A few years ago, manufacturers fought for the most powerful mobile phone. Now they fight so they don’t go out burning

Not too long ago, Samsung and Apple were trying to convince us of something: the titanium It was the best material for a high-end mobile phone. As a user of both the latest Galaxy and the previous iPhone, I have to say that I agreed: we were never looking at mobile phones more resistant to shockschips and all kinds of everyday accidents. With the iPhone 17 ProApple backtracked to return to aluminum. With the Samsung Galaxy S26 Ultrathe Korean company follows the same path. What is happening? Aluminum is back, and everything indicates that it is here to stay. One of the main advantages that titanium promised over aluminum was to promise greater resistance, something that is being demonstrated the drama of the new iPhone 17 Pro and its premature wear compared to previous models. Despite this, companies are returning to aluminum. There is something that both the new Galaxy S26 Ultra and the iPhone 17 Pro Max share: they both have the largest dissipation systems ever built in their families. A titanic effort (to the point of completely redesigning the chassis in the case of the iPhone) to prevent mobile phones from burning in the hand. And there is a key point in this party: we want more and more powerful phones, but someone has to cool them down. Producing mobile phones in titanium is also more expensive, and given the current component crisiswith the RAM shot and internal memories the same wayone of the few cuts that can be made without affecting the overall phone experience is changing the material used. The question about whether we need more power or not, a few years ago, was answered with a resounding “yes.” But for some time now we are not so clear. With configurations of 12 and 16 GB of RAM, and processors that are more powerful than some desktop chips, our smartphones have been increasing power for years without determining too much. Why do we need these new limits?. AI requires RAM and not so much raw power (at least, in the use given to a phone), mobile games are already bordering on the quality of triple AAA console games, and improvements in camera come more through the redesign of algorithms and not so much through increasingly powerful IPS (image chips). In Xataka | Samsung Galaxy S26 Ultra, S26+ and S26, first impressions: a broken heart in an unprecedented commitment to AI Image | Xataka

The great battle of the internet of the future is fought against anonymity. And Discord has taken a step requiring ID to enter

Discord announced yesterday that will launch an age verification system on its platform globally starting next month. This will be when you default to setting all accounts as “appropriate for teens” (“teen-appropriate“) unless the user proves that they are an adult with a partially automatic process that may require the system to scan our face or our identification document. This has reopened the debate about privacy and privacy not only on social networks, but throughout the internet. How it will work. Savannah Badalich, Product Manager at Discord, explained in The Verge that “Discord does not use private messages or any message content in the age verification process”, and clarifies that in many cases this verification will be transparent and the user will not have to do anything: “For most adults, age verification will not be necessary, as Discord’s age inference model uses account information such as account age, device and activity data, and aggregated high-level patterns in Discord communities. But if you need to verify yourself, be careful. Those users who do not obtain this automatic verification will not be able to access channels and servers that have age restrictions, will not be able to participate by speaking on live channels and will have sensitive or graphic content filters activated. They will also receive notifications of friend requests from suspicious users, and even direct messages from unknown users will be automatically filtered to a separate mailbox. The protection that Discord proposes is analogous to that already proposed by the Government of Spain with the beta Digital Wallet, popularly known as the “pajaporte”. Your face or your ID to validate your age. If Discord’s inference model fails to automatically determine your age, the global rollout will require users to present identification to prove they are of legal age to have an adult account. According to Discord, removing those limitations from teen accounts will force users to “choose to use facial age estimation or offer a form of identification to Discord partners.” So, there will be two great options: your face– The user will need to appear in a selfie video during the verification process and a Discord AI system will analyze that image in real time. According to Discord, that selfie will not leave our device. Your ID– If the selfie process fails, users can appeal or verify their age with a photo of their ID. These documents will be verified by third parties, but on Discord they assure that these images of the document “are quickly deleted — in most cases immediately after confirmation of age.” Discord already had a scandal with this. This is actually not the first time Discord has tried something like this. Last year it already deployed an age verification system in the UK and Australiaand the curious thing is that some users exceeded that measure using the ‘Death Stranding’ photo mode. Mass data theft. In October one of those Discord partners suffered a massive data theft in which users’ age verification data, including the government identification documents of said users, were leaked. Badalich states that they stopped working with that company and now use another. “We do not do biometric scanning or facial recognition, but rather facial estimation. The DNI is deleted immediately. We do not store information about you,” said the directive. Anonymity in danger. For decades, anonymity has been considered an acquired right and a pillar of Internet freedom. It is something that allows exploration and criticism without fear of retaliation, but at the same time that has facilitated a toxic public discourse that has turned many platforms—starting with social networks—into “digital dumps” in which harassment and abuse are difficult to stop. Content moderation on social networks has been so problematic that X and Facebook have ended up eliminating their moderation teams—or reducing them to a minimum—so that let the community itself warn of misuse of these networks. Government pressure. Discord’s announcement follows an increasingly recurring trend on the internet. The pressure from governments around the world is notable and wants to eliminate anonymity with the argument of protecting teenagers. Bills are being promoted that force platforms to monitor who enters and how old they are. Eliminating anonymity would certainly have advantages in mitigating toxic speech and instances of harassment or abuse, but it would also have enormous disadvantages. From protecting minors to spying on us all. Among these disadvantages is the risk that these social networks become a massive system of citizen espionage in which the violation of privacy is real. By forcing users to go through these filters, massive databases can be created that are not only targets for cybercriminals, but also potential tools for state surveillance. Is the cure worse than the disease? This government battle against anonymity is justified as a fight against hate and abuse, but the collateral damage is extraordinary. We would lose that structural privacy that the Internet has always offered. If to prevent a stalker or scammer from acting we must identify each individual on the network, we end up turning the Internet into a gigantic registry in which freedom of expression is conditioned by government blessing. Total paradox. The most ironic thing is that Europe, which has traditionally been a defender of privacy, is now totally in favor of those age verification measures that precisely put her in danger. The old continent, which has always criticized Big Tech for aggregating personal data of European citizens, now supports measures that will precisely help build these gigantic databases. If you have nothing to hide, you have nothing to fear. It has been more than a decade since we reflected on that typical phrase of those who did not seem to care that the NSA PRISM program I would have spied on them because they “had nothing to hide.” It’s easy to dismantle that theoryand it is a fallacy that Giving up privacy means greater security. Open debate. The Discord announcement has generated a huge debate in all types of networks, but we found a good … Read more

