An army of 25,000 North Koreans addresses Russia. They will not fight, they will build the biggest army of kamikaze drones

It is taking place A paradox in the war that is taking place in Europe. While Ukraine has weakened Russian artillery, another growing threat has been increasing more and more over the months. If kyiv became a industry of combat drones in record time, Moscow is determined to overcome. As? To begin with, with the arrival of thousands of North Koreans. Drones, workers and an alliance. The strategic alliance between Russia and North Korea has ceased to be a marginal cooperation to become a structural axis with direct implications in the evolution of the war in Ukraine and in the security architecture of Eastern Asia. According to diplomatic sources cited in media Japanese and Western, Pyongyang has begun to send an army of up to 25,000 workers to the Special Economic Zone of Alabuga, in the Russian Republic of Tartaristan. THE OBJECTIVE: Massive support the industrial production of Shahed dronesof Iranian origin, used by Moscow As a main weapon of saturation and attack in Ukraine. But there is more. This collaboration also includes knowledge transfer operational, training in the use of unmanned systems, and a component of reconstruction aid in combat areas, Like Kurskwhich has suffered important damage from the Ukrainian offensive of August 2024. The arrival of North Korean personnel not only represents a solution to the growing labor shortage qualified in Russia, but also contributes to consolidating a political and military axis based on convergent interests against the West. Mass kamikazes. The Alabuga factory, epicenter of the Russian Drones Shahed program, currently produces some 2,000 units per month with the objective of reach 5,000 Thanks to this new workforce. In fact, satellites They have detected an enormous expansion in the industrial zone, with the construction of Collective bedrooms designed to accommodate hundreds of workersfollowing an intensive and permanent occupation architecture. The logistics reinforcement aims to guarantee the continuity of production even under direct threat, since the plant has repeatedly suffered attacks by Ukrainian drones, as it happened June 15 with a Airrakt A-22 loaded with explosives that towed a glider, unpublished tactics Until then and capable of attacking two goals simultaneously. Russian Drones Shahed A key drone. The Russian need to maintain pressure on Ukrainian defenses has turned Shahed into the backbone of his aerial offensive. It We have counted before: these vehicles are modified to carry major explosive loads and, in some cases, elements of autonomy that make them more difficult to intercept. He massive use (With attacks that reach more than a hundred drones per night) it forces Ukraine to accelerate their anti -aircraft reserves, progressively weakening their defense and reaction capacity. Rebuild with military logic. The sending of North Korean workers is not limited to the production of weapons. After his visit to Pyongyang, Russian Defense Minister Serguéi Shoigú, confirmed the incorporation of about 1,000 North Korean and at least 5,000 civil workers which will participate in the reconstruction of destroyed infrastructure in Kursk. This region, invaded by Ukrainian forces In August 2024 And recovered by Russia after weeks of combat, it has been deeply damaged. Moscow considers its reconstruction essential both in terms of national morals and the logistics sustainability of the front. Not just that. They counted the Twz analysts that the initiative also responds to a Internal logic: Kremlin perceives Central Asian migrants as politically unstable and potentially vulnerable to recruitment for Western or Ukrainian intelligence services, which has driven the search of “Leales migrants”like North Koreans. A labor hybrid. According to General Ukrainian Kyrylo Budanovpart of these workers will end up signing Contracts with the Ministry Russian defense, constituting unofficial units of Russian nationality but North Korean origin, which would mark a new step in hybridization between foreign workforce and regular military structure. Inverse technological transfer. It is another leg to analyze. The alliance has an even deeper geopolitical dimension. According to BudanovRussia is actively helping North Korea to improve the accuracy of Your KN-23 ballistic missilesto Modernize your missiles long-range air-air and reinforce the capacities of Its nuclear submarinesparticularly in relation to missile launch from submerged platforms. Strategic evolution. In exchange for Labor and Cooperation Logistics, Moscow is consolidating a North Korean offensive capacity that could alter military balance in the Korean peninsula. In that sense and how We countPyongyang is developing (with Russian assistance) the necessary infrastructure to produce local versions Of the Shahed drones, which would endow the regime of Kim Jong-un of an arsenal capable of, for example, saturate the aerial defenses of South Korea through mass and simultaneous attacks. This change represents a strategic evolution for a country that until a few years ago operated outside the large global military production chains, but now emerges as a relevant actor in asymmetric technological warfare. “Other” world order. In short, the image of a giant factory where thousands of Russians and North Koreans come together In a Shahed drone assembly line, that Moscow-Pyongyang alliance at a new level. If you also want, it marks the emergence of an authoritarian axis not only military, but also economic and structuralthat frontally challenges the Western Alliances System. What doubt fits, if Russia manages to stabilize its forehead through Drones produced by mass With North Korean help and at the same time strengthens Pyongyang’s strategic capabilities in Asia, global security architecture will experience A dangerous mutation. Now it is not simply an exchange of resources for services, but the training of a Coordinated Interest Network With a shared narrative against the United States, Europe and its Asian allies. Image | KNCA, X. In Xataka | North Korea has been sending armament for months to Russia. In return, Russia is giving him what longs for her: a functional army In Xataka | Ukraine is surviving in the war thanks to the drones. Russia has an ally to change that: North Korea

