Many people hide behind anonymous accounts thinking that no one can discover them. AI has bad news for them

Accounts without a profile photo or real name plague social networks; perhaps even you, who read these lines, are the owner of one. We do not judge, there are many reasons not to show your face on networks and, in fact, anonymity is the pillar on which the internet has been built. However, if you thought that calling yourself ‘user84721’ and having a landscape photo protected you, researchers have just shown that accounts can be deanonymized in minutes with AI (of course). The study. A team of researchers has published a study called “Large-scale deanonymization online with large language models” which is echoed Guardian. In it, they demonstrate how an LLM-based agent is able to compromise anonymous social media accounts with astonishing efficiency. The process consists of three steps: the LLM extracts identifying data (age, location, interests…), looks for possible matches in other users and finally reasons which are the best candidates, verifying the matches and eliminating false positives. Minutes. This is how long it took to identify users on sites like Reddit, Hacker News, and Anthropic Interviewer Dataset participants with this method. In the image you can see how, based on a few pieces of information such as where the student studies, the approximate age, the city and the name of the dog, they achieve a match with the user’s real profile. This is a fictitious case, but in the experiment they managed to identify real users by cross-referencing information with Linkedin profiles and other platforms. According to the researchers, LLMs allow for large-scale deanonymization of accounts, far exceeding the speed and efficiency of classical methods. They also highlight that there is not always enough information to reach a match, so everything depends on the online footprint of each user. Consequences. Researchers warn that this use of AI could be used for problematic purposes, such as governments that want to identify activists or cybercriminals seeking to launch highly personalized attacks. In addition, it must be taken into account that the system is not infallible and there may be false positives. Speaking to The Guardian, Peter Bentley, professor of computer science at UCL, warns that “People are going to be accused of things they haven’t done.” The end of anonymity. As we said at the beginning, the Internet has been built on the anonymity of its users, but we are experiencing a regulatory shift that pursues precisely put an end to it. We see it with the ban on social networks or the blocking of pornographic websites for minors promoted by countries such as United Kingdom, Australia, Denmark and now also Spain. These initiatives require the identification of users to be able to access certain content through video selfies, electronic ID, verification systems with AI… There are many options, What is not clear is its effectiveness. Image | Own preparation on a background of Google DeepMind In Xataka | There was no need to invent a “pajaport”, Google already includes it in Android. The real challenge is in Europe

85% hide a “cocktail” of pesticides and PFAS that current regulations ignore

If we think about a healthy food, the truth is that the apple is at the top. However, a recent published analysis by the NGO Pesticide Action Network Europe, in collaboration with 13 other organizations, has put an uncomfortable reality on the table: a good part of the conventional apples that reach our supermarkets are contaminated by multiple pesticides. The data. The report was based in this case on the analysis of 59 fresh samples of local production collected in September 2025 in 13 European countries, which also includes Spain. In this case, organizations like Ecologista en Acción have been able to corroborate The results have pointed to the following: 93% of the apples analyzed had at least one chemical residue, that is, only 7% were completely free of pesticides. 85% contained more than one pesticide, with an average of three different substances per fruit, reaching up to seven in the most extreme cases. By countries. While in Denmark only 20% of samples had multiple residues, in Spain, France and Italy the figure shot up to a worrying 80%. And when asked where so much chemical comes from, the answer suggests that apples can be sprayed with agrochemicals up to 30 times a year. The toxic ones. What worries the scientific community most is not only the quantity, but the quality of these toxins, since the breakdown of the substances found ignites several red flag: 71% of the apples contained pesticides classified by the European Union itself as “substitution candidates”, that is, the most toxic on the market that should be gradually removed by safer ones. 64% had PFAS wasteknown as “forever chemicals” for their persistence in the environment. The most common is fludioxonil, which is a known endocrine disruptor found in 40% of the samples. The consequences. The data here indicates that 93% of these commonly consumed apples did not comply with the strict legal limits required for the production of processed baby foods, highlighting the risk for children, who are especially vulnerable to these substances because they are much more sensitive as their livers do not have fully developed. The cocktail effect. If apples have a toxin on their surface, the question seems inevitable: why are they legal? This is where the European Food Safety Authority comes in, analyzing the substances individually, estimating that in the vast majority of cases the concentration of each pesticide separately is below legal limits allowed. In fact, the EU Annual Report on waste prepared by EFSA guarantees that exceedances above the standard are low. but the problem It’s in the ‘cocktail effect’ because the current regulations ignore the fact that when three or four toxins are combined, their effect is multiplied. However, despite the fact that the EU has had a legal mandate for 20 years to assess cumulative risks, to this day it still does not apply it rigorously, and if that were not enough, at the end of 2025 the European Commission put forward proposals that could further weaken these toxicity reviews. There are precedents. This study is not an isolated case, since other entities such as the OCU have already published information that pointed to the high level of toxic waste that is in some foods. Even EFSA itself It records this multiple contamination year after year in its databases, although it limits itself to validating that individually they do not break the rule. Faced with this panorama and waiting for European regulations to be updated to protect consumers from the cocktail effect, experts and environmental organizations agree on a clear recommendation: for those seeking to minimize their exposure to these hormone disruptors and persistent chemicals, organically produced apples, which according to studies are usually free of these residues, are currently emerging as the safest alternative. Images | Ilham Wicaksono In Xataka | We are surrounded by “eternal chemicals” that we could only destroy with cannon fire. It turns out that we have an ally in the intestine