The new arms race is being fought at more than 6,000 km/h. And America is late

At more than 6,000 km/h there is no room to think twice. The new generation of hypersonic missiles operates in that speed range, a terrain in which the global military balance begins to shift. Russia and China they have already shown systems capable of flying above Mach 5. The United States, accustomed to setting the technological pace, moves forward with more doubts than it would like. The term “hypersonic” is not military marketing, but a clear category: devices that travel faster than five times the speed of sound. The real complexity comes with the trajectory. Unlike ballistic missiles, which ascend and descend in an arc, these systems can stay relatively low and change course in flight. This ability to maneuver, added to the thermal loads and ionization they suffer when passing through the atmosphere at such speed, explains why their development is so challenging. Hypersonic weapons enter the scene Russia was the first to proclaim operational capabilities. Its Avangard system, an intercontinental missile-launched glider vehicle, was announced for service in 2019 and Moscow claims it can carry a nuclear warhead. Experts in kyiv also claim that Russia used the zircon against the ukrainian capital in February 2024. China, for its part, demonstrated the DF-17 and tested the DF-27, which according to reports from 2023 flew about 2,100 kilometers in 12 minutes. In addition, it has shown the YJ-21, integrated into destroyers and bombers, consolidating a more visible deployment. The United States has focused on the Long-Range Hypersonic Weapon. Dark Eagle has a range greater than about 1,725 ​​miles, that is, about 2,780 kilometers, and a first system valued at about 2.7 billion dollars, according to the Government Accountability Office (GAO). The official plan aims to deploy it at the end of 2025, after a sequence of tests with failures in 2023 and 2024 that the GAO collected in June 2025. In August 2024, the CRS reported of the first satisfactory end-to-end flight. In parallel, the Navy is leading a common glider vehicle and the Air Force is working on an air-launched glider and a cruise ship with DARPA. The hypersonic threat tests the most fragile link in modern defense: time. The radar has less useful horizon at low altitude and Trajectory changes break prediction patterns. Furthermore, the dynamics of flight itself generate phenomena that can complicate detection. The forces trying to stop these systems are working on layers of sensors, more advanced tracking algorithms and more agile data links, but it is a challenge that is not yet solved. What sets hypersonic weapons apart is not just their performance, but the effect they have on the logic of deterrence. The impossibility of knowing what type of cargo they are carrying until impact creates fertile ground for misunderstandings. The United States assures that its development focuses on conventional ammunition, but rivals such as Russia and China have shown systems directly linked to their nuclear arsenal, which fuels distrust. Faced with this scenario, the allies are rearming their surveillance and defense architecture. In 2022, the United States, the United Kingdom and Australia expanded their cooperation within the framework of AUKUS to include “hypersonics and counter-hypersonics“, with emphasis on distributed sensors, shared intelligence and new interceptors. The objective is not only to have equivalent missiles, but to build a system capable of detecting threats in early phases and coordinating the response between different military nodes. The focus is on the next deployment milestones and on validating that this cooperation translates into real capabilities. Today, the initial advantage is not on the American side, and that realization has already had an effect on its military planning. Russia and China have moved first and have forced Washington to accelerate decisions and prioritize resources in the middle of a year of technological validation. It remains to be seen whether the deployment planned for this year consolidates a balance or confirms the gap. Images | People’s Liberation Army | Russian Aerospace Forces In Xataka | China promised them very happy with the catapult system of its new aircraft carrier. Until the US took a look

