The first telecommunications network in history arose in ancient Syria, 3,800 years before the internet

Nowadays it is difficult to think of anything other than being able to communicate with anyone instantly, no matter how far away they are. As a millennial, I have lived in the era when sending messages continuously was not common: SMS was not free and forced you to economize on language. And of course, before there were telephone calls, the reception of which today causes fear among youth. We can go back in time to the telegraph or the imperial postal networks and even the discreet carrier pigeons, which have been helping humanity communicate from the ancient Sumerian and Egyptian civilizations. A recent post from the historian and professor of history at the University of Central Florida Tiffany Earley-Spadoni published within a volume on global perspectives of warscapes brings to the fore the first telecommunications network documented both textually and archaeologically 3,800 years ago: a system of beacons to launch an SOS. The discovery. A cuneiform chart excavated at Mari, eastern Syria, dating to 1800 BC is the oldest known historical evidence of signaling using fiery beacons. But we also know what he said: an official named Bannum writes to the king while traveling to the north of the region with concern after observing the successive lighting of bonfires near Terqa and requests reinforcements. That lighting was not accidental: it was a signal of imminent danger on the border, an early warning system for possible attacks on their cities. Early-Spadoni refers to this system as a “fortified regional network,” or FRN for short. A little context. This documentation is framed within the Syrian Middle Bronze Age, a territory of cities – states in constant conflict. Taking the city meant dealing a blow to the rival and keeping its wealth, hence the siege was the star attack. But conquering a territory was much easier than administering it. Thus, these states had great ambitions, but lacked the infrastructure to govern themselves from a distance. So to better defend themselves and control the territories they used two systems: large walls surrounding the cities and a network of forts, towers and guarded roads in rural areas. This second structure is the seed of the development of empires. Why is it important. Bannum’s letter is the oldest known historical testimony of the use of an intentionally designed telecommunications network with shared infrastructure, nodes, and protocol. Do not confuse with communication methods, since smoke or drums are prehistoric and undatable. But it is also key for civilizations insofar as it allowed us to go from “presumptive states” (which conquers territories it cannot govern) to develop real and lasting territorial empires: without this infrastructure of communication and control, the size of the empires would have been simply ungovernable. How it worked. With a physical structure made up of fortresses, forts, watchtowers and wall segments and with an operation protocol. It essentially served to control routes, resupply military personnel, transmit information and track movements in the territory. The physical hierarchy of its infrastructure was distributed along roads and river crossings spaced at regular intervals of about 20 kilometers to ensure visibility between nodes. The large fortresses were the main nodes with smaller forts between them, with watchtowers for signaling to reinforce points that were difficult to see and segments of walls in strategic areas. The system operated continuously: with smoke during the day, fire at night, and had permanent reserves of wood. Each signal was known by all the nodes, so that when a beacon, the signal traveled through the nodes until it reached the center in a relatively short time. Speed ​​was its great asset and its handicap was how limited it was: it could only transmit simple messages. The early “internet”. Comparing it with the current Internet is not just a rhetorical question: FRNs share with the Internet several of its principles, such as distributed nodes, redundancy to avoid failures, protocols agreed in advance and a topology to maximize connectivity between distant points. A before and after to build empires. This system did not disappear with Mari. For more than a thousand years, each new empire that emerged in the Near East encountered these networks, recognized them as a valuable structure, and implemented them to suit their needs. The Neo-Assyrian integrated them into walled cities and in parallel developed a horse relay system for more complex and confidential messages, impossible to transmit with the original infrastructure. The Urartian Empire made them the organizing principle of an entire empire. And the Persian Empire took the model to its maximum expression with the royal road that Herodotus describes in his Histories: forts at regular intervals, relay of messages and archaeologically confirmed fire beacons in Anatolia. Earley-Spadoni’s conclusion is that without these infrastructures, the largest empires of the ancient world would not have been able to manage themselves. In Xataka | From when a monstrous telecommunications tower and its more than 4,000 cables blocked the sun from the inhabitants of Stockholm In Xataka | In 1901, a Spanish man had one of the ideas of the century: invent the remote control before television Cover | حسن and Ezra Jeffrey-Comeau

It took eight months for the French Academy to bring Jim Carrey to Paris. It took the Internet eight hours to decide that it wasn’t him

