The US has had a grain for “Iran”. The United Kingdom does not allow its bombers to enter a secret island that is key to the attack

Since the Cold War, many of the great powers have understood that modern wars do not begin when the first plane takes off, but when secures access to the bases from which it will take off. Sometimes the deciding factor is not so much firepower, but the key that opens or closes a key clue at the exact location on the map. That is happening right now on a lost atoll. A problem with name and surname. The United States has had a major problem for “the Iran thing” and it is not in Tehran, but in the Indian Ocean. United Kingdom refuses to authorize the use of Diego García Island and the RAF Fairford base for a possible air campaign against the Islamic Republic, alleging that it could violate international law if it is a preventive attack. Without that permission, Washington loses two key platforms to project its long-range air power, just when the president has given an ultimatum to Iran and has hinted that in a matter of days he could decide between an agreement or a military operation. The secret island that sustains long wars. It we count some time ago. Located halfway between the east coast of Africa and the west coast of Indonesia, The island was part of the Chagos Archipelago. During the 18th century, it was colonized by the French as an agricultural settlement. So they took the Chagossians, descendants of slaves from Africa and India, to the islands to work on growing coconut trees for the production of copra (dried coconut meat). Over time, the locals developed their own culture and dialect, known as Chagossian Creole. By 1814, after Napoleon’s defeat, The island came under British control as part of the Treaty of Parisintegrating into the colony of Mauritius. Throughout the 19th century, life on the island continued with a small population dedicated to agriculture and fishing, but things were about to change with the beginning of the new century. The agreement. During the Cold War, The United States and the United Kingdom sealed an agreement. Both nations saw the island as a strategic location for a secret military base in the Indian Ocean. In 1965, the British separated the Chagos Islands from Mauritius, thus forming the British Indian Ocean Territory (BIOT), which also includes the other 57 islands of the Chagos Archipelago. By 1966, he signed a secret agreement with the United States, allowing the construction of the “secret” military base. Key node. Since then, Diego García is anything but any base, because he is one of the more strategic enclaves of the Pentagon in the Indian Ocean. Its central runway, its port capable of hosting nuclear submarines and its logistics infrastructure allow strategic bombers to be deployed, maintained and rearmed in sustained cycles. Without going too far, last year it already served as a pressure platform when several B-2s arrived in a clear message to Iran, and precisely that type of deployment is what is now conspicuous by its absence. That there are no visible bomber movements towards the island reinforces the idea that the british veto is conditioning military planning. Without bases there are no prolonged campaigns. The geographical difference is abysmal and explains the tension. From Diego García to Iran there are around 2,300 kilometers, from the United States more than 6,000. That distance sets the pace of departuresthe wear and tear of the crews and the intensity of the offensive. For a one-night operation you can fly round trip from Missouri, as was the case in previous attacks, but for a campaign a week or more against nuclear installations, military commands and missile launchers, advanced bases are needed that allow constant sorties to be generated. In other words, without access to the island and Fairford, the role of the B-2, B-1 or B-52 is greatly reduced and the plan loses volume. A clash between allies. The disagreement is not only technical, it is deeply political. London maintains that supporting an attack could implicate it legally if it knows the circumstances of an action considered unlawful, and the prime minister has marked distances with the White House. Washington, for its part, has responded hardening the tone and linking the refusal to the dispute over the future of Diego García within the Chagos Archipelago, whose status and possible transfer to Mauritius have opened a diplomatic rift. Thus, what began as a legal debate has led to a strategic struggle between historical allies. The war that is amplified without the key piece. Meanwhile, the United States continues to accumulate fighters, electronic warfare aircraft and resuppliers in the region, preparing the board as if the military option was still alive and imminent. It turns out that the heart of a prolonged air campaign is not the F-22s in transit, but those strategic bombers operating from a secure and nearby base. Yes UK maintains the vetoWashington will have more distant and less efficient alternatives, which would force the scope and intensity of the blow to be redesigned. In short, in full escalation with Iranthe piece that could do it all more simple For Washington it is precisely the one that blocks the movement today. Image | Department of DefenseRoyal Air Force, US Air Force In Xataka | One of the most remote islands was taken 60 years ago by the United Kingdom and the United States. Since then, what happens there has been a secret. In Xataka | If the most advanced US nuclear aircraft carrier maintains its speed, it will reach its destination on Sunday. Not good news for a nation

We don’t know if the US is going to attack Iran. We do know that it is carrying out the largest military deployment in the Middle East since Iraq

