They will now require VPN providers to also block IPs

According to an information note from LaLiga, the Commercial Court No. 1 of Córdoba has issued several orders granting LaLiga and Telefónica precautionary measures “unaudita parte” (“without hearing the other party”, without previously hearing the defense). These measures specifically target two of the providers of VPN services best known on the market: NordVPN and ProtonVPN. The consequences are very important. Dynamic blocking obligation. The court order – to which we have not had access, and which is mentioned in LaLiga – requires that both NordVPN and ProtonVPN must: “Immediately implement in its internal systems the appropriate measures to make it possible for the IP addresses provided by the plaintiffs, in which the illegal broadcast of protected audiovisual content has been verified, to become inaccessible from Spain.” Is absolutely unheard of. VPN providers as part of the problem. These orders, they say in LaLiga, “recognize that VPN service providers are technological intermediaries” that are within the application of the European Digital Services regulations, and therefore must prevent infringements from being committed through their infrastructures. The proceedings also highlight that VPNs are an “extremely effective and accessible means of generating the possibility of access to content that is not accessible in certain geographic locations.” Javier Tebas, president of LaLiga, I already pointed out recently to the objective of imposing its demands on VPN providers. And on top of that take advantage of that activity. According to the documents cited by LaLiga, these VPN service providers not only facilitate access to geographically restricted content, but also actively advertise this ability to bypass the massive IP blocks ordered by LaLiga. According to the judge, these campaigns “distort the real location” and contribute to avoiding the restrictions already decreed by other courts. Unheard of part. That legal term sounds complex, but its meaning is quite direct. It literally means “without hearing the other party.” We are – if the orders are confirmed, to which we insist, we have not had access – facing a unilateral resolution. The normal thing is that the other party can defend itself, but we are facing a (another) legal exception reserved for emergency situations that they have taken advantage of in LaLiga for their policies of massive and indiscriminate blockades, regardless of the damage to third parties. NordVPN and ProtonVPN may oppose each other. In LaLiga they talk that we are facing precautionary measures, something also important because with them we do not have a final sentence. The affected companies have the right to oppose these measures once they have been notified to try to have the judge revoke them after hearing their arguments. Even so, LaLiga also indicates that the measures are for “immediate implementation”, which leaves these companies in a difficult defensive position. What ProtonVPN says. A company spokesperson has indicated in comments to Xataka Móvil that they were “not aware of any proceedings that may be underway” before the information came out. Likewise, it states that any court order issued “without due notification to the affected parties” would be “invalid from a procedural point of view.” They want the opportunity to present their case before a binding ruling is made. What NordVPN says. At Xataka we have contacted those responsible for NordVPN to clarify the matter. At the moment we have not received a response, but we will expand this information if we obtain new information. AND the tests, what? LaLiga also indicates that the orders oblige LaLiga and Telefónica to “preserve sufficient digital evidence of the illicit broadcast of the protected content” to notify the defendants. This requirement is a measure to legally ensure that the IPs that are ordered to be blocked were actually being used for these illegal broadcasts. They are not Spanish companies. There is some uncertainty here about whether these companies, which have headquarters outside the EU (like Panama in the case of NordVPN), will comply with an order from a Spanish court of first instance. If they don’t, national operators could be forced to block those VPN providers’ own nodes, but this is an even more drastic and terrible scenario: under the current announcement, users can continue using NordVPN and ProtonVPN normally for everything, but they will be just as affected by the blocks as if they were not using those VPNs. If this other measure were applied, it would not be possible to access these providers conventionally in Spain. VPNs filtering content? If they have to comply with these regulations, VPNs could become dangerous intermediaries for all the content that is transferred through their services. Many users take advantage of the layer of privacy these VPNs offer for teleworking and secure connections, but if VPNs agree to filter content, users could lose critical network access tools. What LaLiga says is one thing, what NordVPN and ProtonVPN do is another.. This entire process is still at an uncertain moment, because no matter how much LaLiga has achieved such privileges, it remains to be seen whether these suppliers will comply with these decisions. So, we will see how these suppliers respond to these demands. In Xataka | Football has become the anchor of operator subscriptions. And LaLiga is making more money than ever