On February 26, Jim Carrey received a prestigious Honorary César for his entire career in Paris, after years of semi-retirement. But what was born as a touching emotional tribute at the center of a conspiracy theory: was it really him who took the stage, or an impersonator with prosthetics? The story of how an Instagram post unleashed chaos (and how it ended up being denied). A tribute. Jim Carrey has received this year’s Honorary César: the French Oscars rewarded his “exceptional versatility” with an award that Julia Roberts, Christopher Nolan and David Fincher had already received. It also arrived at a time when Carrey’s career was at a peculiar point: in 2022, at the press conference for ‘Sonic the Hedgehog 2’ he announced that he retired. But he came back three years later. with brutal honesty: “I have bought many things and I need the money“Frankly.” Therefore, Carrey arrived in Paris after a false retirement that had made him partially disappear, yes, from the red carpets and premieres. And now he was on the most elegant stage in European cinema. He had not disappeared from the public light, however: in November, had been seen at Soundgarden’s Rock and Roll Hall of Fame induction ceremony in Los Angeles. But his appearances have always been, in recent years, spaced out in time and without warning. The delivery. The first unexpected moment of the night came when Carrey, after being introduced by Michel Gondry, and with an aesthetic that left behind the lush beard of recent years, gave the acceptance speech completely in French. The accent was unmistakably American, but it was very worked. As Gregory Caulier, general delegate of the Caesars, would later reveal, I had prepared it for months. In it revealed a connection with France that no one knew: his ancestor Marc-François Carré (the family’s original surname before Anglicization) was born in Saint-Malo and, from there, emigrated to Canada The change. In fact, already at the aforementioned Rock & Roll Hall of Fame ceremony its appearance It had aroused some surprise: it already had the aesthetic that it repeated at the Césars, with shoulder-length hair and slightly different facial features than usual. The first speculations pointed to the cosmetic surgery as a possible reason and some experts on the subject speculated about what those interventions could have been. Dr. Millicent Rovelo speak of an upper blepharoplasty (to remove excess skin from the upper eyelids) and a significant volume of Botox on the forehead. Another surgeon, Dr. John Diaz pointed out to a possible cervical tightening procedure. The very media Dr. Tony Youn pointed out signs of an endoscopic brow lift that would explain the slight displacement of the hairline. and joined the hypothesis of blepharoplasty and Botox. Finally, Dr. Raffi Hovsepian, dissented: The changes in the forehead and eye area seemed compatible with natural male aging, without surgical evidence. Let’s not forget that in 2003, Carrey appeared at the Teen Choice Awards completely blindfolded, wearing sunglasses, pretending to come out of surgery. By then rumors arose about the tweaks to his physique. The mask artist. Four days after the ceremony, Alexis Stone posted a carousel of three images on Instagram. The first two featured Jim Carrey. The third was a latex mask, false teeth, a dark wig, and various makeup materials arranged on a table with the Eiffel Tower out of focus in the background. The caption was simply “Alexis Stone as Jim Carrey in Paris.” Stone is a self-taught effects designer who has built a career on hyperrealistic transformations that have allowed her to pass herself off as Madonna, Jack NicholsonLana Del Rey, Robin Williams’ Ms. Doubtfire or Glenn Close’s Cruella de Vil. Stone usually documents his process in detail, but this was not the case: we only saw a mask that even had details that some users saw themselves as belonging to an AI generationwith excessively perfect contours and a blurry background typical of synthetic images. but when famous like Megan Fox or Katy Perry spread Stone’s posts, the rumor germinated all over the internet: the Césars were not Jim Carrey, but an imposter. Because. The arguments that the conspiracy theorists maintained They appeared almost at the same time as the gala. For example, the color of the eyes, usually dark brown, here a more greenish tone. More: Carrey is left-handed, and several short videos showed him in Paris using his right hand to sign autographs. The third argument was the speech itself: that someone who was theoretically retired and had no active ties to France spoke for ten minutes in French with very elaborate pronunciation, it was, for a part of the public, tremendously suspicious. The interviews that prove it. Of course, this is the moment that conspiracy theorists have been waiting for to bring up interviews from Carrey’s past with ambiguous, philosophical or downright incomprehensible answers. In 2017 declared that he did not believe in personalities, that the fashion party he had gone to and at which he was being interviewed seemed to him “absolutely meaningless” (from a metaphysical point of view) and that “there is no self, there are only things happening” (later the actor himself I would rate the interview “existential experiment”). In a previous interview, he calmly said “I’m dead“, but it was in the context of a conversation about spirituality and ego. We recommend fans of the most disconcerting Carrey to check out the incredible documentary ‘Jim and Andy’, which documents his literal transformation into Andy Kaufman for the filming of ‘Man on the Moon’. Official confirmation. The first official statements came from Marleah Leslie, Jim Carrey’s publicist for decades, with a brief message and that left no room for doubt: “Jim Carrey attended the César Awards, where he accepted his Honorary César Award.” That same day, the aforementioned Gregory Caulier told Variety what the eight months of preparatory conversations had been like and the months that the actor dedicated to working on his French. Carrey went to Paris accompanied by … Read more

The first great Atlantic submarine cable that connected us to the internet says goodbye for a simple reason: it was too expensive to repair it