The Black Death continued to hide an enigma almost seven centuries later. The answer was in some trees in the Pyrenees

There are few episodes in the history of humanity more famous, studied and debated than that of the Black Deaththe epidemic that spread death across Europe between 1347 and 1353. However, there remained an enigma to solve, one as basic as it was relevant: Why the hell did the epidemic break out when, where and how did it do so? Why did this wave of death break out in the 14th century and not before or after? Solving a puzzle. This mystery is what Martin Bauch and Ulf Büntgen, from the GWZO and the University of Cambridge respectively, have wanted to solve in a study just published in Communications Earth & Environment. With it they not only want to shed light on one of the darkest episodes in Europe. They also show that, almost seven centuries later, the “black death” continues to be one of the chapters that most fascinates the world. Nothing surprising if one bears in mind that between 1347 and 1353 it took millions of lives in Europe, reaching mortality rates that in some regions they touched 60%. Searching in the Pyrenees. Perhaps the most curious thing about Bauch and Büntgen’s study is that it does not start in historical archives. Or that wasn’t at least his main place of work. The key to his research is in the Spanish Pyrenees, more specifically in the secular pines that they found there. When studying the interior of their trunks in search of clues about the medieval climate of Europe, they found something unexpected: a succession of “blue rings”. For most, that detail would go unnoticed, but Bauch and Büntgen saw something in it: evidence of a chain of colder, wetter summers than usual. “Unusual summers”. When the tempera falls, the trees cannot properly lignify their cells, which in turn leaves a bluish mark in the ring register of the trunk. In the Pyrenean pines, researchers found such marks that suggest that much of southern Europe must have experienced “unusually cold and wet summers” in 1345, 1346 and 1347. What’s more, when digging through libraries and written sources they found clues that point in exactly the same direction: a period marked by “unusual cloudiness and dark lunar eclipses.” The next question is… What caused this change in climate? And why is it important? The power of an eruption. Regarding the first question, researchers have few doubts. In his opinion, the drop in temperatures in summer was caused by a volcanic eruption (or even a chain of them) recorded around the year 1345 and which triggered a fatal domino effect: a considerable expulsion of ash and volcanic gases that generated a layer and caused a drop in temperatures, just as happened in other episodes throughout history. Climate, agriculture… Hunger. For the next question, why is it important that a volcano began releasing gases and ash almost seven centuries ago, the answer is simple: agriculture. The changes in climate not only left their mark on the centuries-old trunks of the central Pyrenees, they also punished the fields of the Mediterranean region, reducing crops and generating losses that threatened to lead to famine… and social instability. Against this backdrop, the powerful maritime republics of Italy did the most logical thing: chartered ships to import grain from the east, from the Black Sea area, more specifically from the Golden Hordein the Sea of ​​Azov region. It didn’t matter that Genoa and Venice were at war with the Mongols. Hunger was pressing, the threat of riots loomed and European diplomacy did its job. Already late in 1347, ships with grain began to arrive in Europe, unloading their precious merchandise in Mediterranean ports. More than grain. The problem is that in the holds of the ships mobilized by Venice and Genoa, the same ones that were supposed to prevent Europe from being besieged by famine, there were not only tons of grain. On board they brought fleas infected with Yersinia pestisthe bacillus responsible for the bubonic plague. “The exact origin of this deadly bacteria is still unknown, but ancient DNA suggests that a natural reservoir may have existed in wild gerbils somewhere in central Asia,” they explain from the University of Cambridge. The result: grain ships suddenly became vectors of a fatal disease, the bacteria jumped from rodents to humans, and the Black Death soon spread across Europe, with something much worse than famine. The ships of the black death. The rest is known history. Between 1347 and 1353 the disease killed millions of people. It is often said that the plague took the lives of 60% of the European population, a percentage that some raise to 65%, although in recent years some studies They have warned that the calculation is overstated and there were regions in which the registry was maintained. “Evidence of the Black Death can be found in many European cities almost 800 years later,” Büntgen and Bauch explain. “We were also able to show that many Italian cities, such as Milan or Rome, were probably not affected, because they did not need to import grain after 1345.” Why is it important? The study is interesting for several reasons. The main one, because it sheds new light on an aspect as basic as until now enigmatic about the Black Death. We knew about the role of Yersinia pestisabout the ships, about the role played by rodents, we knew the tragic death toll, its impact on the society, culture and economy of Europe… But we did not know why the epidemic broke out just when it did and not before or after. The succession of factors is so fascinating that researchers speak of a “perfect storm” in which climatic, agricultural, social and economic factors were added. A cocktail that, they insist, does not only speak to us about the Middle Ages. “Although this coincidence seems unusual, the probability of zoonotic diseases emerging due to climate change and resulting in pandemics is likely to grow in a globalized world,” Buntgen adds.. “It is … Read more