The authentic battle will be fought by ia agents

The dispute over world supremacy that maintains US and China It permeates everything. The global economy, the most developed defense strategy, the commercial relationship between powers … and technology has an absolutely protagonist role in The delicate current geostrategic situation. Semiconductors and models of artificial intelligence (AI) are the resources used by the two countries with the greatest influence of the planet to measure its strength, and it is understandable that it is so. The range of applications in which the avant -garde and advanced AIs are crucial to guarantee the development of a country is very wide. Its scientific capacity, its industrial development, its economic competitiveness or its military power depend largely on these two resources. However, AIs are supported by semiconductors. Without integrated circuits of high density, high performance and high efficiency it is impossible to implement a really capable AI model. This is the reason why the US government is doing everything in your hand to prevent GPUs for avant -garde that design Nvidia, AMD, Intel or brains, among other companies, reach China. But for the moment the country led by Xi Jinping is resisting the pressure. Jensen Huang, the general director of Nvidia, has declared A few days ago, China is not behind in front of the US in AI. And the solvency of Deepseek, Ernie, Qwen, Pangu, Hunyuan or Sensenova endorses its analysis. The greatest growth potential is the AI ​​agents Right now it is very difficult to determine in an objective way which country leads in AI. It is reasonable to conclude that the US is ahead of China if we stick to the joint capacity and performance of its AI models, but the really relevant thing is to determine if that capacity entails a real value. This is The line of thought that defends experts As Arthur Lai, Chief of Research for Asia of the Macquarie Financial conglomerate, or Jason Corso, professor of AI at the University of Michigan (USA). The metrics that are currently used to evaluate the abilities and performance of the most advanced AI models are less and less clarifying In addition, it is important that we do not overlook that the metrics that are currently used to evaluate the abilities and performance of the most advanced AI models are less and less clarifying. And is that as The models improve and develop Its global competitiveness is equalized. During The Google I/O event last week the spokesmen of this American company said that Gemini is the fastest AI in the world because it reaches a speed of generation of Tokens ten times taller than Deepseek. An note before moving forward: the generation speed of Tokens It measures the speed with which a model of AI generates the answers, but it is only an indicator of the many that is necessary to use to evaluate the ability of an AI. Alibaba, on the other hand, assures that his last family of Qwen models surpasses his rivals if we stick to the ability with which he addresses mathematical reasoning or application programming. In this context, the most reasonable conclusion we can get is that each company affects those indicators that favor it. However, for users, the really important thing is the real value that an AI gives us. AND According to Lai, Corso and other experts The greatest growth potential has it AI agents and not so much the great language models themselves. An agent is an AI program that has been designed to make decisions for himself and behave in an autonomous way with the purpose of achieving a goal. The most important difference between an AI model and an AI agent is that the latter does not need us to tell him at every moment what he should do; Plan, analyze and execute tasks for yourself. This is the battlefield in which the companies that are dedicated to AI will compete, if they are not doing so. Image | Beyzaa Yurtkuran More information | Nikkei Asia In Xataka | The US wants to end the chips for the Chinese that are sold abroad. And China knows how to defend oneself

In the center of Africa a race for minerals that moves the world is fought. And China is winning it