It has been at the bottom of the sea for more than two decades, forgotten. But now, finally, the TAT-8, the first fiber optic cable that crossed the Atlantic and connected us to the Internet, is being removed from its place. And to understand the importance of this, it is worth telling its story, since perhaps the Internet would not be as we know it without this cable. The cable that started it all. On December 14, 1988, AT&T, British Telecom and France Telecom developed TAT-8, the acronym for Trans-Atlantic Telephone 8. It was the eighth transoceanic cable system between Europe and the United States, but the first to use optical fiber. Before him, transatlantic cables ran on copper, with very limited capacity. With the TAT-8, voices and data traveled converted into pulses of light through glass threads thinner than a hair. Just like account Wired in its report, at the inaugural event, writer Isaac Asimov connected by video call from New York with audiences in Paris and London to celebrate, in his own words, “this inaugural voyage across the sea on a ray of light.” Why was it so important? When it came into operation, the Internet was still too technical a concept for the general public. But the TAT-8 literally built the highway on which everything later circulated. The curious thing is that in just 18 months it already reached its maximum capacity, so this forced new cables to be laid as soon as possible, especially after the outbreak of the world Wide Webelectronic commerce and in a context in which the Internet became increasingly relevant. By 2001 the TAT series had already reached 14. Disconnection. Just like account In the middle, in 2002, the TAT-8 suffered a breakdown, and repairing it was not worth it, it was that simple. With more modern and higher capacity cables already operational, it made no sense to invest in their recovery. It went offline and was abandoned at the bottom of the Atlantic, where it has remained for more than two decades. Now they are taking it out of the sea. According to collect Wired, a specialist company called Subsea Environmental Services is physically recovering the cable with its vessel MV Maasvliet. It is one of the few companies in the world whose entire business consists of recovering and recycling retired submarine cables. The operation involves dragging a flat hook across the seabed, waiting hours until tension is felt in the cable, and then hoisting it aboard meter by meter. The workers they explain As the ocean floor is an increasingly crowded space, and recovering old cables frees up routes for new ones. What is done with the remains. The TAT-8 is not thrown away. Fiber optic cables contain high purity copper, steel and polyethylene, all recyclable materials with market value. Copper, especially, is a valuable resource and may become scarce in a few years. And according to the International Energy Agency, in less than a decade could be scarce if the industry does not find new sources. On the other hand, the steel of the cable will end up being converted into fences, and the plastic, processed in the Netherlands, will be transformed into pellets to manufacture non-food packaging. In fact, just as they count At Wired, you may soon be using shampoo in a bottle made from remains of the first fiber optic cable to cross the Atlantic. Sharks. Curiously, the TAT-8 is at the epicenter of one of the legends that has lasted the longest in this sector: that sharks bite internet cables. Just like share In the middle, it all started with a test prior to the TAT-8, the Optican-1, which ended up failing due to problems in its insulation. A Bell Labs engineer appeared at a conference with shark teeth that had supposedly been removed from the damaged cable. The story spread instantly. As well as point At the time, AT&T even included four pages on protection against shark bites in its press kit for TAT-8. Actually, there has never been consensus about whether the sharks really caused that damage. Subsequent tests in aquariums, where they were starved to see if they would bite into wires with electric fields, did not yield any clear patterns. At least the outcome of all that testing and debate was positive, as engineers added a layer of steel between the insulation and the fibers, which improved the cable’s overall resistance to abrasions and damage of all kinds. Cover image | What’s Inside? In Xataka | In 1901, a Spanish man had one of the ideas of the century: invent the remote control before television

unite the Internet under the same cause

A macaque Japanese man abandoned by his mother at the Ichikawa Zoo receives a stuffed orangutan from Ikea. From that point, we have witnessed a new example of the power of the internet to exalt the emotional and the absurd: the global stock of the doll runs out, the shares of the Swedish brand skyrocket and a $30 million cryptocurrency is born. The Punch story is an instruction manual for success in the era of the attention economy. Who is Punch? Punch was born on July 26, 2025 at the Botanical Zoo in Ichikawa City, Chiba Prefecture, outside Tokyo. Its mother was a first-time female who gave birth during a heat wave and showed no caring response toward the calf. The zoo chose to raise the animal manually, separated from the group, something that left it without the physical contact essential for the social development of these animals. Dolls. At the first signs of anxiety and isolation, the caregivers made a practical decision: to give him a stuffed orangutan from Ikea, the Djungelskog model, covered in synthetic fur and with very long limbs, ideal for Punch to hug and carry. Apparentlythe monkey adopted the toy as a maternal substitute: he carried it with him everywhere, protected himself with it when he was scared, and rarely let it out of his sight. It was not a strange decision on the part of the zoo, on the contrary: in macaques, physical contact is a need as basic as food (studies on the subject They date back to 1958) Return home. In January 2026, the process of gradual reintegration of Punch into “Monkey Mountain”, the enclosure where his peers live, began. The first months they were difficult: The other macaques rejected him when he tried to get closer. A video widely circulated a few days ago on social networks seemed to demonstrate the rejection: an adult dragged Punch across the floor, which aroused the immediate empathy of millions of people. The zoo had to clarify that the behavior was part of the natural socialization process, not sustained aggression. Later, one of his caregivers would confirm that the animal had begun to receive grooming from an adult in the group, an unequivocal sign of acceptance in the social hierarchy of Japanese macaques. Two booms. The phenomenon of Punch going viral has had two successive explosions. One in early February, when an X user shared a Punch video playing with his stuffed animal. Another in the middle, when it was seen the video of the alleged assault. Preonto began to spread this latest video, which reached 30 million views. Punch fan-art sprouted and the hashtag #がんばれパンチ (something like #AguantaPunch, which was translated and circulated in English) was born. The zoo statements in Xexplaining that the adult was acting as a mother to another offspring, not as a mere aggressor, asking the audience to interpret the situation as part of the natural socialization process, further amplified the scope of the story. Shortly after, a summary video of the entire process with the structure ‘How it started / How it’s going’ and which finally showed how Punch was accepted, it achieved more than three million views in a single day. Teddy theme. The Djungelskog plush has been in the Ikea catalog for years. It costs 16.99 euros in Spain, measures 36 centimeters and its name literally means “jungle forest” in Swedish. Until February 2026, it was just another article among the thousands in the children’s section of the chain. In less than a week, stocks have been sold out in Japan, the United States and South Korea without the company having to invest a single euro in advertising. Resale exploded until reaching 350 dollars. Illustration by chimiwangillustration Ikea has seen a unique opportunity to get some publicity without too much investment. On February 17, Petra Färe, president and director of sustainability at Ikea Japan, personally visited the Ichikawa Zoo to deliver 33 stuffed animals and material for the children’s area. In addition, it adapted the name of the product on its platforms, now having the description “Punch’s comfort orangutan.” An artificially irreplicable advertising bombshell. And a cryptocurrency. On February 7, 2026, when Punch videos began to become popular, someone launched a token called $PUNCH on Solana’s Pump.fun platform. The launch price was practically zero. In just fifteen daysthe token rose more than 80,000%, reaching an all-time high of $0.04847. The market capitalization was close to $30 million and the daily trading volume exceeded $20 million at peak activity, placing $PUNCH as the the asset with the highest daily profit on CoinGecko. A bombshell that of course is already fading after the corresponding speculative explosion (“the token bubble map was ‘too perfect’ to be organic”, one analyst said). Another momentary internet fever that should warn us about how memes have worked for some time now: emotional outburst, spontaneous growth and fever of those involved to get something out of the phenomenon. Nothing new under the sun, but along the way we have seen some beautiful videos of a macaque hugging a stuffed animal. Something is something. In Xataka | The challenge of moral limits in the case of the 132 human and monkey cell embryos: human organs in exchange for more animal experiments