An atoll in the South Pacific is the best kept secret of the ultra-rich. If you want to hide your fortune, this is your island

In the middle of the South Pacific, there is a little paradise which attracts both nature lovers and those looking to put their great fortunes safely away. The Cook Islands, with their turquoise beaches and dreamlike landscapes, have become the chosen refuge by many millionaires for keep your money safe and anonymous. Beyond being a privileged tourist destination, this archipelago adopts the second most used meaning of paradise: that of tax haven. Its special legal system protects the assets of those millionaires who decide to enjoy its dream beaches and its legal opacity with assets. They came for its beaches, they stayed for the trusts This natural oasis, located about 3,000 kilometers from New Zealand, is not only home to beauty and tranquility, but also a sophisticated asset protection mechanism that has gained global fame in recent years among millionaires around the world. Although many think of tax havens such as the Cayman Islands, the British Virgin Islands, the Cook Islands are distinguished by their ability to raise trust financial structures from which millionaires can manage assets of all kinds, from properties to cryptocurrencies, with a very lax taxation. Not in vain, the Cook Islands were a recurring reference in the great financial scandals that were revealed by the Panama Papers, Pandora or the Paradise Papers. As and how they counted in Fortunesince the 1980s, the Cook Islands established a single fiduciary system which offers a level of opacity and protection difficult to find in other enclaves considered tax havens. For example, the authority of foreign courts to intervene in these funds is not recognized and, furthermore, the identities of the owners are protected by law. This combination makes the country a bastion for those who want to keep their assets safe from external demands or embargoes. Cook Islands, a paradise for human and fiscal matters Here, millionaires transfer their assets to a trust managed by a local fiduciary (front man), while they can remain beneficiaries or dispose of the money and property freely. This separation between Ownership of the heritage and who enjoys it generates a legal barrier that makes it difficult for third parties to claim those assets. In this way, millionaire businessmen protect their fortunes in the event of bankruptcy of their companies because, legally, they are not owners of the assets that they do enjoy. Likewise, fortunes would not be so exposed to divorce cases. “If all your money is in your pocket and someone tries to take it from you, maybe they can. But if the money is in another country and not under your control, chances are they won’t be able to touch it,” he explained to Fortune Blake Harris, lawyer specializing in property protection in the Cook Islands. In addition, shell companies are used to manage certain assets in order to add another level of opacity to the ownership of trust assets. “We created a practically unbreakable structure. And it is a fundamental practice. It is necessary to protect yourself,” said Harris. Spanish millionaires also travel to paradise The Panama Papers and other tax scandals exposed the financial engineering that large fortunes were using to reduce their tax bill. Among the names that appeared in these investigations there were also some spanish names. It should be said that constituting a trust in the Cook Islands It is completely legal for a Spanish resident. The Polynesian atoll was excluded from the EU tax haven lists and from Spain. However, the Spanish legislation It focuses on who actually controls and benefits from the assets, not just who is listed as the formal owner. However, just because it is legal in Spain does not mean that it works the same as for an American millionaire. Spain does not include the figure of the trust in its legal framework, although it does takes it into account at the tax level. In practice, this means that even if the assets are transferred to a trustee in another country, The Tax Agency considers that the person residing in Spain retains some type of control or benefit over them. And if this control exists, the Treasury understands that this assets remain linked to the taxpayer and, therefore, must declare it as part of your heritage. Therefore, although the protection against international litigation offered by Cook Islands trusts is effective, in Spain they do not have the same effectiveness than in the US, so It is not such a popular instrument. between the great Spanish fortunes as among the millionaires of other countries. However, as how they point From the Gesta tax consultancy, trusts are recommended more as tools of succession planning or protection against civil risks, and both for evade taxes. In Xataka | They were promised a bitcoin paradise and zero taxes for 120,000 euros. Today there is only one desert island on the verge of disappearing Image | cook islandsUnsplash (Nathan Dumlao)