The judge has allowed it to eat up the inner courtyard of the block

The elevator is a necessary element in any building, but there was a time when it was not so common. Many old buildings face a problem: they want to install an elevator, but it doesn’t fit in the stairwell. It is not usually common, but there are cases in which installing the elevator involves “eating” part of the homes. The conflict. Our colleagues tell it Xataka Home. Given the lack of space in the common areas, a community of Madrid residents unanimously agreed to install the elevator, occupying part of the private patios of the ground floor homes. One of the two affected homeowners took the case to court, claiming that installation in the stairwell was possible. The judge agreed with him and the community’s decision was annulled, but it didn’t end there. The sentence. The community of neighbors appealed to the Provincial Court, which ended up agreeing with them. The problem with installing the elevator in the common areas is that it did not comply with the regulations, but it also meant causing great damage to the building because the staircase had to be demolished, in addition to blocking access to the homes for a long time. The criterion was based on the general interest of the community and the fact that the installation in the courtyard was much more reasonable from a technical point of view. The private use. In the case of this sentence, the space occupied by the elevator is the private use patio of the first floor. That is, the property belongs to the community, but its use is exclusive to one of the neighbors since access is through their home. As stated in Economist & Juristhe article 9 of the Horizontal Property Law It is clear: “a permanent easement can be built over a private space, without requiring the consent of the affected owner,” as long as it is justified and is of interest to the community. Mandatory installation. The LPH establishes that the elevator is mandatory if a resident requests the facility for accessibility reasons. The community will be obliged to install it and its cost must be borne by all owners. It can also be approved by a simple majority, which prevents the installation from being blocked if, for example, the neighbors on the ground floor or first floor refuse to do so. Sometimes they eat the kitchen. There are many buildings without elevators that do not have space in common areas and, in some cases, their installation requires invading part of the homes or a commercial premisesthat is, a private property. As stated in The Confidentialthe Supreme Court declared that it is “an easement of passage in favor of the community.” Of course, in these cases the owner has the right to compensation, which will be set based on the value of the square meter. Or the street. In Madrid it is quite common to see elevators attached to the façade of the building and that invade part of the sidewalk. This is an exceptional measure to guarantee accessibility to the building, provided there is no other remedy. According to the regulationsthe sidewalk must remain at least 1.8 meters wide, although in some specific cases it is allowed to narrow to 1.5 meters and even 1.20 meters if there are no other options. In this case, the project must be presented to the city council, which is the one who studies and approves whether to grant the planning permission for works. In other communities such as Cantabria, lThe regulations also contemplate this possibility. Image | Laura Sacristán, Xataka In Xataka | What changes does the new Spanish regulations ask to make in elevators before July 1?