What is this network traffic analyzer and how to use it to detect Internet problems or security flaws

Let’s explain to you what it is and how to take advantage wireshark from the point of view of an ordinary user. I say this because it is a very advanced tool that analyzes all the traffic on your network, and that of all the devices connected to it. When you run this appyou’ll see a series of lines of data that you may not understand. But by knowing a little about what information is going to appear, you can also find ways to diagnose failures in your connection or whether an application or device is spying on you by sending data when you are not using it, or to unknown servers. What is Wireshark Wireshark is a network protocol analyzerwhat in English is called packet sniffer. What it does is capture, isolate and transmit each of the packets that are sent and received through our Internet connection, whether we are connected via WiFi or Ethernet, and it does all this in real time. This is a free and open source programwhich means that any developer can look at how it works inside. This makes it reliable and safe, because if it did things that were not appropriate, users would have already reported it. It has versions for Windows, macOS and Ubuntubeing able to download them at wireshark.org. When it comes to giving you information about the traffic that passes through your network, shows you very important datasuch as the IP and Mac addresses of the person sending or receiving the data, the sending protocol, the content (showing text or images if they are not encrypted), and connection healthwith the exact time it takes to load each piece of information. The operation of this tool is based on three fundamental pillars. First the capture one, because it puts your network card in a mode where it can see all the traffic that reaches it. This includes both information that your operating system displays and information that it does not display. It also has a color code to help you distinguish the packages. As a general rule, green is usually standard TCP traffic, blue is DNS or UDP, and black and red usually indicate problems. That’s why, you can identify that you are having errors or problems quite visually, just by seeing that there are many red or black lines. The app also has a top bar where you can type commands to filter information. This is already quite advanced if you don’t know how networks work, but you can, for example, use “ip.addr == IP Address” changing the address to that of a specific device to see its movements, or type “http” to see only web traffic. In short, it is a fairly complex and advanced tool, so it is not for all users. It is more aimed at system administrators, to detect attacks or bottlenecks. However, If you know where to look you can also take advantage of it as a home user. How you can take advantage of it Although it is an advanced tool, it can be useful for normal users in some contexts as well. We are going to give you some ideas so that you know the type of information you can obtain: If your online games cause problems: A speed test may tell you that your Ping is good, but the experience is different when playing. Therefore, this application can tell you if packets are being lost along the way that are making everything slower. If you are concerned about privacy: You will be able to see what data your devices send to the cloud and the Internet, and if it is not encrypted you will see your content. This can help you be more aware of your privacy, and detect if a device is sending more data than it should. You will also be able to see if a device connects to servers of dubious origin. If you have technical problems: If a website does not load or a printer disappears from the network, this application can show you at what point communication is being cut off. If you want to do lag tests: If in this tool you filter by the appropriate protocol, such as UDP for games, you will be able to find if there are black lines that indicate that the information you send is “out of order” because it never arrived at the destination or did so late. With this you can see that if you have lag it is not a matter of your bandwidth, but perhaps of your network signal or a saturated node of your operator. If you want to know what the devices on your network are doing: As we have more and more connected devices at home, with this you can audit what each one does. You can even isolate the IP of a cell phone or a security camera to know if it is connecting, what data it is sending, or if, for example, it sends data to other servers from time to time. In any case, what you should know is that this tool is going to show you all the traffic that your home network has. It shows all the raw traffic, and doesn’t hide anything, meaning you can have a lot of fun looking at everything that’s happening on your network and learning how to take advantage of it to understand everything. In Xataka Basics | Internet does not work at home: five alternatives to connect without using your router