In major international crises there is a almost imperceptible moment in which the tension stops being rhetorical and begins to be measured in real movements. History shows that when the pieces begin to be placed with that precision, the outcome It rarely depends on words alone. Therefore, when they pass 20 tanker aircraft across Europe in a single day and the maps tell us that the largest aircraft carrier in the United States is four days to reach its destination, the outcome can only be an ockham razor. A display that is already historic. Of course, we don’t know for sure whether the United States is going to attack Iran. What we do know is that it is running the largest air deployment in the Middle East since the invasion of Iraq in 2003, a concentration of power which cannot be explained as simple diplomatic pressure. There are currently dozens of stealth fighters, command and control aircraft, anti-missile systems and two aircraft carrier groups taking up positions while the White House insists that diplomacy still on the table. The question is not whether Washington has the capacity to strike, but when and to what extent it would decide to do so. And if the satellite maps they don’t lieon Sunday morning everything would be ready. Stealth fighters in motion. The radars have indicated For several days now, the F-22, F-35 and F-16 have been crossing the Atlantic in waves, reinforcing bases in Jordan and Saudi Arabia that are becoming launching pads for a sustained campaign. Them F-15E are addedelectronic warfare aircraft and air communications nodes that allow complex operations to be coordinated. It is not the pattern a specific attack like the one perpetrated in Iran with the Operation Midnight Hammerbut rather the architecture of a “heavy” and prolonged air war, one capable to last weeksbut more, with targets ranging from nuclear facilities to missile depots and Islamic Revolutionary Guard Corps centers. AWACS to the limit. There are six Boeing E-3 Sentry, That is, almost 40% of an aging fleet with low availability, warning and control systems that have been sent to Europe and the Middle East. We talk about the floating brain that manage air combatcoordinates interceptions and detects drones and cruise missiles at low altitude. Its massive deployment indicates that planners are setting up an environment “high intensity battle”but at the same time it reveals a structural vulnerability of Washington: the United States depends on a small and old fleet to direct one of the most complex campaigns on the planet. U.S. Ford Patriots, THAAD and defending against retaliation. There is no doubt, in such a movementreinforcement is not just offensive. Patriot Systems and THAAD They have come forward to protect the surrounding 30,000-40,000 soldiers Americans scattered in the region and allies like Israel. This gives us an idea of ​​what to expect. Washington assumes that any attack would trigger a response with ballistic missiles, kamikaze drones and possibly attempts to close the Strait of Hormuz. The deployment seeks to ensure that, if retaliation comes, it can absorb the blow without paralyzing the operation. Two aircraft carriers and a “navy” visible in space. He USS Abraham Lincoln already operates in the area with Aegis destroyers and nuclear submarines, while the USS Gerald R. Ford keep it up from the Atlantic after crossing near Gibraltar. As we said, if it maintains its current speed, it will be off the coast of Israel on sunday morning and will be able to reinforce air defense in the event of an immediate Iranian retaliation. Two combat groups with F/A-18, F-35C and electronic warfare aircraft provide mobile power, missile defense and sustained strike capability. That is to say, it is not a symbolic presence, it is an unequivocal sign of preparation for real combat. Trajectory of the American aircraft carrier US Ford Tehran, Moscow and Beijing for internships. While Washington concentrates forces, Iran is currently carrying out naval exercises with Russia and China in the Strait of Hormuz. The presence of Russian and Chinese ships does not alter the military balance against the United States Navy, but it adds a layer if you want. politics and risk which requires planning with greater caution. In this regard, Iran has also closed parts of the strait for maneuvers with anti-ship missiles and drones, stressing that any war would not be a limited exchange, but an escalation with global impact on the oil and sea routes. An outrage for ambiguous objectives. The accumulation of forces It allows, a priori, multiple scenarios: from a limited attack against nuclear facilities to a campaign aimed at degrading missile capacity or even weakening the regime. Be that as it may, technological and aerial superiority does not resolve the political mystery of what would happen next. Without ground forces or a broad coalition, a protracted war would depend almost exclusively on air and naval power. In that regard, The New York Times said that the White House has received plans designed to maximize the damage, but has not yet made a final decision. Pressure as a strategic weapon. With such a scenario there are not many options. Either the deployment is a prelude to an attack, or we are dealing with a tool unprecedented pressure aimed at forcing concessions at the negotiating table. Some analysts believe that the show of force they have in front of them right now could convince to Tehran that Washington is going all out. Others warn that the same preparation that increases military credibility also reduce the margin to retreat without any political cost. One thing is clear: at this point, the movement of parts It is already historical and hyperbolic, and the only thing left is to know if it will remain a threat or will become an open war of unpredictable dimensions. Image | TREVOR MCBRIDE, US Army Aerial, RawPixel, BORN In Xataka | Tension in Iran is so high that the Strait of Hormuz is closed. And that will have consequences when … Read more

The United Kingdom has always been a country of pets, but fear has triggered a dangerous demand: dogs ready to attack