there is a type of attack that is impossible to block

The browser is no longer just a window to the Internet and is becoming a tool that also operates within the web. In the case of Agent Mode in ChatGPT AtlasOpenAI explains that its agent views pages and can perform actions, clicks, and keystrokes within the browser, just as a person would. The promise is clear, to help in everyday flows with the same context and the same data. The consequence is also, the more power we concentrate in an agent, the more attractive he becomes to whoever seeks to manipulate him. What is a prompt injection. In simple terms, a prompt injection is a technique that seeks to sneak malicious instructions into apparently normal content so that an artificial intelligence system interprets them as legitimate orders. IBM describes it as a type of cyber attack against language models in which malicious inputs are camouflaged as valid prompts to manipulate the behavior of the system. The objective can range from forcing inappropriate responses to causing information leaks or diverting a task, without the need to exploit classic software vulnerabilities. The root of the problem is less “magical” than it seems and more structural. Many language model applications combine developer instructions and user input as natural language text strings, without rigid separation by data type. The model decides what to prioritize based on learned patterns and the context of the text itself, not because there is an infallible boundary between “order” and “content.” If an external instruction is formulated convincingly, it may gain weight even though it should not. When the context becomes unfathomable. The risk is amplified when the agent does not process a single message, but rather goes through very different sources within the same order. OpenAI warns of a practically unlimited surface, emails and attachments, calendar invitations, shared documents, forums, social networks and arbitrary web pages. In that journey, the agent may encounter unreliable instructions mixed with legitimate content. The user doesn’t always see every step, but the system does consume it, and that’s where manipulation can creep in. The disturbing thing is that this can fit into ordinary workflows without raising any obvious alarm. The AI ​​signature describes an example where an attacker “seeds” an inbox with a malicious email, and later, when the user requests a harmless task, the agent reads that message during normal execution. In one case, the result is intentionally extreme, the agent ends up sending a resignation email instead of composing an automatic response. All this thanks to an external attack. Why there is no perfect shielding. In cybersecurity there is a widely assumed idea, no system is completely secure, and OpenAI frames prompt injection as a persistent problem. In his text he formulates it like this: “We hope that attackers continue to adapt. The injection of prompts, such as scams and social engineering on the web, will hardly be completely resolved.” The objective, therefore, is not to promise invulnerability, but to raise the cost of the attack and reduce the impact when something fails. In this context, those led by Sam Altman explain that it has deployed a security update for the Atlas agent motivated by a new class of attacks discovered through network teaming automated internal. The company says the delivery includes an adversarially trained agent model and strengthened safeguards around the system, intended to improve its resistance to unwanted instructions during navigation. What we do still matters. OpenAI recommends using the offline agent when you don’t need to access sites with an account, and calmly review confirmation requests for sensitive actions, such as sending an email or completing a purchase. He also advises giving explicit and limited instructions, avoiding overly broad assignments that force the agent to go through large volumes of content. It does not eliminate risk, but it reduces opportunities for manipulation and helps existing controls work as designed. Images | OpenAI In Xataka | How often should we change ALL our passwords according to three cybersecurity experts

China aims to break records with the largest ice park in the world. And he has already begun to lift it block by block

At the end of November, in Harbin, the image is repeated every winter, with a scale that has not stopped growing in recent editions: cranes, machinery and workers begin to raise structures on a surface that weeks later will become walls, towers and slides made of ice. According to official dataconstruction is advanced this year thanks to the ice stored during the previous season and preserved for more than ten months. This material allows work to begin even before the river freezes completely again, with the aim of preparing an area that this winter will have 1.2 million square meters. Harbin Ice-Snow World It has grown from a local celebration to a seasonal theme park that rises again each winter. It functions as an enclosure with defined entrances, circulation areas, walkable structures and spaces to stay for hours, especially when it gets dark and the lighting changes the perception of the place. It is not just a setting for photographs, but a park designed to be walked, used and visited for a few weeks, while weather conditions allow it. When ice stops being landscape and becomes infrastructure Upon entering the venue, the experience is more similar to that of a theme park than a temporary exhibition. You can walk between buildings, climb platforms, slide down ramps or access areas prepared for snow activities. The architectural elements are not presented as immobile pieces, but as part of the route. For this edition, those responsible have announced spaces intended for ice fishing, cross-country skiing and collective snow gamesas well as an additional stage that will complement the cultural activities of the already usual Dream Stage. The proposal does not focus solely on showing structures, but on facilitating their use within a planned and temporary environment. Before erecting ice structures, Harbin already celebrated winter through local practices. Hand-carved ice lanterns began to be used in the city in the middle of the last century and gave rise to the first Harbin Ice and Snow Festival, held on January 5, 1985. indicate official pages. The jump to the current format came in 1999, when Harbin Ice-Snow World was created as an independent venue, with specific access and design. Since then, the evolution has been constant: more surface area, greater volume of materials, presence of machinery and planned construction processes. The park, under construction in November 2025 Harbin has turned winter into a source of economic activity. According to data released by Xinhuathe city received 90.36 million visitors during the last season, with estimated income of 137.22 billion yuan (almost 17 million euros), an increase of 16.6% compared to the previous year. Ice-Snow World does not explain these figures on its own, but it acts as one of the main focuses of attraction and as an element that concentrates tourist services, accommodation, restaurants and transportation during the weeks in which it remains open. The construction mobilizes technical profiles, operators and specialists in structure and lighting, while the opening requires personnel for visitor service, security, maintenance and tourist support. Many of these roles are temporary, but require prior coordination and planning. When comparing Harbin to other major winter events, such as the Sapporo Snow Festival in Japan or Quebec Winter Carnival in Canadathe difference is not only in size, but in structure. Sapporo distributes its sculptures in various urban spaces and Quebec combines culture, parades and outdoor activities, but neither of them functions as a theme park concentrated in a single venue, as occurs in Harbin. Harbin uses hundreds of thousands of cubic meters of ice and snow, according to official data, and builds walkable structures that are part of the route and not just the landscape. It is not so much a festival as a temporary recreational facility. Harbin Ice-Snow World has been integrated into the city’s tourism calendar as a seasonal facility. It is built every year, it opens for a few weeks and It is dismantled when temperatures no longer guarantee stability. This temporary nature does not prevent its planning: the prior storage of ice, the mobilization of workers and the associated services indicate that it is an organized activity and not simply a one-off event. The park functions as a generator of temporary employment, concentrates the winter tourism offer and channels activities that are subsequently complemented by the interior ice and snow enclosure, designed to operate all year round as an extension of the exterior park. There is no pretension of permanence, but of repetition adjusted to the climatic conditions. This repetition has allowed the consolidation of technical, logistical and tourist processes linked to winter as a seasonal economic resource. Images | The Harbin International Ice and Snow festival | Harbin Government In Xataka | Someone wants to build a 144 meter high skyscraper in the middle of the port of Malaga. The reason: luxury tourism