It is the battle for the Internet of the future

One of the biggest changes on the Internet since the democratization of devices and networks It allowed us all to have a window to the world, and a speaker, in our pockets. With the underlying idea of ​​protecting minors, the world has embarked on the great adventure of putting doors to the countryside: verify the identity of users who browse the Internet. And the reactions couldn’t be more polarized between defenders and those who see it as the latest blow to privacy. What is evident is that it is the great battle of the Internet, and positioning yourself is extremely complex. In short. The earthquake started last week. Adapting to measures that are being taken from Europe, the President of the Government of Spain, Pedro Sánchez, announced a package of measures with the intention of regulating digital platforms. Among them, in addition to criminal liability for company directors in case of inaction, is the prohibition of access to social networks for minors under 16 years of age. At the time we already mentioned that everything is a potential social network, even the comments box on our website, so the description seemed vague. But there were two mentioned: Elon MuskCEO of X, charging against Sánchez, and Pavel DurovCEO of Telegram that sent a message to its users warning about the Government’s intentions. Durov Dúrov’s message translated into Spanish in the Telegram bot. Imagine not knowing who this man is and having him assault you talking about privacy with a message that could very well be written by ChatGPT I just want to imagine the face of someone who doesn’t know Pavel and sees that a user whose number you haven’t given appears on their Telegram saying that privacy is very important. Telegram and Discord, proper names. Although it is social networks in general that are in the crosshairs of these identification policies, Telegram has been the most vocal. Not the most transparent. Because there we must talk about Discord. proving that It is not something that comes only from Spain, Discord announced a few hours ago that will be able to launch a global age verification system. It will be starting next month and it may be the compass of what we find in other similar apps. The way to proceed will be as follows: All accounts, by default, will be set to “teen friendly”. This implies that there is certain content that we will not be able to access and, if we want to change it, we have to prove that we are adults. Discord’s product manager has commented that private messages will not be used in the verification process, but that the system will take into account the age of the account and the activity, as well as the patterns shown in Discord, to verify that we are adults without us having to do anything. BUT, and here comes the asterisk, if we have to identify ourselves, actions will be needed on the part of the users. If not, you will not be able to access age-restricted channels and servers, but you will also not be able to talk on live channels. Okay, but… how? There are two ways to verify our age. One will be through a selfie video that, according to Discordit will not leave our device. The system will analyze the face in real time and give us access. If you consider that we are not of legal age, you have to upload a photo of the identity document. And here comes the tricky part: Discord assures that the images will be deleted quickly, but the documents need to be verified by a third party. And the thing is, this is old business. If we go to the summer of 2024, we have the controversy that arose with the Digital Wallet system and what caught the most attention, the ‘Pajaporte’. The Digital Wallet It was the preview of what they are seeking to create now: a system to verify that we are of legal age and can browse the Internet without barriers. And, instead of using a video of our face or sending a photo of our DNI to a foreign application, the Spanish app works by securely storing the legal age credential issued by the Government. When you try to access a site that requires verification, the application sends those credentials, but the information is encrypted, ensuring, according to the Government, the anonymity of the user. If there is a data leakthere is no information linkable to a user, but rather a key that identifies us anonymously. And it is also not useful to track the operations carried out by the user. in favor. Once we have everything on the table, the reactions come. And there are two opposing currents in this in what we can call the ‘great battle of the Internet’. Being in favor of identification implies potentially losing privacy in favor of gaining security. It is no secret that the networks are plagued with toxic political discourse, polarization, false information (and even more so now with the democratization of generative artificial intelligence) and a system that encourages insults and threats to occur under that anonymity. Pavel Durovvery vocal about this whole matter, is the head of a social network that has been in the spotlight on several occasions. The promises of Telegram encryption (a end to end encryption that does not come by default in all chats) have given rise to illegal activities. In fact, France launched a crusade against him and the platform by alleged crimes of money laundering, drug trafficking or distribution of child pornography, as well as being a nest for political extremists without the application exercising moderation. That Telegram or The video game ‘Roblox’, for example, has a huge community of minors and It was in the news at the end of last year. for not being forceful with the reports of sexual predators that inhabit the platform. Among other atrocities. Cases like this are what explain … Read more

The great battle of the internet of the future is fought against anonymity. And Discord has taken a step requiring ID to enter