The proverb says that the dog is man’s best friend. In United Kingdom more and more people He believes he can be something more: his best protector. At least that is the feeling conveyed by dog ​​training companies, which have found a curious increase in demand thanks to the visibility that networks and networks are giving them. celebrities. They are not cheap, they carry many more responsibilities than a ‘conventional’ pet and they operate within a complex legal framework, but that does not prevent the fact that on the other side of the English Channel it is increasingly easier to come across dogs ready to jump at the command of their owners. There are those who prediction even that personal defense dogs are a billion-dollar market that is rapidly expanding in the United Kingdom. What has happened? That the training of defense dogs is becoming an increasingly profitable business in the United Kingdom. We know it thanks to Guardianwhich a few days ago published an extensive report in which he explains that this type of pets, ready to obey the orders of their owners and defend them with hooves and teeth (in the most literal sense of the expression) if necessary, is experiencing considerable growth. There are not many statistics or official data that corroborate the trend (Guardian does not provide them at least), but of course the message from the sector is clear. “Demand has increased, without a doubt,” confirms Alaster Bly, founder of K9 Guarda company specializing in “highly trained security guard dogs.” There are even trainers who offer special courses to train pets that people already have in their homes. Has demand increased that much? A quick search Google shows a good number of British companies and blogs dedicated to the same thing: selling or informing about defense dogs. And that’s not the only clue. There are even market reports that assure that it is a business in full expansion. A recent study published by AdAstra Solution estimated the size of the British protection dog market at 1.2 billion dollars in 2024. Its forecast is that in just a decade it will rise to 2.5 billion, with a growth rate CAGR of 9.2%. The key is not only that these pets arouse more interest, but that they are expanding their demand base. What does that mean? That dogs trained to serve as bodyguards seem to be ‘becoming popular’ in the United Kingdom. They are far from being a mass phenomenon, but something has changed: they are no longer a ‘whim’ of the wealthiest families or professionals in the security field. According to confirm Guardian After interviewing professionals in the sector, the panorama is changing little by little, as demand increases. Bly acknowledges that the majority of his clients are still wealthy people, but he has also seen growing interest from families who are not wealthy and simply want to “invest in security.” The reasons for this change? There are two that seem key. The first is concern about crime. Although official statistics can be contradictoryStatista tables reflect that the number of violent crimes against people recorded by the police in England and Wales have increased in recent decades. And clearly. In fact, although they have decreased in recent years, they continue to remain well above the snow levels of the beginning of the 21st century. Are there more reasons? Yes. The networks. British reporter Elle Hunt remember that the increase in demand has gone hand in hand with greater media exposure of this type of dogs through various means. One is celebrities. In recent years, personalities such as Rochelle and Marvin Humes, Molly-Mae Hague, Katie Price, J.Terry…actors, singers, footballers and television personalities with well-identifiable faces in the United Kingdom. In the sector, there are those who remember that the increase in demand coincides with greater visibility through Instagram or TikTok of defense dog exhibitions and competitions. Schuzthunda canine agility sport. And how much do they cost? Much more than a ‘conventional’ dog. A trained dog requires considerable work that, sometimes, begins even before the dog is born. Bly works, for example, with hybrids of German and Belgian shepherds, a “very specific genetic mix” that allows it to adapt to its function. Hence they are not cheap. They cost (at least) £32,000. However, price is only one of the factors that the owner must take into account. ¿Is there anything else? Yes. Another factor, even more important, is the care and responsibility that comes with having a dog specially trained for defense. Guardian remember that these personal protection dogs have a complex legal framework, since they are not under the Guard Dogs Law, which does regulate animals in charge of protecting premises or professionals. “They receive the same treatment as any other dog,” explains a criminal lawyer. The problem is that standard home insurance policies can leave them out of your coverage. An important factor in a country that has seen how in recent years attacks increased of dogs recorded by the police. Images | Bignsmall Paws317 (Unsplash) and Wikipedia Via | Guardian In Xataka | Asturias has been fighting for years to have a decent train connection. And now he is also fighting to include his dogs