Chinese researchers wanted to know if it was possible to block Starlink in Taiwan: now they have an awkward answer

Communications have become the invisible thread that sustains any modern military operation. Troops, vehicles or missiles are no longer enough: without a stable and resilient network, the situation can become complicated. During the Ukrainian war, Starlink demonstrated be able to keep Ukrainian forces connected even under pressure, and has since been placed at the center of the debate over its role in military scenarios. According to South China Morning Posta group of Chinese researchers linked to defense institutions has examined to what extent that network could resist a large-scale interference attempt on a territory like Taiwan. Starlink is not a typical satellite network. Instead of relying on a few high-altitude satellites in fixed positions above the equator, it is made up of thousands of small satellites that orbit the Earth at low altitudes and on changing routes. This architecture allows a terminal on the ground to not always connect to the same satellite, but to jump between several in a matter of seconds, forming a flexible mesh that is difficult to interrupt. That dynamic behavior largely explains why it has become a key element in debates about electronic warfare. A laboratory experiment. The study that has put numbers to this scenario is titled “Simulation research of distributed jammers against mega-constellation downlink communication transmissions” and appeared on November 5 in the Chinese magazine Systems Engineering and Electronics. It is signed by a team from Zhejiang University and the Beijing Institute of Technology, an institution with a prominent presence in the country’s military research. It should be noted that it is not an operational document or an official proposal from the Chinese Army, but rather an academic simulation that explores, from a technical point of view, what it would take to interfere with a network like Starlink on a regional scale. {“videoId”:”x9ri2iu”,”autoplay”:false,”title”:”How China, the biggest polluter on the planet, has also become the complete opposite”, “tag”:”webedia-prod”, “duration”:”740″} A constellation designed to avoid interference. The study does not limit itself to describing that the terminals change satellites, but analyzes how this change thwarts any attempt at sustained interference. When a hostile signal affects a link, the terminal automatically redirects traffic to another visible satellite, and the network adapts the channel and frequency in real time. That reaction, combined with highly directional antennas capable of concentrating the signal toward specific points, reduces the impact of interfering emitters. The researchers highlight that even if a connection is momentarily blocked, the network can restore communication from another angle or frequency almost immediately. A thousand drones in action? The simulation was based on real data from Starlink’s orbital positioning and modeled how the signal would behave for twelve hours over eastern China. The researchers placed a virtual network of jammers 20 kilometers high, spaced between five and nine kilometers apart, as if they formed a checkerboard in the sky. The study considers that these nodes could be installed on drones, balloons or similar aerial platforms, capable of supporting coordinated interference systems. Using 26 dBW power and narrow beam antennas, each node managed to block an average of 38.5 square kilometers. With that efficiency, at least 935 units would be needed to cover a territory the size of Taiwan, not counting redundancies, failures or geographical barriers such as mountains. In Xataka China is sending drones to an island 100 km from Taiwan. The problem is that Japan and the US are filling it with missiles The authors themselves acknowledge that their results are only an approximation. They explain that they do not have real data on the radiation patterns of the terminals or measured signal suppression coefficients, which limits the precision of the simulation. They also do not know Starlink’s internal adaptation mechanisms against coordinated interference. Even so, they consider that the model serves to estimate the scale of the necessary effort and opens a line of study that allows quantifying, although imperfectly, how a blocking strategy would work in a real scenario. Images | starlink In Xataka | Starlink satellites have transformed war: China and Russia work on “Starlink Killers” to deactivate them (function() { window._JS_MODULES = window._JS_MODULES || {}; var headElement = document.getElementsByTagName(‘head’)(0); if (_JS_MODULES.instagram) { var instagramScript = document.createElement(‘script’); instagramScript.src=”https://platform.instagram.com/en_US/embeds.js”; instagramScript.async = true; instagramScript.defer = true; headElement.appendChild(instagramScript); – The news Chinese researchers wanted to know if it was possible to block Starlink in Taiwan: now they have an awkward answer was originally published in Xataka by Javier Marquez .