Discord announced yesterday that will launch an age verification system on its platform globally starting next month. This will be when you default to setting all accounts as “appropriate for teens” (“teen-appropriate“) unless the user proves that they are an adult with a partially automatic process that may require the system to scan our face or our identification document. This has reopened the debate about privacy and privacy not only on social networks, but throughout the internet. How it will work. Savannah Badalich, Product Manager at Discord, explained in The Verge that “Discord does not use private messages or any message content in the age verification process”, and clarifies that in many cases this verification will be transparent and the user will not have to do anything: “For most adults, age verification will not be necessary, as Discord’s age inference model uses account information such as account age, device and activity data, and aggregated high-level patterns in Discord communities. But if you need to verify yourself, be careful. Those users who do not obtain this automatic verification will not be able to access channels and servers that have age restrictions, will not be able to participate by speaking on live channels and will have sensitive or graphic content filters activated. They will also receive notifications of friend requests from suspicious users, and even direct messages from unknown users will be automatically filtered to a separate mailbox. The protection that Discord proposes is analogous to that already proposed by the Government of Spain with the beta Digital Wallet, popularly known as the “pajaporte”. Your face or your ID to validate your age. If Discord’s inference model fails to automatically determine your age, the global rollout will require users to present identification to prove they are of legal age to have an adult account. According to Discord, removing those limitations from teen accounts will force users to “choose to use facial age estimation or offer a form of identification to Discord partners.” So, there will be two great options: your face– The user will need to appear in a selfie video during the verification process and a Discord AI system will analyze that image in real time. According to Discord, that selfie will not leave our device. Your ID– If the selfie process fails, users can appeal or verify their age with a photo of their ID. These documents will be verified by third parties, but on Discord they assure that these images of the document “are quickly deleted — in most cases immediately after confirmation of age.” Discord already had a scandal with this. This is actually not the first time Discord has tried something like this. Last year it already deployed an age verification system in the UK and Australiaand the curious thing is that some users exceeded that measure using the ‘Death Stranding’ photo mode. Mass data theft. In October one of those Discord partners suffered a massive data theft in which users’ age verification data, including the government identification documents of said users, were leaked. Badalich states that they stopped working with that company and now use another. “We do not do biometric scanning or facial recognition, but rather facial estimation. The DNI is deleted immediately. We do not store information about you,” said the directive. Anonymity in danger. For decades, anonymity has been considered an acquired right and a pillar of Internet freedom. It is something that allows exploration and criticism without fear of retaliation, but at the same time that has facilitated a toxic public discourse that has turned many platforms—starting with social networks—into “digital dumps” in which harassment and abuse are difficult to stop. Content moderation on social networks has been so problematic that X and Facebook have ended up eliminating their moderation teams—or reducing them to a minimum—so that let the community itself warn of misuse of these networks. Government pressure. Discord’s announcement follows an increasingly recurring trend on the internet. The pressure from governments around the world is notable and wants to eliminate anonymity with the argument of protecting teenagers. Bills are being promoted that force platforms to monitor who enters and how old they are. Eliminating anonymity would certainly have advantages in mitigating toxic speech and instances of harassment or abuse, but it would also have enormous disadvantages. From protecting minors to spying on us all. Among these disadvantages is the risk that these social networks become a massive system of citizen espionage in which the violation of privacy is real. By forcing users to go through these filters, massive databases can be created that are not only targets for cybercriminals, but also potential tools for state surveillance. Is the cure worse than the disease? This government battle against anonymity is justified as a fight against hate and abuse, but the collateral damage is extraordinary. We would lose that structural privacy that the Internet has always offered. If to prevent a stalker or scammer from acting we must identify each individual on the network, we end up turning the Internet into a gigantic registry in which freedom of expression is conditioned by government blessing. Total paradox. The most ironic thing is that Europe, which has traditionally been a defender of privacy, is now totally in favor of those age verification measures that precisely put her in danger. The old continent, which has always criticized Big Tech for aggregating personal data of European citizens, now supports measures that will precisely help build these gigantic databases. If you have nothing to hide, you have nothing to fear. It has been more than a decade since we reflected on that typical phrase of those who did not seem to care that the NSA PRISM program I would have spied on them because they “had nothing to hide.” It’s easy to dismantle that theoryand it is a fallacy that Giving up privacy means greater security. Open debate. The Discord announcement has generated a huge debate in all types of networks, but we found a good … Read more

A Brazilian has shown that having Internet in mid-flight is possible with Starlink. It has also shown that it is a real danger

If the Internet does not reach the plane, let the plane reach the Internet. One of the Azul Linhas Aereas travelers must have thought something like this, who along with another hundred passengers began to discount the first minutes of their flight. A flight that began on the ground but has not yet ended. And our protagonist tried to connect to the Internet during takeoff using a Starlink antenna and a battery that far exceeded the maximum allowed capacity. The flight has landed but is not over. And the company is now investigating what happened. On Instagram. It’s where the Azul Linhas Aereas traveler has published his invention with the following text: “Who hasn’t suffered the frustration of getting on a four-hour flight and not having Internet? When you get on the plane and the WiFi doesn’t work… Your problems are over.” The video briefly shows how the passenger places the Starlink antenna on the window and hooks it to the window blind. From it, a cable hooks up to a large battery stored in the pocket of the front seat. Click on the image to go to the original post What is Starlink? Starlink is a internet service through satellite connection designed by SpaceX, Elon Musk’s company. The system is simple, with thousands of satellites orbiting around the earth, the service seeks to ensure that a small antenna can provide Internet to anyone anywhere in the world, no matter how remote it may be. To do this, the customer mounts the antenna and points it towards the sky. From there a signal arrives that is interpreted by a router included in the pack to, in turn, multiply the signal so that we can connect to the network. Its latency is high compared to fiber optics, so it is not a system to compete with home connections, it is designed to provide Internet to areas without 4G or 5G coverage. And does it work on a plane? Of course, the operation is exactly the same as if we placed the antenna on the ground. In this case, what the airline passenger did was put the antenna in the window pointing outside to improve signal reception. For the rest, it works exactly the same as if we contracted Starlink to have Internet at home. In fact, Starlink service is being offered to airlines. And although it has been the trigger between the latest tantrum between Elon Musk and Michael O’Leary (CEO of Ryanair), the truth is that Starlink will be offered this year on Iberia, British Airways or Vueling flights. And the first tests with United Airlines They were already very satisfactory. Starlink improves what is already known because, although a plane also connects via satellite to offer Internet on its flights, the bandwidths that customers demand and its applications are increasing, which has been reducing the speed of data transfer that each device on board can enjoy. But it’s a danger. However, what this passenger has done is a real danger that is being investigated by the airline. In the Brazilian State Post Office They explain that the Starlink antenna was powered by a 60,000 mAh portable battery. Its 222 Wh capacity is far from the 100 Wh maximum that can be carried on board a plane according to Brazilian aviation regulators. Large power banks can be a danger on board, so Aeronautical authorities limit them in size and number. And it is that batteries can self-combust if a thermal leak occurs, which may be caused by overheating or a blow that results in a short circuit. The problem is already huge if we are on land But it can be much more serious if the plane is fully operational because lithium ion batteries are very difficult to turn off and, in addition, they release gases that are harmful to our health. That is why the size of the battery is limited and if an incident occurs, it is manageable by the crew. Photo | Wikimedia and Fallon Micheal In Xataka | Airlines are beginning to regulate and restrict the use of power banks on airplanes: South Korea leads the way