attack the trident that dominates the market

One more day, new bad news related to the RAM memory crisis. If you were expecting a Steam Machinenow you can expect it to be more expensive. The rise of AI is causing a component crisis that has no clear end. The SSDs have gone up in price a lot and have 32 GB of RAM on your PC It is the new “I have land.” All Big Tech needs more and, in the absence of it, Intel has chosen to get into it like an elephant in a china shop. Hand in hand with SoftBank to create its own memory chips for data centers and, in the process, take a bite out of the South Korean industry that controls the scene. No end in sight. Intel has been covered several times in recent days. Like a phoenix, it seems that the crisis is behind us and, after years of promises, realities begin. They are ready to start producing its new generation of processors, but also its CEO, Lip-Bu Tan, has commented that They will start producing GPUs for data centers. With that they want to take a bite of the cake that NVIDIA is eating almost alone, but also, the executive let a more bitter pill: “there is no relief in sight for the end of the AMR crisis.” So it points out that does not see a horizon for this price escalation before 2028, and it makes sense if we take into account recent forecasts or possible ‘strange’ movements by some companies. Intel 🤝 SoftBank. Market estimates such as those of TrendForce They point to a memory price increase of between 90 and 95% quarter-on-quarter in this first quarter of the year, but it is not the only thing: SSDs will also rise between 55 and 60% due to one of their components, NAND memory. It is a bad time to build a PC, although companies are moving to open RAM factories, but not for you: for the AI. And here Intel, as we already saidhe doesn’t want to be left behind. A few months ago, Intel partnered with Japan’s SoftBank to find a replacement for HBM memory for data centers. Fix a problem. HBM memory (high bandwidth memory) is ideal for data centers. They allow a large amount of data to be temporarily stored, and they do so at high speed. The problem is that they get very hot and are complex to manufacture. It is one of the key components of GPUs and requires both large amounts of power and optimal heat dissipation. What Intel and SoftBank are looking for is to create an alternative based on stacked DRAM chips. They are not that optimal, but the idea is to find a way to wire them as efficiently as possible so that they are a threat to the HBM memory monopoly. “Monopoly“The idea is to have a prototype in the short term with the aim of starting to market it by 2030. We will see if AI fever lasts so long. But anyway, if the experiment goes well, it could be a significant blow to the South Korean companies Samsung and SK Hynix, as well as the American company. Micron. They are the three companies that they practically control the market for both RAM like HBM chips. And something as important as it is symbolic: it will be the first time that Japan aspires to return to the throne of memory chip manufacturers that it ruled in the 80s and that it lost to South Korea. Although be careful: Samsung is also investigating these stacked DRAM memories. NVIDIA and its demands. In the end, they are all moving. The big producers have already detailed its roadmap for the development of RAM for the next five years. And the whales that are taking over the product -NVIDIA-, are ‘encouraging’ the production companies let’s get the batteries. Without going any further, a few days ago Jensen Huang, boss of NVIDIA, met with representatives of the Taiwanese industry (TSMC, Asus or Foxconn) and told them that this year he needed a lot of memory and a lot of wafers. Also I know it has told Samsung. As we said in the first lines, if you were hoping for a quick solution to the crisis or wanted to build a PC, the news is not good. And all the movements that we are seeing in the industry to expand production and find solutions point to the same direction: continue powering data centers. Images | Intel In Xataka | TSMC’s only problem was that it was in Taiwan. So the United States has decided to get her out of there

there is a type of attack that is impossible to block

The browser is no longer just a window to the Internet and is becoming a tool that also operates within the web. In the case of Agent Mode in ChatGPT AtlasOpenAI explains that its agent views pages and can perform actions, clicks, and keystrokes within the browser, just as a person would. The promise is clear, to help in everyday flows with the same context and the same data. The consequence is also, the more power we concentrate in an agent, the more attractive he becomes to whoever seeks to manipulate him. What is a prompt injection. In simple terms, a prompt injection is a technique that seeks to sneak malicious instructions into apparently normal content so that an artificial intelligence system interprets them as legitimate orders. IBM describes it as a type of cyber attack against language models in which malicious inputs are camouflaged as valid prompts to manipulate the behavior of the system. The objective can range from forcing inappropriate responses to causing information leaks or diverting a task, without the need to exploit classic software vulnerabilities. The root of the problem is less “magical” than it seems and more structural. Many language model applications combine developer instructions and user input as natural language text strings, without rigid separation by data type. The model decides what to prioritize based on learned patterns and the context of the text itself, not because there is an infallible boundary between “order” and “content.” If an external instruction is formulated convincingly, it may gain weight even though it should not. When the context becomes unfathomable. The risk is amplified when the agent does not process a single message, but rather goes through very different sources within the same order. OpenAI warns of a practically unlimited surface, emails and attachments, calendar invitations, shared documents, forums, social networks and arbitrary web pages. In that journey, the agent may encounter unreliable instructions mixed with legitimate content. The user doesn’t always see every step, but the system does consume it, and that’s where manipulation can creep in. The disturbing thing is that this can fit into ordinary workflows without raising any obvious alarm. The AI ​​signature describes an example where an attacker “seeds” an inbox with a malicious email, and later, when the user requests a harmless task, the agent reads that message during normal execution. In one case, the result is intentionally extreme, the agent ends up sending a resignation email instead of composing an automatic response. All this thanks to an external attack. Why there is no perfect shielding. In cybersecurity there is a widely assumed idea, no system is completely secure, and OpenAI frames prompt injection as a persistent problem. In his text he formulates it like this: “We hope that attackers continue to adapt. The injection of prompts, such as scams and social engineering on the web, will hardly be completely resolved.” The objective, therefore, is not to promise invulnerability, but to raise the cost of the attack and reduce the impact when something fails. In this context, those led by Sam Altman explain that it has deployed a security update for the Atlas agent motivated by a new class of attacks discovered through network teaming automated internal. The company says the delivery includes an adversarially trained agent model and strengthened safeguards around the system, intended to improve its resistance to unwanted instructions during navigation. What we do still matters. OpenAI recommends using the offline agent when you don’t need to access sites with an account, and calmly review confirmation requests for sensitive actions, such as sending an email or completing a purchase. He also advises giving explicit and limited instructions, avoiding overly broad assignments that force the agent to go through large volumes of content. It does not eliminate risk, but it reduces opportunities for manipulation and helps existing controls work as designed. Images | OpenAI In Xataka | How often should we change ALL our passwords according to three cybersecurity experts