How to block the update to Vega OS on Fire TV so as not to lose your favorite apps

Let’s tell you how to block your Fire TV from updating to Vega OSto avoid losing access to your favorite Android-based applications. Vega OS is the new Linux-based operating system created by Amazon from scratch, which comes to replace the Android-based Fire OS. This new operating system brings many improvements in performance and fluidity, but you will no longer be able to use Android-based apps. Over time, it is possible that many of these apps will be adapted and created for the new system, but many will surely take a while to arrive. Therefore, now that Vega OS begins to arrive, we are going to tell you how to block update. Let’s tell you two different ways to block the updatealthough they are quite radical. There is no specific option to avoid it, meaning you will have to close internal doors in a different way. Prevent Fire TV from communicating with Amazon Perhaps the most radical option is to prevent your Fire TV from connecting to the Amazon servers that distribute operating system updates. For this, you will have to block some domains from your own router, something that is not complicated, but requires knowing enter router settings. To do this, you have to enter your router’s settings from your computer’s browser, typing the IP addresses 192.168.1.1 or 192.168.0.1 in the search bar. Once inside, put your Fire TV in the list of connected devicesand if possible assign it a fixed IP with the DHCP reservation. Now, in the configuration of your router you have to look for a section called Parental Control, Security, Web Filters or Firewall, depending on the model and manufacturer. In here, you will have to add Amazon domains to blockwhich would be softwareupdates.amazon.com, updates.amazon.com, amzdigitaldownloads.edgesuite.net and amzdigital-a.akamaihd.net. Once you do this, go into your Fire TV settings, click on Aboutand then in Check for updates. If no new updates are detected or operating system versions, then it is because this restriction has worked. Disable update processes The other option is simpler, although also more delicate as it has to use third-party applications, which always poses an extra risk. It is about disable processes to check for and install updates from your Fire TV, something you can do with tools like TroyPoint Toolbox either TechDoctorUK Debloater from the device itself. Now you have to download and install the application Downloader from the Amazon App Store, Amazon’s app store. But don’t open it, before doing so go into Settings > My Fire TV > Developer Options and activate the options ADB Debugging and Unknown sources. Now open the app Downloader and write the code 250931which will take you to the TroyPoint Tools Installer. In this installer, download and install the application Debloater TechDoctorUK. Now you have to open the application and grant it permissions USB debugging when requested. Now, check the list of system processes in this application, and you should mark those that manage automatic updateswhich usually include terms such as system updates. When you do, click Reproduce in the upper right corner to apply the changes. Remember that this may also affect the correct functioning of the Fire TV. In Xataka Basics | Alexa+: what is Amazon’s new smart assistant, how it works and what is its price and availability