In 2010, a student from Barcelona was looking for an easy way to edit PDFs. 16 years later, it is one of the most viewed websites on the internet

From a form to a receipt to an invoice: PDF is the quintessential extension for sharing documents, regardless of whether you do it from a Windows computer to an iPhone or an Android tablet. It doesn’t matter: you’re going to see the original format no matter what. But, oh my friend, if you have to get your hands on a PDF. Marco Grossi also found himself in trouble with a PDF. One, who is already in her years, had to make a living to avoid paying for the Adobe Acrobat license (in the past it was not a subscription and the price was not exactly cheap) to edit a PDF for a cent by the wind: from printing and scanning to wasting time reconstructing with a word processor. In that first decade of the 2000s I was a student who struggled with documents and Marco Grossi, too. Back in 2010, this Barcelonan, who has studied Multimedia and Photography and also programming, found himself faced with a task as mundane as having to copy and paste a PDF: it was not an easy task. How does it count himself for La Vanguardia“I’m a programmer, and I’m good at computer issues, so it took me about 15 minutes to figure it out.” And then came iLovePDF. As the founder and CEO confesses for El Paísat that moment he discovered that there was a need: “I realized that it was very simple and that I could create it myself.” It was not the first (the ancient but reliable PDFSam It had an interface that was backwards), but it was the one that managed to establish itself as the software to manage PDF for normal and ordinary users (although also for companies reluctant to pay, because it solves the basics quickly and well). A meteoric rise. What started as a personal project that he combined with freelance web design, in 2014 became his 100% occupation. Until 2017 he worked alone from home, but at that moment he took a step forward: He rented an office and hired an old college classmate. Now there are 43 people. At that time, his website was already receiving between 200,000 and 300,000 daily visits from organic traffic. In 2025 Grossi counted which were around 150 million unique users per month. The portal ahrefs listed it in 2024 in 34th place on a global scale, above Amazon in India and just below Wikipedia in Russia. Screenshot of iLovePDF from 2018. via Archive.today Good, nice and cheap free. Your philosophy From the beginning it has been to be a free, accessible, high-quality and easy-to-use service. A quick visit to their website gives us a mosaic with icons and clear messages “Join PDFs”, “Split PDFs” and an agile and intuitive step by step to obtain documents with good quality, without limitations or watermarks. We are using iLovePDF in Spanish, but the website is translated into 25 languages ​​so that language is not an obstacle. In 2018 (the oldest capture saved on Archive.today) also. They also do not market with the data: Marco Grossi details that as a European firm they are governed by the GDPR and that all PDFs are deleted within two hours, without anyone being able to access them. In addition, he explains that they have ISO 27001 certification. In the beginning they financed themselves by advertising, but according to their CEO that is very risky. How iLovePDF Makes Money. So since 2014, in addition to the free options, they offer subscription services, so that advertising generates residual income. They are a small company, but they provide service to those people who visit their website, which we have already seen are many. That is why the Barcelona native explains that “we only need a very small percentage of users who pay to finance us.” 80 – 90% of your income they come precisely from its premium subscriptions, aimed at companies. The rest comes from an advertising banner that, my servant who has been using the service for so many years that she does not remember, nor did she remember it. The cost of being premium It is 5 euros per month and access to extras such as digital signatures or getting rid of ads, but it is totally dispensable: its founder details that the free version is enough for 99.9% of those who use us. They are not for sale. Marco Grossi is not a wolf of Wall Street: he himself admits that he never had an entrepreneurial spirit and that he does not open purchase proposals, something similar to the VLC project and that has turned both platforms into memes of saints or heroes on social networks like X/Twitter. Being a self-financed company allows Marco and his team to maintain their philosophy and reject offers. Although its history is meteoric considering its 15 years of life, the CEO speaks of sustained business growth and that they will never hire 200 people in a year to have to close. Their staff turnover is very low, but solid: they want to replicate their model with their counterpart for images, iLoveIMG. In Xataka | In 1990, a company in Barcelona came up with a crazy and visionary idea: talking on your cell phone while you’re stuck in traffic. In Xataka | In 1901, a Spanish man had one of the ideas of the century: invent the remote control before television