We believed that the pyramids of Giza did not hide any more secrets. we believed wrong

Talk about the pyramids of egypt is to talk about the Great Pyramid of Giza. The one of Cheops is the most colossalthe best preserved, the oldest of the seven wonders of the ancient world and the only one still standing. However, it is accompanied by two other vestiges of the past: that of Mycerinos and that of Khafre. That of Mycerinos, or Menkaura, is the smallest of the three, and for years we thought it had only one entrance. We couldn’t be more wrong. The hypothesis. It seems incredible that three of the most studied monuments of human history continue to keep secrets, but what the ancient Egyptians did with these three pyramids was colossal. They follow us surprising so much on the outside as insideand from time to time, as exploration technologies advance, we discover something new. However, although the large one attracts all attention, an archaeologist had his sights set on the Mycerinos. The reason is that, on the north side, the stones that represent the entrance are perfectly aligned and appear more polished than those of the rest of the structure. However, the researcher Stijn van den Hoven He noticed that there was another set of exceptionally polished granite blocks on another face of the pyramid. And, in 2019, he hypothesized an additional entrance to the structure. Non-destructive exploration. Since science is not done alone and must be done, an international team of archaeologists from Cairo University and the Technical University of Munich they got to work to investigate Stijn’s idea. This group is part of the project ScanPyramidswho analyze the pyramids with non-destructive measurement techniques. To do this, they use techniques that are also being used in other places in the world (for example, to discover the secrets of the Mayans). Thus, the ScanPyramids team, analyzed the pyramid of Mycerinos with the latest technology non-invasive analysis: ERTor Electrical Resistivity Tomography. This detects subsurface resistivity variations that reveal cavities or materials of different density thanks to electrodes that penetrate the structures and are computed using three-dimensional inversion algorithms. GPR or georadars. Through electromagnetic waves that penetrate materials and are reflected, anomalies can be found. U.S.T. or ultrasounds. They measure the reflections of sound waves to examine the interior of structures without causing damage. Excavations have revealed these much more polished stones Air-filled anomalies. It is not the first time that this combination has been used at the site, since in 2023 a hidden corridor in the Great Pyramid of Cheops was confirmed using these techniques. And in Micerinos it has also worked. Specifically, two air-filled cavities located directly behind the area of ​​polished granite that van den Hoven observed. The Anomaly 1 It is a cavity located 1.4 meters deep from the eastern surface and would have dimensions of 1.5 meters wide by one meter high. The Anomaly 2 It starts at 1.13 meters deep and measures about 0.9 meters wide by 0.7 meters high. From the Technical University of Munich, the archaeologist Christian Grosse has stated that these techniques allow developing “very precise conclusions about the nature of the interior of the pyramid,” affirming that “the hypothesis of another entry is very plausible” and commenting that these results go in the direction of confirming said entry. The alleged cameras Next steps. Independent researchers who were not involved in the study have stated that the entrances to the pyramids from this era are located on the north face, but that further exploration will determine whether these voids are an anomaly, part of a second entrance as the ScanPyramids team suspects, or “something else.” Now, although these techniques allow us to recognize the interior very precisely, they cannot determine the extent of the cavities due to limitations in the penetration capacity of the tools. They have suggested that the next steps should go in the direction of using techniques such as infrared thermography or muon tomography with cosmic rays in order to have more precise information. Implications. In the end, all these works are supervised by the Supreme Council of Antiquities of Egypt and by the Ministry of Tourism and Antiquities, very interested in seeing them carried out. these discoveries (due to tourism issues) while complying with the standards of care for heritage research. Grosse comments that technology allows us to make discoveries that were unthinkable not so long ago and, when the analysis is completed and it is determined what those air-filled cavities are inside Mycerinos, it could transform the understanding we had until now of the architectural design of this 4,000-year-old monument. Images | ScienceDirect, TUM In Xataka | Of the seven wonders of the ancient world, there is one that we don’t know where it is. That makes her the most fascinating of all.