the first “drone” attack in history

If the war in Ukraine has shown us anything, it is that the rules of the game have changed. The drones dominate the battlefield and they don’t have to be cutting-edge creations: commercial and recreational drones They can perform precision attacks. However, the technical and even psychological foundations were laid more than 175 years ago, when the Austro-Hungarian Empire carried out the first bombing with unmanned vehicles of history against Venice. In the mid-19th century, today’s Italy did not exist. The territories were fragmented into a series of kingdomss, but within the framework of the liberal revolutions of 1848, some of those kingdoms tried to become independent from the control of the Austrian Empire. That same year, Venice rebelled and proclaimed itself the ‘Republic of San Marco’. It was a symbol of resistance to Austrian rule and, evidently, the Empire was not going to let it pass. Led by Marshal Radetzkythe Empire carried out a siege of the city, but as you might already guess, Venice is not an easy city to attack due to the “natural” defenses of the canals. Yes, in a war of attrition, disease and famine would take their toll on the population, but the Austro-Hungarians were in a hurry. Faced with the impediment of bombing and attacking the city in a conventional way, someone came up with an idea as crazy as it is tempting: bomb it with drones. Well, with the drones of the time. The UAVs of the Austro-Hungarian Empire against Venice The key name in this story is Franz von Uchatius. He was an artillery lieutenant who was also an inventor. Nothing like what he proposed had ever been done and I would have loved to have been in the room when he presented his idea, but basically the plan was loading hot air balloons with explosivesand control them in some way so that they would release the bombs on the city. Specifically, what von Uchatius suggested was launch 200 balloons both from the ground and from the SMS Vulcano (which we could consider as the first aircraft carrier in history), each loaded with about 15 kilos of explosives and a detonation system based on continuous combustion fuses (coal and cotton with fat). Each of the ‘drones’ It would have an activation system using copper wires and, in the case of some prototypes, galvanic batteries. Remote control? The wind and a series of estimated flight calculations, as well as a very strong desire for each of the balloons to fall where they had to fall: on the city’s population. On July 12, 1849 began the deployment of Austro-Hungarian drones, the first time humanity experienced that remote aerial threat. Now, the result was very different from what the attacking forces expected. Military failure… BUT Although they did the calculations, the balloon-bombers had no real guidance: they were pushed randomly by the wind. And the result was devastating for both forces, as impossible as it may seem. The first thing is that few bombs hit the city and the material damage was practically non-existent. In fact, changes in the wind and failure in those calculations caused some of the explosions to affect the Austro-Hungarian forces. Basically, the balloons were unpredictable. But do not think that the Venetian population had reasons to rejoice about this, since, although we may intuit that they would rejoice to see how the weapons of the enemies “revealed” against them, the truth is that the Venetians added a new concern to those they already had: an unlikely attack. The possibility of being attacked from the sky by devices like this It shocked the population and, although it was not the reason why the city capitulated days later (most likely it was due to the desperation caused by the siege), it was surely another item to add to the list of concerns. Although useless militarily, it was the conceptual germ of an unmanned aerial attack, something that was also used in the war between the US and Spain of 1898, later it was continued exploring in the World War I (where chilling new ways to kill each other were invented) and perfected in the modern era. Although the use of balloons with dangerous cargo has not stopped being used, and an example of this is the balloons with excrement that are thrown between North and South Korea. With all that this implies at a security level, since a few months ago they were feces, but they could perfectly have been explosives. Images | Timetoast National Library of France In Xataka | Using aerial balloons to smuggle tobacco is common in Eastern Europe. And then the airports have a problem

The new strategy against Alzheimer’s is not to attack, but to ‘reprogram’ the brain to clean itself