There is a “nihilistic” penguin who decided to embrace certain death. The Internet has been obsessed with him for weeks

If in many years some historian were to investigate how the world has started 2026, they would find one of those surprises that raise eyebrows: humanity (or at least that part of humanity that rubs shoulders on the Internet) has started the year fascinated by a “nihilistic penguin”. With Ukraine at war, Trump threatening to annex Greenland to the US (by hook or by crook) and Nicolás Maduro detained In a New York prison, half the planet is dedicated to speculating why the hell one fine day in 2007 a palmiped from Antarctica undertook a suicidal trip that would have inspired himself Friedrich Nietzsche. It sounds bizarre, but it makes sense. What the hell is that penguin doing? It sounds bizarre, but for weeks thousands of people around the world have been asking themselves that same question: What is that penguin doing? The bird in question is a Pygoscelis adeliaean ‘Adelia’ like there are thousands of them in Antarctica, but which about 19 years ago came across the German filmmaker’s cameras by pure chance Werner Herzog while recording his documentary ‘Encounters at the End of the World’. The film lasts almost 100 minutes during which Herzog shows snowy plains, seals, underwater scenes and a multitude of frozen landscapes. At one point, however, his camera captured something curious, a detail that caught the attention of some critics years ago and now it has revolutionized half of the Network. The scene shows an Adelie penguin doing something totally counterintuitive. Without us knowing very well why, the animal begins to walk with a firm step away from the rest of its flock, entering between frozen mountains. Ahead, nothingness. No company. No food. That is, death. “But, why?“ The scene is shocking. First because it seems to go against the most basic common sense. At least the human one. Second, because of the surprising determination of the penguin, who sets off on his way without hesitation and only for a brief moment seems to stop to look at everything he leaves behind him. The third reason why it has captivated half the Internet is because Herzog himself was in charge of giving it importance and highlighting its drama. “But why?” he wonders the German filmmaker in the narration that accompanies the scene. After all, he only has miles and miles and miles of barren land ahead of him that take him further and further away from the safety of his colony and food sources. “It caught our attention. It wasn’t heading to the feeding grounds at the edge of the ice or returning to the colony. Shortly afterwards we saw it heading towards the mountains, 70 kilometers away. Dr Ainslie explained that even if he captured it and brought it back to the flock, it would return to the mountains. But… Why?” fascinated account Herzog. The full question would be a little longer: Why the hell would a penguin ignore its own survival instinct? There must be a reason, right? That is exactly what the documentary filmmaker proposed at the time and it has been worrying half the world for weeks. There is who has speculated that the penguin perhaps had a problem that altered its orientation or an ailment that affected its behavior. There is even talk of possible changes at an environmental level or of a exploratory instinct unconventional. If the panorama were not disturbing in itself, add Ainslie’s disturbing observation: it does not matter that Herzog or anyone else tried to correct their course. The animal would begin its deadly journey again almost instantly. Click on the image to go to the tweet. Is this something so strange? The penguin’s attitude does. Our attempts to find an explanation that fits our way of seeing the world (often from a anthropocentric optics), No. We humans have been debating for some time whether animals have something similar to a sense of morality. For example, we ask ourselves if in episodes that seem to us cruel There is a latent intention or they are simply the result of instinct. We have even speculated on the possibility of “altruistic” behavior in fauna. It may sound strange, but these are questions that have arisen in view of specific behaviors. A crow that finds a large amount of meat and decides warn others companions to share the feast, a whale investing time and energy in protect a seal harassed by killer whales, a duck that cares for a cub of another species, even putting itself in danger. Are those animals being generous? Are they selfless or do they act motivated by an instinct that, ultimately, seeks the preservation of themselves and their species? These are issues so complex that they have even given rise to scientific studies. What does it have to do with the penguin? Well, in recent weeks, after Herzog’s video once again gained popularity on the internet, many people have seen a 100% human attitude in the palmipede. Of course, one that has little or nothing to do with altruism or cruelty. What they appreciate is pure nihilismthe doctrine that embraces “nothingness” (hence its name, ‘nihil’) and denies the pillars on which philosophers have relied for centuries: the existence of religious, political and social principles and, in general, any foundation in morality. There is no purpose. Not even life has a meaning like the one that religions have sought for centuries. And what does Herzog’s penguin do if he doesn’t embrace that very thing, nothingness? Does it not evoke, in words by journalist Adil Faouzi, “a willful desertion of the logic of life itself”? The animal recorded by Herzog seems to capture these ideas so well, to condense them in such a powerful way, that many have nicknamed it: the “nihilistic penguin”. A little far-fetched, right? Depends. We do not know what motivated that small creature to undertake a journey towards its own death and who have tried Finding an explanation points (as we said before) to a possible illness or some type … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.