Lithium, cobalt, nickel, copper and, above all, Rare earth. These are some of the minerals and metals that dominate the world today because they are key to current and future industries. Revolutions such as renewable energies or that of the electric cars They go hand in hand with these materials, but they are also key to medical, aerospace and military industries. China It has advantage because Master the extraction and processing of key raw materials, but also for its enormous influence on the great world mine: Africa. Treasury search. We are talking about a key territory not only as a business opportunity, but as fountain of critical strategic minerals for the development of technologies that move the world and, also, the future of industries such as that of renewable energies or the electric cars. This is something that has encouraged several countries to want to invest in Africa, since ensuring certain resources is to cement that future. What countries are key? Congo Democratic Republic – It’s about the great world mine when we talk about copper, gold or cobalt. It is estimated that 70% of the world cobalt is extracted only in this country, but it is also crucial for coltan, tungsten, lithium or bauxite. The technology industry cannot work without them. Gabon – Another prominent territory when we talk about gold, but it is also an important source of manganese, iron and other essential minerals. China strategy. China and Western countries are very interested In those two countries in particular, but there are others, such as Zambia, of which they extract more lithium, metals of the platinum or nickel group. But China’s strategy is something that attracts attention throughout this panorama. The Asian giant has been doing years investments Of more than 10,000 million dollars to exploit the mines, extract the materials, process them and send them to China. They control the entire supply chain of these key minerals and esteem that import about 4,000 million dollars in minerals and metals every month. Central Africa is a priority area for China’s supply, but that is also an opportunity for the African countries involved. Investments and opportunity. Within China’s strategy, there is something that is very important: politics. Summits and bilateral agreements are held to ensure access to resources by China, but African countries also remain with their part. Within that interested investment in China, we see that ports, roads and railway lines are being developed. Jobs are also created, joint laboratories and training centers are created to strengthen scientific and technological cooperation. Geopolitics and debt. But, as is usually the case, there is a dark side in this story. On the one hand, competition between China and other global actors. That growing influence of the Asian country in central Africa is not something that makes the United States or European countries. It is something that generates more tension between them, but can also contribute to the tense political and economic stability of the African regions involved. There is studies that point in lack of transparency in contracts and the possible cooperation with authoritarian regimes to extract those resources. And they have also observed some risks of over -indebtedness by African countries. Arms. In all that geopolitical, commercial and collaboration context, and taking into account that we talk about territories with political instability and several armed groups, we cannot overlook another lucrative business for China: the sale of weapons. As we read in South China Morning Posta report by the Rand Corporation prepared in 2023 placed China as the main arms supplier for sub -Saharan Africa. Between 2019 and 2023, at least 21 African countries received great deliveries from Chinese weapons that includes weapons, ammunition, artillery, rockets, drones, missiles, armored and electronic warfare systems. It is also estimated that 70% of African armies use Chinese armored armored extended Its presence in countries such as Senegal, Ivory or Mali coast with new offices. This goes far beyond armament, since China also exports military and private security forces to protect the country’s mining interests. And this occurs because Chinese military exports are usually cheaper and with lower political conditions than Western alternatives, which is very sweet to those African states with a geopolitical context that is not stable. An asymmetric relationship. It must be added that China promised an investment of 50,000 million dollars in three years in the region and that it has pledged to train police and military in the area, but as already pointsall this investment in Africa is generating is an asymmetric relationship between countries. It seems that Africa is receiving much more than China because the former let them exploit their mines and the latter invest in infrastructure, employment, safety and sell manufactured products, but in the end what is achieved is that Chinese influence is huge in Africa. This rapid expansion in recent years causes sovereignty to be questioned and reinforce the idea of ​​what will happen in the area when strategic minerals have been extracted, since many depend on those Chinese investments, seeing how their local economic and political autonomy can stagger. And it must also be said that what we now see with China is something that, traditionally, have carried out other countries in those same territories, and it is something that they are in competing With its great adversary right now: the United States. Images | Hansueli Krapf, Africraigs, Steve Jurvetson In Xataka | In its particular underground war with Europe, China has found a new weapon: to monopolize copper

Spain has fought the fight against gender violence. And it is translating into mortal failures