Six secret locations hide a 200 megawatt treasure

The battle for The electricity supply It has become an essential component of The hybrid war Modern, one where the line between civil infrastructure and military objective is blurred. To the Attack thermal plants Or transmission lines, Russia not only seeks to disable the network, but also sow panic, break morality and destabilize economic life. Now Ukraine has materialized an unpublished plan to combat winter in the war: a 200MEGAVATIOS hide and seek. Light as an act of resistance. Ukraine goes into his fourth winter of war after have survived to three seasons of forced blackouts For Russian bombings, with engineers repairing under -fire substations and millions of citizens supporting cold and darkness. However, this time the country is committed to An unpublished resource: A network of huge American design batteries, distributed in six secret and conceived locations to offer an energy mattress when the network is attacked. Its joint capacity of 200 megawatts It is equivalent to illuminating for two hours about six hundred thousand homes, enough to maintain urban life while the technicians restore the service. The heart of a war system. The Six battery parkslocated around kyiv and the Dnipropetrovsk region, are integrated directly into the national electrical system. They do not replace centrals, but allow to cover the sudden fall of thermal plants or substations achieved by missiles and drones. Its modularity is key: each block can be isolated and replaced without compromising the whole, which reduces vulnerability to direct attacks. Ukraine protects these enclaves with anti -aircraft defenses and the secrecy of its location, aware that a single Russian impact could cause a chain blackout. Energy storage systems in Ukraine Moscow’s offensive. From the beginning of the invasion, more than half Of the Ukrainian generating capacity it has been useless by bombing against thermal plants, coal mines and gas networks. Even nuclear energy, which previously supported most of the system, has been diminished: the largest central is under Russian control and out of operation. The Kremlin strategy seeks to bend the population leaving it without light or heating in the middle of winter. Last year failure Thanks to Technicians ingenuitybut the Mass production Shahed drones predicts attacks more intense and prolongedcapable of saturating Ukrainian defenses. Energy as a weapon. kyiv has also brought the war to the energy field. His drones have Beef Russian refineries And they left tens of thousands of citizens without supply In Belgorodas retaliation for the devastation of your electricity grid. In negotiations sponsored by Washington, he was talking about A non -aggression pact about energy infrastructure, but the ATaques have resumed As the cold approaches. In this pulse, electricity is not only a vital resource, but a strategic weapon that both sides use to erode the moral of the adversary. West as a support. The battery network is part of a 140 million dollar program funded by the Private energy DTEK and Ukrainian banks, with teams supplied by the American Fluence. Washington and Berlin reinforce in turn The air shield With patriot systems, although kyiv insists that protection remains insufficient. He Renewable development As wind and solar add resilience: its dispersion prevents a single attack from demolishing the entire generation, and batteries balance the natural intermittency of these sources. History lessons. If we expand the frame, the use of energy as a battlefield is not, much less, exclusive to Ukraine. In World War II, Allied bombings On German Ruhr hydroelectric plants, they sought to paralyze the industrial production of the third Reich, and in Iraq, both in 1991 and 2003, the coalition headed by the United States Deliberately destroyed electric plants to disorganize Sadam Husein’s forces. Even in Kosovo, in 1999, NATO used graphite bombs that disabled transmission networks without destroying the structures, a reminder that light can be extinguished for military purposes without spilling direct blood. In all cases, cutting electricity meant hitting the heart of the resistance of a country, weakening its productive capacity and, above all, its morals. In Ukraine, possibly aware of history, they prepare to resist what in other wars were decisive. Light as a symbol. If you want also, electricity in Ukraine has become a resistance metaphor. Keeping the lamps on kyiv, járkov or leopolis means demonstrating that neither missiles nor blackouts will break everyday life. In a conflict where entire cities are tried to turn off, the Ukrainians have made light an act of challenge and faith. Image | Ministry of Defense of UkraineDTEK / Facebook In Xataka | The greatest attack of Ukraine on Russian soil discovered a new threat with drones. China has just multiply it In Xataka | We had seen everything in Ukraine, but this is new. In front of the drones, Russia has taken out its “other” artillery: horses

We believed that the iPhone 17 and the Air shone by cameras and design. We have just discovered that they hide an exclusive security function