Alzheimer’s can be resemble a great fortress with a large number of defenses that makes it very difficult for us. One of its most formidable defenses is blood brain barriera biological wall that protects the brain from harmful substances, but, ironically, also prevents the entry of most drugs. In Alzheimer’s patients, this barrier not only blocks help, but also becomes an accomplice to the disease. But we have already found a way to access and attack this pathology. The investigation. A team of scientists has been able to develop a radically new strategy to treat Alzheimer’s. Instead of trying to force entry into the brain, they have created smart nanocapsules that “reprogram” the barrier itself to do its job again: actively cleaning up toxic waste. Something that they have already tested in mice, and they have given spectacular results: a reduction of almost 45% of the amyloid load in just two hours and a cognitive recovery that was maintained for six months. The problem. In order to understand this advance, we must know exactly how ‘access’ to our brain works. The blood-brain barrier (BBB) ​​functions as an incredibly strict customs checkpoint. Like any border, it must have an entry and exit gate and in this case it is the LRP1 receiver. In the case of a healthy brain, LRP1 will be responsible for capturing beta-amyloid proteins and transporting them out of the brain for elimination. But in the case of a brain that is already old, and more markedly in Alzheimer’s, the amount of these LRP1 receptors is reduced, causing beta-amyloid to end up accumulating in our neurons, causing this disease to begin to show signs of presence. The discovery. In this case, the research team discovered that the fate of the LRP1 receptor depends on how it interacts with the molecules that bind to it. This is where the concept of “greedy,” or total bonding strength, comes into play. Very strong union. If a molecule clings too tightly to LRP1 (as beta-amyloid aggregates do in Alzheimer’s), the receptor activates an emergency pathway that sends it directly to be destroyed in the cellular “dumping ground” that is the lysosomes. This makes the problem even worse, as it eliminates the few exit doors left in the brain to take out the ‘garbage’. Moderate union. Or average greed. If the binding is “just right,” the receptor activates a non-destructive express transport pathway (the PACSIN2 pathway). This pathway creates a kind of tubular tunnel that transports cargo through the barrier quickly and safely, preserving the LRP1 receptor so it can continue working. In fact, this pathway even promotes the expression of more LRP1 receptors, which is what interests us most in this situation. The result. Based on this principle, the researchers designed nanocapsules called “polymersomes” (A₄₀-POs). They are tiny spheres decorated with a very specific number of “keys” (angiopep-2 ligands) on their surface. The number of these keys was calculated to achieve that perfect “medium greed”, with the aim of achieving the result similar to that of a moderate union. Results. When they administered these nanocapsules to model mice with advanced Alzheimer’s, the effects were surprising. A massive brain cleanse was achieved in just two hours, causing beta-amyloid protein levels in the mice’s brains to be reduced by 45%. In order to confirm that the protein was not just moving from place to place, its blood levels were measured. The result was an 8-fold increase, which shows that the blood-brain barrier was expelling the ‘waste’. The tests. In order to see the result in practice, behavioral tests such as the Morris water maze were carried out. Here treated Alzheimer’s mice showed significant improvement in spatial learning and memory. In this case, their performance became comparable to healthy mice without the disease. Most strikingly, these cognitive benefits persisted for up to six months after a single course of treatment, suggesting a long-term restorative effect. More than a drug. This work represents a paradigm shift. Most therapeutic strategies for Alzheimer’s treat the blood-brain barrier as an obstacle to overcome. This new approach treats it as a dysfunctional biological system that can be repaired by adding more exit doors for the organism to maintain this homeostasis. By using these nanocapsules with the “perfect keychain”, not only is the existing beta-amyloid removed, but the brain’s natural cleaning mechanism is reactivated. The treatment was able to restore levels of LRP1 and the beneficial transport pathway (PACSIN2) while reducing the destructive pathway. In essence, nanocapsules are not the drug itself, but a tool to reprogram the biology of the brain so that it heals itself. Although the results have been obtained in mouse models and the path to human trials is long and complex, this research opens a completely new and hopeful therapeutic avenue. The idea of ​​”repairing the barrier instead of just breaking it down” could be the key not only to Alzheimer’s, but also to other neurodegenerative diseases where transport and brain clearance play a key role. Images | Bhautik Patel In Xataka | We have a new “theory of everything” to understand Alzheimer’s. Its key is in some small granules

The greatest attack of Ukraine on Russian soil discovered a new threat with drones. China has just multiply it