How I learned to use several email addresses to keep all my protected digital accounts

A few years ago, when I dedicated myself to repair home computers, it occurred to me to print some professional visit cards so that my clients could easily contact me. In addition to including my phone number, which only allowed to send text messages because WhatsApp was barely taking its first steps, I added my email. I still remember leaving the printing press with a handful of cards in my hands, excited to start distributing them. But as soon as I cross the door, I realized that I had made a mistake: I used my main email. Until that time, it had remained relatively “secret”, but that changed at the moment it was printed on my cards. And it was the same email that I used as an access door to my digital life. I had just exposed it without realizing it. A concern invaded me instantly, accompanied by several questions about the associated risks. What if someone tried access my accounts without permission? Could I use the mail that was on my cards along with the information about me on Facebook to try to guess my security response? And what would happen to the services I had linked? The risk was minimal, I should not expose my main email. My immediate reaction was to create an exclusive secondary account for other services, while the direction printed on the card was only for professional contact. If your security was compromised, the impact would be limited. My accounts on electronic commerce platforms, social networks and other services would continue to have a recovery account other than the main one. Having a single email address for everything was a mistake To better understand why this caution is important, let’s put us for a moment in the mind of a cybercrime. If as an attacker he can access the main mail of a victim, I can easily explore his entrance tray to discover what other services he uses. For example, when you find Amazon emails or social networks, you could request restore passwords directly. If the victim also made the frequent mistake of reusing the same password – and somehow I have achieved it – I would not even have to strive a lot: it would be enough to try that key to accessing multiple platforms, generating a serious domino effect. The aforementioned solution was only temporary. It served me for a while, but we live in such a dynamic world that forces us to evolve, not only to take better advantage of technology, but also to guarantee our safety and privacy. Over the years, keep a contact email and another “secret” ceased to be enough. I discovered that my contact email was not so public or the “secret” so private. Although the latter was not on my card, I trusted any online service that asked me to register. And, as we know, companies, no matter how big they are, do not always protect the data of their users. There have been notorious cases of leaks, Like Yahoo’s 2016 o The Quora of 2018. Although I had never shared it directly with other people, the amount of spam and fraudulent emails that I received made me suspect that my email address had been filtered on the Dark Web, That dark internet area where personal information circulates as a currency. After all, my email was probably part of some database sold to the highest bidder. Of course, among the undessed emails there were also classic scams Like the Nigerian Prince. LinkedIn, at that time, publicly showed the email address of the users who enabled that option in the privacy settings. In addition, there were those who collected this data for mass shipments, which explained the amount of newsletters and unre requested messages that came to be connected to certain people. I soon understood that I needed more than my own emails, because, like many, I had had others assigned by third parties, such as the University or those of work, which are usually deactivated by disconnecting from the institution. I decided to take the necessary measures to improve this aspect of my digital life, which meant Create other mail accounts. Thus were structured: Contact email: Public address so that anyone can write to me. Private mail for services: Exclusive for login and recovery of accounts. Work mail: For everything related to my professional activity. Mail for Newsletters: To receive and manage subscriptions without saturating other accounts. Mail focused on privacy: Proton mail account with end -to -end encryption and tracker lock. In all I tried to apply the maximum security measures: two steps verification, Passkeysrecovery keys, robust passwords, etc. In addition, I incorporated the use of a password manager to avoid the risk of reusing credentials and to generate unique and safe keys for each service. I opted for a reputed manager who allows me to store them safely without depending on memory or physical annotations that can be violated. I also started using “Log in with Apple”With my private email for services, which allows me to hide my real address through random emails (@privateatelay.com). To this I added the Temporary ICloud+ Correos (@icloud.com), Ideal for records on platforms that do not inspire me confidence or whose data protection policy raises doubts. To reinforce security, I implemented multiple recovery methods. Thus, if a method does not work, I always have another access road. This is essential because any recovery method can give problems. If I lose my mobile phone and it is my only access road to my account, I would be in a serious inconvenience. However, having both a telephone number and an associated email, I can recover access without depending on a single factor. The same goes for alternative verification codes: if I do not have immediate access to my phone, I can use one of those previously stored codes to log in safely. Having multiple access recovery methods is not a luxury, but a necessity. In a world where everything … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.