For a long time we have lived with the illusion that there are impenetrable computer systems. The reality is less resounding: in security, everything is reduced to how much effort, time and resources it requires to force a lock. Just as it is not the same to open the door of the house as the vault of a bank, in the digital world There are more or less resistant barriers and unexpected shortcuts that avoid brute force. The objective of the defense is not perfection, but to raise the toll to break it is impracticable. From there, the risk never disappears, it is managed. With that practical look, Apple has been adding layers to make every step of the attacker more and reduce its maneuvering margin. According to the Cupertino companythe most sophisticated exploitation chains that have observed against iOS come from the mercenary spyware and rely on memory vulnerabilities. Although they do not explicitly mention it, they surely refer to threats such as Pegasus of the company NSO. And the answer they have raised is a new piece in that wall: a reinforcement that integrates hardware and system to monitor the integrity of memory and cut overwhelms or undue accesses before they thrive. Memory Integrity Enforcement on iPhone 17 and iPhone Air Apple has presented Memory Integrity Enforcement (Mie) as part of the new iPhone 17, iPhone 17 Pro and Pro Max and iPhone Airan integrated memory defense directly in its hardware and operating system. This development is the result of five years of joint work among their teams of Chips and Software Engineeringwith the aim of drastically raising the cost and complexity of attacks based on memory corruption. Mie promises to act continuously and transparently, covering critical areas such as kernel and more than 70 processes in user space, all this without compromising energy consumption and device performance. The Miene nucleus combines several layers that work in a coordinated manner to reinforce security. The typated memory assigners are systems that organize the data according to their type, as if each object class had a specific drawer. This organization makes it more difficult than an error in a program allows one data to overwrite another. If a failure occurs, the system can detect it before it becomes an attack. On this basis acts the Enhanced Memory Tagging Extension (EMTE), a hardware technology that adds an extra layer of memory control. Emte works by assigning a “secret label” to each memory block. Every time an app or the system wants to access it, you must present the correct label; If it does not coincide, Hardware blocks attempt And the system can close the process. This permanent and synchronized check allows to detect and stop classic attacks such as buffer overflows or use after release (USE-AFTER-FREE), which are usual techniques to take control of a device. The allocators protect the use of large -scale memory, while EMTE provides precision to the smallest blocks, where the software itself does not respond with the same effectiveness. This permanent and synchronized check allows to detect and stop classic attacks such as buffer overflows The bet responds to a landscape of threats where the highest levels against iOS are faces, complex and directed, historically associated with state actors. These chains usually share a common denominator: they exploit interchangeable memory vulnerabilities that have been present throughout the industry. The intention of Mie is cutting the progression in early stages, when the attacker still has little room and depends on chaining multiple fragile steps to gain control. Apple graph showing real exploitation chains and the points where it blocks them The scope of protection includes kernel and extends to key system processes that are usually entry objectives. In addition, Apple makes available to developers the possibility of testing and integrating these defenses through the Enhanced Security option in Xcode, including EMTE capabilities in compatible hardware. That is especially relevant to applications where a user can be direct objective, as messaging or social networkswhich often appear at the beginning of the exploitation chains. To sustain the labeling and synchronous check -up without perceptible impact, Apple redesigned the A19 and A19 Pro allocating CPU area, CPU speed and memory for label storage. The company precisely modeled where and how to deploy emte, so that the hardware meets the demand for checks. The software, on the other hand, takes advantage of the assignments typated to raise the bar of protection against memory corruption, while the hardware assumes fine verification. As we point out above, this should maintain the expected experience in performance and autonomy. The project was evaluated with its offensive research team from 2020 to 2025. First with conceptual exercises, then with practical attacks in simulated environments and, finally, on hardware prototypes. This prolonged collaboration allowed to identify and close complete exploitation strategies Before launch. According to Apple, even trying to rebuild known real chains, they failed to restore them reliably against Mie, because too many steps were neutralized at the base. Even so, Apple remembers that perfect security does not exist. Very rare cases could survive, such as certain overflows within the same allocation. For previous generations without EMTE support, the company promises to continue expanding software -based improvements and safe memory allocatives, with the aim of bringing part of these benefits to previous devices without affecting its stability. Ultimately, Mie does not eliminate riskbut it does redraw the rules of the game by raising the cost and difficulty of memory corruption techniques. For those who buy an iPhone 17 or an iPhone Air, this translates into always active protection and, according to Apple, invisible for the user. Images | Xataka with Gemini 2.5 In Xataka | Or pay or we will use your works to train AI: the threat of hackers to an artist website In Xataka | How to change all our passwords according to three cybersecurity experts

Github is vital for millions of users. That is why it has become the perfect place to hide malware