In 2024, Ukraine managed to enter trucks disguised as mobile houses in Russian terrain. It was the origin of what happened in June 2025, when The Spiderweb operation It was activated giving rise to kyiv’s greatest attack on Moscow since the beginning of the invasion in Ukraine. The offensive also staged the Future of the contests. China has taken another step in that threat marked by drones. Show converted into threat. They told them Analysts at The War Zone. China, through the company Damodahas presented a containerized system designed in principle for light shows with drones, but whose concept reveals deep military implications. The Automated Drone Swarm Container System is capable to display and recover Hundreds (potentially thousands) of small grid drones automatically, in a matter of minutes and with a single operator. Although the declared objective is entertainment, the system encapsulates the logic of how a simple container can be transformed into a portable swarm launcher with capacity of saturating skies and objectives at will. What today is a viral show on social networks, tomorrow can be a devastating weapon on the battlefield. From Guinness to War. Damoda already holds the world record with More than 11,000 drones in simultaneous flight in a coordinated show. Now, with this modular system of extensible racks, each container can accommodate At least 648 dronesready to take off and land synchronized. Drones automatically return to their positions and recover in the system itself, which It allows constant repetition With minimal human intervention. The promise for the civil market is speed, portability and cost reduction, but from the military perspective what is shown is the ability to convert a truck or a container into a force multiplier, camouflaged in an innocuous appearance. The precedents. The most immediate parallelism is found in the Ukraine War. As we said at the beginning, in mid -2024, kyiv carried out the call Spiderweb Operationwhere hidden containers as sheds or mobile houses were used as undercover kamikaze drones. Those attacks against aerodromes inside Russia They damaged or destroyed dozens of aircraft, including strategic long -range bombers. The blow was so serious that the Pentagon estimates the loss of at least ten of these devices. Something similar It happened in the Middle Eastwhen Israeli commands used covert structures to launch drones and missiles against goals in Iran during the beginning of the twelve -day war. Both operations show that the container, the most banal and ubiquitous infrastructure of global trade can become A lethal vector of power projection. The military potential. If civil design is extrapolated to the war, the concept is transformed into A swarm weapon low cost with saturation effects. Several trucks equipped with these containers could simultaneously launch hundreds or thousands of drones with diverse missions: from exploration and recognition to electronic warfare, interference of radars or kinetic attacks with small explosive loads. It would be enough Reduced number of systems To sweep an air base, disable radars or cover an urban front with lethal swarm. Its deployment in scenarios where the control lines are diffuse, such as cities in war, would allow devastating and almost impossible to stop with traditional defenses. The defense challenge. The difficulty in repelling a massive attack of swarms is multiplied with each advance in Autonomy and artificial intelligence. A swarm with the ability to Autonomous search and destruction It could penetrate shegars, hangars or buildings in search of objectives, exceeding the limitations of preprogrammed attacks. Let’s think that conventional anti -aircraft systems, designed to intercept specific threats, are overwhelmed in front of hundreds of simultaneous drones. The directed energy weapons, like lasers or microwaveThey offer partial but limited solutions by scope, direction and power. One of the few effective alternatives is to respond with another defensive swarm of interceptor drones, capable of creating a mobile barrier in the sky. Even so, cost-efficacy asymmetry plays in favor of the attacker: while an interceptor missile It can cost millionseach suicide drone barely reaches some thousands of dollars. Representation of a container launch system for the Merodeo ammunition of the Hero family of the German contractor Rheinmetall, as another example of a relevant concept that has previously been shown A show in the contest. The great risk is that what is now deployed as a cultural or tourist show can be transformed With hardly modifications In a gun of war. The camouflage, a priori, is perfect: a load container standard, transported by train, truck or ship, does not raise suspicions until, in minutes, it becomes A lethal swarm. This multiplies the strategic challenge for air bases, ports and cities close to the front, where a single infiltrated container could inflict damage comparable to that of a cruise missile sap. In wars where surprise and saturation are key, this kind of “drone box” emerges as the contemporary equivalent of an unpublished intelligent cluster bomb and precision. Global threat in buds. The truth is that China is not the only country in Explore this land. Defense companies and contractors In the United States And Europe also work in similar conceptssome even thought for naval pitchers. The debate in the US Navy already proposes to install containerized swarms In ships for defense and attack, which shows the inevitability of this transition. The Chinese precedent and the war in Ukraine indicate that the next future of the Air War is not only in the great seasons of sixth generation or in hypersonic missiles, but in low -cost swarms capable of overflowing any defense. The paradox. The Automated Drone Swarm Container System of Damoda It is officially a civil product to illuminate the skies in celebrations. But what projects, beyond its luminous choreographies, is a disturbing mirror of the future of war. Each viral show is at the same time, An essay From what can happen on the battlefield: the replacement of the power concentrated by distributed saturation, the replacement of the missile of millions with hundreds of low -cost drones, the transit of the technological war to … Read more

Jaguar Land Rover continues in crisis for a cyber attack. The magnitude is such that the British government has had to intervene