block everything to protect the football business

It seemed inevitable, and so it has been: football has returned, and with it, LaLiga IPS blocks in Spain. On Friday, the 2025/26 season began, and since then numerous users have been able to verify how those indiscriminate and massive blockages of IPS have also started. The nightmare does not seem to have a solution in sight. The League returns, the blockages return. The beginning of the season last Friday led the beginning of the IPS mass blocks. The first game, held on Friday at 7:00 p.m. It will start To show the message “HTTP 451 – File unavailable for legal resons” on various websites. Blockages, as they point out In Bandanchathey have continued producing throughout the weekend, but in fact they have intensified. Blackhole: We don’t even know what happens. Normally when the operators followed LaLiga’s “orders” when blocking IPS offered some type of message like that to inform users that a certain IP or website was not accessible. This weekend we have seen how Movistar went to the “Blackhole” type blocking in which traffic to that IP address is discarded without more, as if it fell into a “black hole.” There is no error message and the browser or apps are waiting until the “Timeout“And the waiting time is exhausted to respond to the request. The impression for the user is that this server simply does not exist. What operators have blocked. As indicated by various users affected in X, the blockages seem to have expanded: Movistar continues to perform them, but also both Masorange and Vodafone seem to have begun to block strictly. In Vodafone, they point out in Bandancha, a message is now showing that “for reasons outside Vodafone this website is not available.” Complaints everywhere. Several users HE They complained precisely from Those blockages of This operatoras happened in other cases in other competitors. Digi also seems have applied these blockages. After a critic of a user, the operator responded in X Explaining that these blockages are not “a decision of ours, but in compliance with a sentence in favor of LaLiga.” Others that until now did not seem to have applied these blockages, such as lowi, also seem to have initiated this type of actions According to affected users. Just for sinners. As it was happening since March, the impact of the blockages is difficult to measure, but There are many Users With business and legitimate websites on the Internet that have been affected by All sides. The attacks focus especially on CDN platforms how to see or cloudflarewhich make use of shared IPS: when operators block one of those IPS, they not only block the IPTV service that is pursued with that concrete IP, but hundreds and even thousands of websites that share that same IP address. LaLiga FUD. In recent days LaLiga had paid to publish editorial articles In several general media in addition to promoting The video “You have pirate football. They have you.” In these contents the objective was the same: to disseminate the message that those who use IPTV services of illegal streaming end up being potential victims of malware. To these statements were added others that pointed out that these types of activities could also serve to finance drug trafficking. The biter bit. At no time are evidence of this cause-effect relationship, and we are facing a clear chaos of the commercial strategy known as FUD (Fear, Uncertainty and Doubt, in Spanish fear, uncertainty and doubt) that disseminates negative, vague or bewoman information in order to harm a competitor. The truth is that anything has never been demonstrated in that regard, but LaLiga was fined a few months ago with a million euros by Collect biometric data Of the spectators without permission. The case is in the Constitutional. Both rootedcon and cloudflare have started various legal actions separately to try to stop the blockages, but for now those attempts They have not paid fruit. At this time these cases have been presented before the Constitutional Courtbut it is not expected that in the short term a resolution will occur. The blockages are going to be a nightmare, but they can dodge. The beginning of the season has therefore demonstrated what we all feared: that LaLiga will maintain (or intensify) those indiscriminate blocks of IPS. This first day has caused Fridays, Saturday, and Sunday, but there will also be left today and tomorrow, which means that predictably There will be more blockages these days. There is a way to avoid them: Use a VPN that allows us to have normal Internet access. In Xataka | “Every time there is football, the website falls”: the collateral effects of LaLiga blockages in thousands of users