When a tool is so useful that no one dares to block it, it becomes a magnet for attackers. That is what is happening with GITHUB: public repositories, camouflaged archives and malicious loads that go unnoticed in corporate environments. Cisco Talos has uncovered a campaign that demonstrates it. The campaign, active since February 2025, was not an isolated experiment. It was a well structured operation based on the malware-as-a-service model (MaaS), in which attack tools are sold as if they were cloud services. In this case, the operators used Github to distribute malware through seemingly harmless links. When the malicious code hides in full view “In many environments, a malicious download from Github may seem Normal traffic”, Talos researchers explain. And there is the problem: the actors behind this campaign knew how to move between the legitimate and the harmful without raising suspicions, using the platform owned by Microsoft as an undercover distribution channel. The process began with Emmenhtal, a Loader designed to act by layers. Three of them were exclusively responsible for hiding the code. Only at the end of the process a script was executed in Powershell that contacted a remote address to download the real payload. That payload was Amadeya malware known since 2018 in Russian speaking forums. Its main function is to collect information from the infected system and Download additional files depending on the profile of the equipment. The most striking thing is that these files did not One of the most active accounts was legendary99999. In it, more than 160 repositories with random names were detected, each hosting a single malicious file in its release section. From there, the attackers could send direct links to the victims, as if it were any other legitimate download. Legendary 99999999999999 Settle Legendary9999 was not an isolated case. Talos identified other accounts, such as Milidmdds or DFFE9EWF, which followed a similar pattern: random names, repositories with harmless appearance, but designed to execute malicious loads. In total, malware samples such as Rhadamanthys, Lumma, Redline or even legitimate tools such as Putty and Selenium Webdriver were detected. The operation was always the same: once the equipment was infected, Amadey downloaded the necessary file from Github, according to the needs of each operator. The most striking is the flexibility of the operation: from remote access Trojans such as Asyncrat, to scripts disguised as MP4 files or even python code with hidden functions. Github acted quickly. As soon as Talos notified the findings, LThe accounts were eliminated. But the problem does not seem to be the platform yes, but the strategy behind its use: take advantage of legitimate and necessary services to hide malicious activities. Images | Xataka with Gemini 2.5 Flash | Talos In Xataka | The “Son in Hurry” scam had been wreaking havoc throughout Spain for years. Police are finally dismantling it

They barely have trees to hide

There are still contactless tribes on the planet that defend their territory with nails and teeth. Possibly, the more extreme case is that of the trench they have mounted In North Sentinelbut they are not the only ones. In general, the few tribes of this type that remain have managed to escape the “exterior” showing themselves faithful to their way of life. The problem, As we point out Recently, they are receiving a series of visits Very dangerous. And in other cases, they are directly taking away their “hiding place.” The last resistance. They told it in two extensive reports The Guardian and O Globe. Twenty -five years ago, the anthropologist Beatriz Huertas He followed the traces of an invisible town in the heart of the Peruvian Amazon. The Mashco Pirothe largest indigenous group not contacted on the planet, appeared on the banks of the rivers, took bananas and faded in the jungle. Since then, its history has been that of a silent resistance to threats every time most lethal: Legal and illegal felling, drug trafficking, diseases brought by outsiders and climate change that alters the vital cycles of the jungle. Although Peru protected a portion Of their territory, the wood concessions granted right next and within their traffic areas have caused forced and violent coexistence. The expansion of Protected Areaapproved Almost a decade To avoid these clashes, it was never implemented. The result is a jungle where the Mashco Piro live In constant alert And where even the indigenous guards such as Romel Ponciano confirm that only men and adolescents are seen: the rest is hidden, fearing new fatal meetings. A diffuse border. Despite international treaties already a national law of protection of villages in isolation, the real measures to safeguard the Mashco Piro have been fragmented, slow and insufficient. While the Ministry of Culture reduces budgets and surveillance positions operate with just two people, wood concessions with international certification as FSC (supposedly synonym for sustainability) overlap vital territories for isolated. Companies like Tahuamanu Canales Madera They have been involved in mortal confrontations, and others as wood They manage concessions within the area whose protection remains stagnant Since 2016. In parallel, officials of the Ministry of Agriculture and local authorities such as the mayor of Tahuamanu They promote studies “Verifiers” that seek to question the need for the territory for isolated, prioritizing the commercial value of wood over the right to exist without contact. What do the authorities say. He Official speech oscillates between denying the very existence of isolated peoples (as the former President Alan García) and justify its displacement on behalf of the “order” against drug trafficking. All this under a developmental development that makes indigenous obstacles and not holders of fundamental rights. Paper battles. Indigenous organizations have achieved legal victories, such as the Cancellation of 72 concessions In Loreto, but they fear that these triumphs evaporate if the idea of ​​”shared areas” between isolated villages is institutionalized. In fact, the proposal to exclude non -contacted communities from the consultation processes required by the FSC certification It has been indicated as a serious omission. Impunity. Activists like Carla Cárdenas have presented motions To prohibit any certification in territories with indications of peoples in isolation, but the vote is in the hands of the sector’s own companies. While, The Guardian remembered that each delay in summoning the committee that must decide on the expansion of the Mother of God Reserve prolongs the impunity of operations in Mashco Piro territory and paralyzes other strategic reserves Like Yavarí-Mirimin the north of the country. Plus: all this happens in a region already crossed by the Interoceanic roadwhich brought illegal gold, secondary routes of logging, and a Deep fragmentation of the Amazon ecosystem. Even areas with “more responsible” companies have become conflict points. Two countries and a threat. On the Brazilian side, the situation It is not better. Although the Lula government has taken some steps such as the proposal of the indigenous territory of the Chandless River, indigenous organizations denounce that the commitments are more rhetorical than real. The projected path between Santa Rosa do Purus and Manoel Urbano worries the defenders of the ACRE, as it could become a new entrance door for timber and traffickers. Binational cooperation with Peru, essential to protect a people whose mobility does not know political borders, expired in 2016… and was never renewed. In absence of agreements Government, indigenous organizations themselves have proposed two large territorial corridors that would add 25 million hectares protected From the ground, Manchineru volunteers monitor the movements of their “distrustful relatives” to avoid fatal encounters and preserve their autonomy. But the recent dynamism of the Mashco Piro (their appearance out of season, its downstream) suggests that external pressure is forcing them to alter your patterns traditional Warning from the jungle. Thus, in the core of this silent tragedy the report highlighted a truth that the Mashco Piro repeats when they are shouted from the other shore: They don’t want contact. It is not ignorance or a whim: It is memory. That of generations that have seen diseases, weapons, chainsaws and roads such as Death omens. For the Mashco Piro, the trees They are monuments. Asking them if they want to approach, The answer It is the same: “No, because you are bad.” They do not distinguish between good and bad, but between a worldview that respects the jungle and another that destroys it. If you do not act soon, and if your will is not respected and your territory is protected effectively, that warning could become an epitaph. Without trees and their wood has nowhere to hide. Image | Survival International In Xataka | In the Peruvian Amazon, the latest tribes never contacted will receive a visit: that of oil companies In Xataka | Those who have approached less than 5 km from this island have not returned. An American managed to enter … and has lasted five minutes