August 31Jaguar Land Rover was forced to make a drastic decision: off the majority of its systems to stop a cyber attack. The gesture had immediate consequences. Its factories in the United Kingdom were paralyzed and the interruption also extended to other production centers abroad. Thousands of employees were forced to stay at home in the middle of a global break that lasted almost a month. Now, The company is planning A staggered return of his activity, although not without challenges. September 2, The company spread Your first official statement. He talked about a “cybercormer,” defended the decision to disconnect systems and wanted to reassure customers indicating that there was no data filtration tests. At that time it was thought that the interruption would be brief, just a few days. However, the reality was another: the break continued until September 24 And then one more week was extendedwith October 1 marked as the minimum date to initiate a gradual and phase recovery. The attack that has put Jaguar Land Rover in check Preventive disconnection not only stopped production, much of the internal systems of Jaguar Land Rover also knocked down. Design and management tools They were out of service and engineering processes were interrupted For weeks. The commercial network also suffered: retail and logistics were blocked, forced to operate with manual methods. In spite of everything, the company managed to keep its dealers open and established alternative procedures to process payments, deliver already finished vehicles and ensure the supply of replacement pieces. The blow was global. In addition to British plants, production was interrupted in other international centers, such as Slovakia, Brazil and India. The epicenter was in West Midlands, where Jaguar Land Rover concentrates its headquarters and key factories, surrounded by hundreds of suppliers. The break unleashed a domino effect that left many of those companies without orders. The company itself acknowledged that the impact extended to the entire supply chain, both in the United Kingdom and in other countries. Forensic research has not yet concluded, But the indications suggest a ransomware attack. Shortly after the crisis exploded, a self -denominated group “Scattered Laps $ Hunters” appeared on Telegram that published images of internal systems of Jaguar Land Rover. The denomination points to a collaboration between groups such as Scatrtered Spider, Lapse $ and Shinyhunters, all with history in attacks against large companies. Internal data filtration reinforces the extortion hypothesis, although the company has avoided confirming the authorship and has not revealed whether it received a specific rescue request. Attack management involves multiple actors beyond Jaguar Land Rover. ANDThe National Cybersecurity Center leaders Together with private specialists, the analysis of what happened, while the government receives regular information about the progress of recovery. Company managers They have attended meetings with ministers And they have explained that the lap should be done step by step. From there arises the restart strategy in phases: first critical systems proven in controlled environments, then a progressive resumption of production. It is a process still underway, with the priority set to run more risks. The cost of the break is measured in tens of millions. Every week without production was for Jaguar Land Rover losses close to 50 million pounds (about 59 million euros), a blow that forced the Moody’s A agency lower your perspective positive to negative financial. The interruption not only affected the company: Hundreds of suppliers They saw their orders frozen and some smaller companies began to cut template. To contain the crisis, the British government offered a loan guarantee for 1.5 billion pounds (about 1,790 million euros), to which Jlr added one Own financing line with commercial banking of 2,000 million pounds (about 2,360 million euros). The crisis has not only evidenced the fragility of Jaguar Land Rover, it has also lit the alarms throughout the automotive. A manufacturer of this size, with global resources and experience, has needed almost a month to try to start back after a computer attack. This vulnerability forces to review cybersecurity strategies in the industry, from network segmentation to continuity plans. The case will serve as a reference for other manufacturers: the question is no longer whether there will be new attacks, but how to minimize its effects when they arrive. Images | Robin Mee him | Jaguar Land Rover In Xataka | 200 people paid to see a drone show in Valencia. The problem is that the event did not exist

Jaguar Land Rover was beaten by a cyber attack. The complicated thing came when trying to reactivate its production plants

In Solihullnear Liverpool and in its plant in Slovakia, it is usual to see how every minute some of the vehicles that mark the top of the British industry leave the line. Today those chains are still, and not due to lack of pieces or demand. A computer attack He has forced To Jaguar Land Rover to stop the production and to review its systems with magnifying glass. The image is not just that of some detained factories, it is that of a sector that discovers how vulnerable it can become. Chronology helps dimension the magnitude of the case. On August 31, Jaguar Land Rover arrested operations in his British factories as a preventive measure, According to Financial Times. Days later, the company reported that the restoration of the systems would require more time than expected, with October 1 as a new horizon. The aforementioned medium, however, points out that the interruption could be extended for several months, leaving the production chains on the air. What do we know about the attack. The first thing that confirmedThe company was that their systems had been compromised and that some data were affected, although it pointed out that there was no evidence of theft of customer information. In parallel, a Telegram channel spread messages attributed to Lapsus $, Shinyhunters and Scatrtred Spider, with screenshots and the statement of having accessed the company’s source code. However, this type of displays should be taken cautiously. Specialists cited by The Wall Street Journal They estimate that each day without production is about seven million dollars in sales not made. The company has chosen to continue paying its workers despite the fact that the plants remain closed, a measure that mitigates work voltage but increases financial pressure. The result is an invoice that grows day by day, even before evaluating the technical damage of the attack. Domino effect. Beyond the factories, the crisis is transmitted to the workshops and suppliers that supply Jaguar Land Rover. Some 100,000 people work in that gear that delivers pieces to the exact rhythm required by the assembly line. Every day without production complicates the treasury of small and medium enterprises, which depend almost exclusively on keeping the connection with the JLR plants open. Safe against cyber attacks. According to Reutersthe company did not close a policy to cover losses and costs derived from a computer attack. It was being intermediate by Lockton, a global insurance broker. This suggests that JLR was without specific coverage when the incident occurred. The British government has been dragged into the crisis. Two ministers held meetings in JLR to analyze how to reactivate production. In parallel, the Executive considers an unusual plan: to acquire pieces of suppliers to support their treasury and place them in the market when production starts again. The sector, however, questions how to decide what to buy and where to store the components, which leaves the proposal in an exploratory phase. Will sales be lost? Despite the break, the company is not completely unfit. The aforementioned American newspaper indicated that their country’s dealers had an inventory equivalent to 113 days of sales, one of the highest levels in the sector. That mattress can absorb part of the commercial impact in the short term. The problem appears if unemployment extends until November, with losses of 3.5 billion pounds in revenues (about 4,009 million euros). Jaguar Land Rover’s crisis is not limited to a manufacturer stopped by a computer attack. It exposes to what extent the modern automotive depends on digital systems that can become invisible until the day they fail. In a sector accustomed to measuring every second of production, a blockade like this not only paralyzes factories and suppliers, it also introduces a new variable in the equation, resilience against threats that no longer arrive from markets or road, but from a system. Images | Loris Marie | Martin Katler In Xataka | China has the largest censorship system in the world. Now he has decided to export it and sell it to other countries

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.