A woman named Lina went to the police last January. His ex -part Viogén. This system, based on an algorithm, determined that Lina was a “medium” risk person. Three weeks later it was allegedly murdered For your partner. It is not the first time that something like this happens, and shows that we have a serious problem with our potential dependence on algorithms. The origin of Viogén. The Interior Ministry development In 2007 the Viogén system (integral monitoring in cases of gender violence). Among its objectives was to make a risk prediction and, depending on that prediction, monitoring and protection of the victims. How it works. The system is based on the collection and analysis from various sources such as police complaints, protection orders or criminal record. In the complaint, for example, a series of questions about the episode of the aggression, the situation of the victim, the children, the aggressor’s profile or the aggravating vulnerability, such as economic dependence are asked. Risk levels. From that evaluation one of the four levels of risk is assigned to each case (1 – low, 2 – medium, 3 – high, 4 – extreme). Each of them entails specific measures that may include from the allocation of telecare devices to remote orders. At the extreme risk, women have 24 -hour police surveillance. Viogén 2. The system has evolved since its creation and in recent months its second version has been implemented, Viogén 2. As explained in article 14the algorithm was updated with novelties such as eliminating the unreissented risk and hindering the inactivation of open cases. Thus, a new supervised inactivation modality appears that sets police control mechanisms for a period of six months extendable to one year. That makes it possible to monitor cases in which police experts have not appreciated the existence of risk for women or this is low. Zero protocol. There are also modifications that will allow the victim to request it in a “voluntary, manifest and repeated” way to inactivate cases of unattended risk, low or medium. Even so, the so -called “zero protocol” designed to minimize the risk of victims who express their desire not to denounce. According to the Macro -New Equalitythe vast majority of victims do not report, and therefore also protect them: institutions only have knowledge of 21.7% of cases according to said survey. Tragedies everywhere. The problem is that the system is not entirely effective. The alleged murder of Lina is the last example of the limited reliability of Viogén. In October 2024 a 56 -year -old woman She was killed Despite having asked for help even twice. Before, in 2024, another woman was killed by her partner and her It was also part of the Viogén system. The algorithm seems to minimize the risk. In the case of Lina, for example, the Viogén system allocated the “medium” risk for it, and that seems to happen on more occasions. In September 2024, 96,644 women were within the Viogén systembut only 12 of them were considered extreme risk, 0.01% of the total. Both the Minister of Equality, Ana Redondo, and the Minister of Interior, Fernando Grande-Marlaska, They minimize errors Recognizing that “the model is not infallible, but saves many lives.” New alarm against AI and algorithms. In recent times we are seeing how there are more and more cases in which excessive confidence is granted to algorithms on especially sensitive issues used in administrations and public institutions. The AI ​​does not stop making mistake. It happened with the Veripol system using AI to detect false complaints: His real reliability was very debatable. Something before, in March, we lived the Ábalos Case scandal in which an AI used to transcribe the statements of witnesses and defendants made mistakes and ended up turning some paragraphs into a gallimatisms. The AI ​​system for facial recognition itself that is being used for example In video surveillance cameras in Madrid He has done too Jump alarms in privacy. In the United Kingdom an AI was used to predict crimes to the minority report, and Its results were unfortunate. Attempts to apply AI in judicial processes and police They have also generated worrying conclusions. Lack of transparency. These systems are usually also criticized for their lack of transparency. Veripol is a good example, but we had others. In 2024 we talked about the Bosco system, used by electricity companies to decide who and who cannot accept the social bonus for aid to the light invoice. The Government He refused to share the source code claiming reasons for public security and national defense. It is not a problem only from Spain: there is an algorithm that suggests to the US judges what convictions imposebut its code is a secret, for example. In such delicate issues, the lack of transparency on the functioning of these algorithms is especially worrying. There were no agencies for this? In 2021 the creation of A Spanish Agency for Artificial Intelligence Supervision (Aesia). It was apparently centered to monitor compliance with the Digital Services Law (DSA) on platforms such as great social networks, and in fact in 2022 Sevilla was chosen To house the first European Center for Algorithmic Transparency (Ecat). What about Aesia. More recently we have seen how AESIA finally wants to take shape with Its coruña headquarters and start operating in 2025 to theoretically focus on the application of the EU AI Law. Its objective is theoretically to carry out “measures for the minimization of significant risks on the safety and health of people, as well as their fundamental rights, which can be derived from the use of AI systems.” Both the case of Viogén and Veripol’s or what happened in the ‘Abalos Case’ are precisely likely to enter that area, and it remains to be seen if the activity of this agency manages to help both the algorithms used as well as its application are optimal. Image | James Harrison | National Police In Xataka | We live a concentration crisis. Experts … Read more