Huawei wants cars to drive alone in the future. So he is already devising how to hide the steering wheel

China wants Lead the car race of the futureand for this he will need to win in Battery developmentimplementation of own semiconductorsvehicle software and … Autonomous driving. The country led by Xi Jinping is doing Check In several of these pillars, and Huawei assumes a good part of these victories. The company has been working for years to lead technologies associated with electric cars, and autonomous driving is one of the keys that characterize it. Related to it (and related to how Huawei understands luxury in cars that have their technology), we have clues about what their future proposals will be like. A steering wheel that hides. On June 6, Shenzhen Yinwang Intelligent Technology Co., LTD (subsidiary mostly participated by Huawei) registered a design patent before the National Office of Intellectual Property of China. This application refers to a retractable steering wheel, capable of being hidden in the command post. Once hidden. The patent does not refer to the exact operation, but shows a key related to its purpose: how the seat moves back when the steering wheel folds. The possible uses. Huawei has not detailed the scenarios of use, but there is a quite clear one: that when entering and leaving the vehicle, the steering wheel folds. Although the first thing that comes to mind has to do with Autonomous driving, The objective of the patent would also be related to the gain of space in the cabin. Relaxing the autonomous driving steering wheel is possible, but reserved for a very specific group of vehicles: those that have capabilities Autonomous conduction of type L4 and L5. Currently, there is not a single car in the world with these capabilities that we can buy as private users. In China, it is reserved for robotaxis like Baidu Apollo Goor the Waymo Alphabet in the United States. Vehicles with very restricted circulation and closed fleets. What is Yinwang and what does it do. Founded in January 2024, Shenzhen Yinwang Intelligent Technology Co., LTD is a subsidiary of Huawei under its majority participation. The remaining 20% ​​is in the hands of Avat (An independent manufacturer that is sold in Huawei’s own stores in China and has Huawei Harmonyos and Technologies) and Group beings. Born to transform the Huawei Intelligent Automotive Solution (Hias) division into one of the main technology providers for electric and autonomous cars. Yinwang is responsible for manufacturing and supplying smart systems for vehicles: algorithms, sensors, integration of harmonyos adapted to automotive, control of car elements such as thermal management, suspension or braking, etc. Among his clients are brands such as Aito, Luxeed or Avat, who enjoy Huawei technologies. How house with Huawei’s strategy. Huawei’s role in the world of electric car is different from rivals such as Xiaomi. Huawei does not make electric carsdevelops the necessary technologies for China to lead them. Ren Zhengfei, founder of the company, showed his rejection of commercial terms such as “Huawei Aito”, and made it clear that his plan is to associate with different companies to provide them with their automotive solutions. At the moment, he has managed to associate with giants like Chery to provide the Luxeed S7 of autonomous parkingfight to win the career of faster electric car loaderand collaborate with Aito To provide him with his software. Patents, patents are. It is important to clarify that the registration of a patent does not have to translate into an exact materialization of the idea collected. Image | Luxeed In Xataka | China has traced another technological field in three years where a sidereal front: the robotaxis

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.