After mobiles, cars and chips, China is launching its biotechnological offensive. And the West will not be able to block it with tariffs

China has just achieved something historical: that an American pharmacist pay 5,000 million dollars for a Chinese drug against cancer. It is the highest figure ever paid by a Chinese medical innovation. Why is it important. This news It is the perfect example of how, in the middle of a war for semiconductors, chips and rare earths, China is beginning to lead an even more strategic industry: biotechnological. Medicines do not know borders or tariffs. The context. In 2011, China approved the first oncological drug developed at home: an improved copy of a western medication. Fourteen years later, a Chinese biespecific antibody threatens best -selling medication in the world, Keytruda, of Merck, which invoice 29.5 billion dollars annually. What has happened. Chinese transformation into biotechnology follows a recognizable pattern. First arrived Betta Pharmaceuticals Pume: A “I” version of Western therapies. It worked equally well, it cost less, but never left China. Then came Beigene Brukinsa: The jump to “I better.” It became the first Chinese oncological drug approved by the US FDA. Today it is sold in 65 countries and generates 2.6 billion dollars a year. The third step was Carvykti by Legend Biotech: A cell therapy that genetically modifies patient cells to attack cancer. Johnson & Johnson associated to take her worldwide. In the foreground. The fourth act is underway with ‘Ivonescimab’ by Akeso Biopharma. This biespecific antibody simultaneously attacks two targets of cancer. Summit Therapeutics He opted 5,000 million dollars for himmaking it the greatest operation of Chinese pharmaceutical license in history. The bet is huge: Ivonescimab intends to dethrone Keytruda as world oncological standard. Global clinical trials will decide if China can create next Blockbuster medicinal. In figures. The numbers show the speed of Chinese advance: 2011: First approved Chinese oncological drug. 2019: First FDA approval for a Chinese drug. 2024: Chinese pharmaceutical licenses grew from 35,000 to 46,000 million dollars. Only five Chinese drugs have achieved FDA approval. Between the lines. Biotechnology implies unique geopolitical advantages against semiconductors. The medications are not blocked with sanctions: they save lives regardless of their origin. Western governments cannot prohibit Chinese oncological drugs without enraging patients, doctors and society in general. China understands and is attracting global pharmaceutical talent with mass financing and flexible regulations. The result: Chinese laboratories developing therapies that Western multinationals buy for a lot of money. Yes, but. Success is not guaranteed. 90% experimental drugs fail in clinical trials. Ivonescimab must demonstrate superiority against Keytruda In non -Chinese patients, something we should not give for granted. In addition, geopolitics can complicate things. Legend Biotech broke links with its matrix for American pressures. And the weather does not help. What is happening now. China has replicated in biotechnology its classic manual in technology: Attract expatriate talent. Generously finance startups. Create national champions Climb globally. The difference: medicines generate less political resistance than chips. It is possible that a striking scenario may occur: Western patients depending on Chinese medical innovations. Irony is perfect: China dominates an industry where its success directly benefits Western citizens. But of course, who captures the economic value is her. Deepen. Akeso’s case is especially emblematic. Its founder, Michelle XiaI felt frustration seeing how the best treatments took decades to reach Chinese patients. And decided to invest the equation: create in China therapies that the rest of the world would need. In Xataka | China is already a power greater than Europe in one of its key industries: the development of medicines Outstanding image | Akeso

In his obsession to torpedo the Chinese chips industry, the US wants to block an essential to manufacture them: the software, according to FT