Argentina fought the British missiles with a paste machine

Battles and wars always leave winners and defeated, but in some cases they occur Unexpected surprises due to the apparent advantage of some and the surprising outcome with the victory of the other. There are stories like the The Invasion of the United Kingdom trying to conquer Tenerife without knowing what was inside. The one that occurred in Malvinas had the expected endbut what nobody could imagine is what Argentina was going to defend. An unequal war. The FALVINAS WAR (1982) faced the Argentine Air Force (FAA) against the United Kingdom in a conflict where British technological superiority It was more than evident. While Be British Harrier They had advanced radars and missiles AIM-9 SidewinderArgentine airplanes lacked radar alert systems and electronic countermeasures. Moreover, the A-4 Skyhawk, Mirage III, Dagger and Canberra they operated without self -defense systems against radar -guided missiles, such as the Be dartlaunched from British destroyers. The pilot Pablo Carballo, veteran of Malvinas, He explained years later To a United States Air Force officer that Argentine pilots were not afraid when a radar alert receptor was activated because their planes simply did not have one. That lack of equipment left FAA with a single option: resort to ingenuity to create its own countermeasures. Electronic countermeasures. The so -called Like Chaffused from World War II, consists of metal strips that enemy radars saturate With false signals. It would be something like the measures/lures against electronic of our time. Plus: Argentina had detailed information about British radars, since the Navy operated two Type 42 destroyersHMS Sheffield twins. With a “but”: the FAA did not have an industry developed to produce large -scale Chaff, so they turned to the most improvised media. Be British Harrier The secret is in the pasta. The first production attempts began in the Military Air Base (BAM) Comodoro Rivadavia In May 1982. By not having specialized equipment, a group of officers devised a rudimentary method: Students recruited from the province of Entre Ríos to cut hand -to -cut strips. The problem? Production was insufficient. As they counted In The War Zoneit was then that a technical noncommissioned officer proposed an unusual solution: use a Industrial Machine for Pasta and noodles. That machine, borrowed from the Napoli pasta factory, had blades of the exact size to cut the aluminum strips efficiently. Thus, the team worked 24 hours a day for a week to make enough Chaff that could be used in combat. Deployment and difficulties. With the insured production, methods to launch the chaff were improvised from the airplanes. In it Mirage III and Dagger rolled chaff strips in packages wrapped in toilet paper and adhesive tape, which then They placed in the aerofrenos of the airplanes. This had a problem: the pilots opened the aerofrenos during the flight to maneuver, which could make the Chaff disperse before being useful. For The C-130 HerculesChaff was placed in bags tied with three -meter strings, which were thrown manually from the rear doors to create an interference curtain against enemy radars. Finally, with the Canberra MK 62 It was with the only unit that a partially successful system was used. Seven pitchers were installed in the back, with cartridges containing Chaff and Bengals. A Douglas A-4 Skyhawk of the Argentine Air Force in 1982 The “D” day. Thus, on June 2, 1982, the system was approved in a A-4C Skyhawk with launches from different altitudes, although No effective results were achieved. Other attempts included the use of FFAR rockets to disperse Chaff and the modification of Shafrir Missiles 2although none was really viable. Use in combat. On May 1, 1982, during a mission of bombing on the British forces, three Canberra MK 62 took from Trelew with the Chaff system and flares. The pilot Eduardo García Puebla reported how He managed to avoid Two missiles AIM-9L Sidewinder launched by a Sea Harrier thanks to the use of the improvised system. However, another Canberra failed to activate his flares and was shot down by a British missile. Days later, another Canberra was destroyed by a missile Be dart of HMS Cardiff without even having deployed Chaff. It is not clear if the countermeasures were really effective in some other episode, mainly because the British reports did not mention deviated missiles by these techniques (and it is very possible that they did not even know). The legacy. The end of the contest It is known (Although never It has ended at all). After 74 days of battle certainly unequal, the United Kingdom recovered the Falkland Islands. The conflict ended exactly on June 14, 1982 with Argentine surrender. However, FAA’s attempt to use chaff manufactured by hand With a pasta machine It is a testimony of ingenuity and determination in conditions of technological inferiority. Although the system had rather limited results, it demonstrates how in war the resources available can become improvised solutions. For the history of the contests, the only known conflict where a pasta machine was part of the military countermeasures. Image | Argentina.gob.ar, Magic Madzik, Us Defenseimagery In Xataka | There is a reason why the Canary Islands is not British: the day that United Kingdom invaded Tenerife without knowing what was inside In Xataka | The “longest war in history” faced a town in Granada and Denmark. The reason: a 172 -year -old forgetfulness

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.