are no corpses or blood, but cacas. Literally. Their work is to examine them, take DNA samples and facilitate that the weight of the law falls on the owners of uncivic pets. His work does not end murderers between bars, but in large fines. An “carelessness” that comes out expensive. That dogs are the best friend of man does not mean that men are always at their height. Sometimes he arrives with a walk in the park to verify it: although the municipal ordinances often force the owners of the dogs to collect their cacas, there are those who are a blind eye and disregard them. A few years ago in Alcalá de Henares (200,700 neighbors) They decided to avoid it in a peculiar way: with the help of DNA and a ‘CSI’. At the beginning of 2020 the plenary approved modify your ordinance to include a “census Through ‘DNA’ “genetic footprint on which all the dogs living in the municipality are included. The objective? Have a more precise idea of the total number of pets, identify abandoned or stolen dogs, have more information in cases of bites and … locate the ‘owners’ of abandoned cacas on sidewalks and parks, which can derive in fines of fines Between 300 and 3,000 euros. And how do they do it? The process explained in detail this weekend The Spanish newspaper in A report in which he speaks of “the detectives ‘Cazacacas’” by Alcalá de Henares. The system is actually quite simple and relies on two pillars. The first is the veterinary consultations, where saliva samples of the dogs are taken that is then analyzed in a specialized laboratory. When the process is completed, they end up registered in the census and the animal happens to have a “DNA identification card” and a sheet with a QR for the pet. The second leg of the system are Special controls made from time to time by the City Council to ‘hunt’ to offenders. From parks to the laboratory. That is when the game enters the ‘canine csi’. A specialized technician and the Local Police are responsible for looking for abandoned bugs in the street and taking samples with a baston and then sending them to a laboratory in Xàtiva, Valencia. There they have a database with more than 150,000 animals from all over the country that allows them to collate the sample. If there is Match Find out who is his ‘owner’ and (most importantly) the owner of his owner, who will face a mild infraction with fines of Between 300 and 3,000 euros. Have you put fines? Yes. The ordinance that forces dogs to censor DNA was activated just two years ago and since then the City Council has processed a few fines. In February 2024, 221 collected samples already resulted in 75 files Sanctioners Last year they were counted in total 206 fines. In 97 cases for abandoned bacons. In the remaining 109 the reason was a more common infraction: not censor the animal. At the beginning of the year the canine municipal register through DNA accounted for 9,099 dogsa figure that now is around 9,500, according to The data that manages The newspaper. The newspaper also states that since the measure was launched by the Complutense City Council collected more than 500 samples and opened 245 sanctioning files, 120 for not collecting the cacas and 125 for breaching the obligation to register the animal. In both cases the fine is the same: 300 to 3,000 euros. Beyond Alcalá de Henares. Alcalá de Henares is not the only one who has resorted to DNA so that its pedestrians stop being dog -cacas in the parks. Other municipalities such as Mislata, Malaga, Collado Villalba, Cornellà They have also set the possibilities of the genetic census to hunt the owners of uncivic dogs. Moreover, in December Pipper on Tour calculated that in Spain there are 81 municipalities that register the DNA of macotas to keep its streets clean. Images | Wikipedia and Jack Lucas Smith (UNSPLASH), M. hairstyle (Flickr) Via | EPE In Xataka | If the question is how to prevent people from throwing garbage outside the cubes, in Galicia they have had an idea: rummage into it

The scam of the son in trouble brings the police and the AI is getting worse

“Hello, mom. My phone has broken” like this or with some similar message begins the known as Son scam in trouble. This scam modality has been circulating for a long time and brought to the head authorities for its High effectiveness. The National Police has dismantled an organization that was dedicated to this scam and that it cheated large amounts of money. It has not been (nor will it) the only one. 32 detainees. The investigation began nine months ago and has resulted in 32 arrests in the province of Valencia, of which four acted as “mule” captors. Were . Thanks to these arrests, 63 complaints filed throughout the country have been resolved, whose total amount amounts to no less than 320,000 euros. In addition, the police have managed to block several fraudulent transfers and return to the victims more than 10,000 euros. A recurring scam. Although it is a large operation, it is not the first organization that is disjointed that used this modality of fraud. A little over a year ago The Civil Guard arrested a hundred people that came to cheat 850,000 euros. In July of last year an operation was also carried out with 65 detainees who had scammed 410,000 euros. And there has been more. Just a few days ago A neighbor from A Coruña who cheated 5,000 euroshe denounced and thanks to this, those responsible were arrested. Too effective. Scams that come by WhatsApp There are many, but few who get so many victims and figures so high. This modality of fraud is very effective, which makes it the most dangerous. According to the Civil Guardscammers study the victims, who have a child emancipated by studies or travel. The scammers create “an instant emotional connection after which they move the urgency with messages of despair, causing the parental protection reaction.” We normally distrust when they write to us from unknown numbers, but in this case the pretext of having lost the main mobile is used, so the main doubt is resolved. If the scammers have chosen their victim well, it is very easy to create the story and end up sending a bizum to their supposed son or daughter. The next level: AI. Although they are not the most common, there are cases in which Voices generated by AI have been used to cheat To the victims. It was the case of an American citizen who received a call in which he listened to his daughter to shout that they were going to harm him if he did not pay. The National Police He has warned about what they call ‘Voice Hacking’ and gave a trick to protect us: Use a family password. And how do they clon the voice? With tools like Vall-e only Three seconds are necessarysomething very easy to get social networks. Protect yourself. Although the authorities are making efforts such as the operation that has taken place in Valencia, eradicating it completely seems quite complicated so the best is prevention. The first thing if you receive a message of this type is to try to write or call the original number to see if the person answers. You can also ask you to send you an audio, although it is much better to make a video call since you avoid a possible ‘voice hacking’. In short, if someone asks for money and also has a hurry, always distrust. In Xataka | After the Sonny Angel, the madness of Labubu arrives in Spain. They are exhausted everywhere and there are already scams and falsifications

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.