Hard setback for the Trump administration, which dawns this Thursday, May 29 with a clear response from the US International Trade Court to its tariff policy. The organism has declared generalized tariffs illegalafter considering that “they exceed any authority conferred on the president by the IEEPA (Law on Economic Powers in case of international emergency) “. In the middle of the storm, sources of Financial Times They declare that the United States Department of Commerce has begun to urge the main suppliers of electronic design automation software (EDA), in a new attempt to continue trying to knock each of the pillars that sustains the Chinese semiconductor industry. The new order. The Trump administration is starting to inform To the main national companies that offer the necessary software to design semiconductors that they must stop selling their services to Chinese groups. A measure that strengths the commercial war between the United States and China, at a time when the latter country is in full chips national production record and getting closer to develop their own 5 Nm lithography. The big names. There are three big names playing in the American industry: Cadence, Synopsy and Siemens. These three companies They monopolize the bulk of the Global EDA software market And they have been key for China to have been able to develop its current semiconductor industry. Preventing China from accessing this type of solutions is a zancadilla. These tools are essential to achieve advanced lithographic processes and expedite essentials such as design verification, performance simulation, energy consumption, and other key aspects to lead in the manufacture of any chip. Why is EDA software. In the manufacture of a modern semiconductor, tools that make it possible to automate the essential design and verification processes for its manufacture are necessary. Minimizing the margin of error and being especially effective in the refining of your behavior is key to leading this career. EDA software is a fundamental element to ensure that these designs meet the expectations of the manufacturing process, and allows to automate each of the phases of the same. The local industry. SMICthe spearhead in the Chinese semiconductor industry, It has been using Synopsys design suites For more than 20 years. After entering the Entity Listthe company did not lose access to these toolsonly access to them was difficult to be forced to establish license agreements to be able to use them. If Trump’s order is fulfilled, it will not be possible to renew these agreements or access to the software of these companies. Immediately after the intentions of the US administration, local companies such as Empyrean Technology, Primarius Techonologies and Semitonix, have seen the price of the action around 20%. These companies are specialized in the development of software solutions for semiconductors, and are some of the main names that sound after Trump’s threat. Even in the air. Although sources consulted by Financial Times affirm that the United States Industry and Security Office (BIS) is issuing this new directive through letters to companies, some like Synopsys have not taken long to uncheck. “We are aware of the rumors and speculation, but Synopsys has not received any official communication from the Bis. That is why we keep our annual forecasts unchanged, based on our current understanding of the export restrictions of the BIS and in the forecast of an interannual fall of the income from China.” Cadence and Siemens, for the moment, have not made statements about it. In Xataka | China prepares the mate to the US: it will have its own UVE lithography team to make chips in 2025

How to block so that your messages from your WhatsApp chats can not be shared or photos or videos can be downloaded

Let’s explain how to configure whatsapp for prevent others from sharing your messages In the chats you have with them. It is a new option that will gradually reach all users, and we will explain its operation. We are going to start explaining the operation of this adjustment, which has not yet reached everyone but will start doing it in the next few days. And then, we will explain how its operation is and activate. How this option works When you are talking to another person, any message you send can be shared. This means that the other people with whom you speak have the option of Share your message and send it to another chat or group to show what you have said. In addition to avoiding messages, this adjustment allows Other people cannot download your photos or videosyour content cannot be lowered to your phones. In addition, your messages cannot be used for AI functions. This allows you to give important information in an individual group or chat, it can be disseminated. You can share your text messages, your photos, videos, everything you send. However, It can also be a problem for your privacy In the event that others decide to share what you do not want to share. Now, WhatsApp has decided to give you the flexibility of activating an option that allows Do not allow any of your messages in a chat to be sharedand thus make sure that nothing you say is disseminated. This adjustment It is individual of each chat or group. This means that you will have to activate it one by one in all the chats where you do not want anything you say to spread. By default, everything you say can be shared, but in the chats and groups you want you can activate the option to do not. How to prevent your messages from sharing To prevent your messages from sharing in an individual group or chat, you have to click on the chat name To access the screen where some options appear on it. Once you are inside, you have to click on the option Advanced Chat Privacy That will appear inside. Here, you can activate the function so that your chats cannot be exported or shared. Remember that this you will have to activate in each chat individually and in each group where you do not want to download or share what you say. It is a good option for those conversations where there are people with whom you still have no confidence. In Xataka Basics | WhatsApp news in April 2025: What changes and what adds the application for Android and iOS

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.