Russia has shown on video how to hunt drones with shotguns. And he has also revealed what he did not want us to see

During the years of Russian invasion of Ukraine we had seen many tactics that copied techniques and weapons from the past. For example, the use of the Davis cannon of the First World War, or the application of anchored shotguns on airplane wings. In fact, the use of shotguns and rifles from the last century has become a normalized scenario over the months due to the lack of modern artillery. Russia has now shown in a video how to hunt drones. Although he has also inadvertently revealed another detail. Shotguns in the front. The silent battle that is fought every day between Russian boats and swarms of FPV drones in the Dnieper has revealed now one of the most unexpected tactical turns of the war: the resurrection of the shotgun as a survival tool on a battlefield dominated by sensors, radio waves and munitions costing just a few hundred dollars. The viral sequence recorded from the helmet of a Russian marine, it offers a deceptively heroic portrait of a crew sailing at full speed through narrow channels while shooting down drone after drone (up to 13), although the meticulous analysis of each fragment shows that the initial epic falls apart as soon as the details are examined and what is behind it is understood: a fragmented combat, recorded on different days, in which the probable casualties are left out of the shot and where the electronics have as much weight as the shots. The mirage of the mission. They counted it analysts at Forbes. What seems like a single continuous episode in reality It’s a montage of multiple confrontations, where the sky changes color between shots and where the marines shoot at both real threats and invisible threats, lost among interference and gusts of wind. The barge sails while three shooters with semi-automatic shotguns, an automatic rifle and a light machine gun try to keep at bay drones that explode at the slightest contact. Thirteen devices fall, but the editing hides both the failures and the side effects. Two explosions centimeters from the hull leave doubts about possible injuries that are never shown, while a revealing detail (a Marine who already has a tourniquet placed preventively on his thigh) speaks of very specific expectations: the probability of being hit is not a hypothesis, but an assumed fact. Elite unit supported by electronic warfare. Forehead to the ‘Mobiks’ sent to slaughter with weeks of instruction and precarious material, this unit stands out for modern equipmentfor the shooting discipline and for the hidden arsenal that really explains part of their survival: a antenna constellation electronic warfare mounted on the boat. These inhibitors, with a range of between 50 and 100 meters, turn many drones into uncontrolled projectiles that fall by pure gravity. The shotgun just finish what electronics has already weakened. In an environment where FPV munitions explode even when the operator loses signal, the difference between living or dying depends not solely on aiming, but on the ability to blind the drone before it gets too close. That is why the shots show drones collapsing far from the effective range of the shooters: they did not fall due to an accurate shot, but due to interference. The limits of the shotgun. That a shotgun can take down an FPV at close range is so true as misleading. The scene has fueled a narrative of false confidence that the soldiers themselves deny off camera. There are testimonies of teams that five drones were shot down followed to fall before the sixth when they ran out of ammunition, or patrols that aimed and fired until the last cartridge before a device entered through the window and destroy the vehicle. If you like, the arms industry has also adapted: Benelli already produces models specific “anti-drone”equipped with tungsten ammunition, and foreign donors have sent hundreds of semi-automatic shotguns to Ukrainian units. But the tactical principle does not change: a shotgun does not compete with the mass production of drones. It is a desperate tool to gain seconds in an environment where each drone costs less than a box of ammunition and where both armies manufacture them by the millions. Desperate defense. He video ends with the boat rescuing another group of marines: one is wounded, others advance with two weapons in their hands, and the scene, far from glorifying the resistance, underlines the true tactical message. The shotgun works, yes, but only when the number of drones is small, when the shooters are trained, or when there are active inhibitors and when luck is on the side. The complete story, the one that never goes viral, remembers that for every boat that returns, another does not. In the Dnieper War, the shotgun is not a weapon of air supremacy: it is the final spark that is fired when all else has failed, a defense of last resort against a swarm cheap and numerous which is redesigning the way armies move, attack and survive. A shotgun may give you time, but in an FPV-saturated front, that time may not be enough. Image | RUSSIAN MOD In Xataka | Ukraine has just reduced what took days to two minutes. And then he began to crush the most feared Russian weapon: his kamikazes In Xataka | The new peace plan in Ukraine has been reduced to 19 aspects. The problem is that the key point measures 900 km

Grokipedia claims to aspire to the truth. An investigation has just shown that he cites neo-Nazi forums and conspiracy websites

The proposal of Grokipedia came accompanied by a direct message: aspire to “the truth and nothing but the truth,” as stated by Elon Musk in X. That statement takes on a new context. after the publication of a Cornell Tech study which examines how various entries are constructed and what fonts they use. The analysis shows that, along with content inherited almost literally from Wikipedia, there are articles that use sources cataloged by academic institutions and verification organizations such as neo-nazi spaces or openly conspiratorial sites. At first glance, Grokipedia takes on a familiar appearance: a home page dominated by a search engine and articles with headings and references. The inner workings, however, are much less transparent. Users do not have a clear system to suggest changes and, at the top of some entries, the label “Reviewed by Grok X weeks ago” appears, indicating an intervention by the AI ​​chatbot without detailing criteria or those responsible. In Wikipediathe edition history is public and allows each modification to be reconstructed. Grokipedia under the magnifying glass The aforementioned analysis compares both platforms on a large scale and points out that, although Grokipedia publishes longer articles and with twice as many citations as Wikipediamuch of its content comes from there. Of course, the coincidence varies: pages with a Creative Commons (CC) license present very high similarities, while those generated without that license are further removed from the original. One of the most delicate issues is the appearance of references to controversial platforms. InfoWars, which according to the authors is not cited even once on Wikipedia, has 34 mentions on Grokipedia. The pattern is repeated with other low credibility domains: Stormfront reaches 42 citations, LifeSiteNews reaches 100 and the Global Research and VoltaireNet sites register 51 and 45 references respectively. All of them are practically non-existent on Wikipedia, reflecting clear differences in source selection filters. Elon Musk’s entry in Grokipedia To mention a few examples, Leiden University characterizes Stormfront as a forum associated with right-wing extremism already current neo-naziswith a founder linked to Ku Klux Klan and a trajectory mentioned in several studies for its relationship with violent incidents. PolitiFact, on the other hand, defines Infowars as a portal dedicated to conspiracy theories and run by Alex Jonesa presenter known for promoting this type of content. This is what the edition history looks like in Grokipedia What appears in the study is not limited to counting how many times these domains are cited. It also highlights that the presence of sources considered unreliable or directly discarded by Wikipedia is much more widespread in Grokipedia. And one of the authors, in a text published in Indicatorcollects this accumulation of low-quality references to describe a broader pattern: Grokipedia seems to be making its own editorial decisions that alter the focus of certain topics. It remains to be seen how Grokipedia will evolve and what publishing model it will adopt as it grows. No encyclopedia works as a perfect reference —neither Wikipedia nor Grokipedia—, but they do operate with different mechanics. As we say, Wikipedia relies on an open community with standards, public debates and an accessible history of changes; Grokipedia, on the other hand, is based on criteria that are more difficult to follow from the outside, with an AI assistant that intervenes in the texts and without a clear human collaboration system. Images | Gage Skidmore (C BY-SA 4.0) | In Xataka | Carnegie built libraries, Gates sold them on CD-ROM, Musk locked them in an AI: the history of knowledge control

A new futuristic Chinese drone has just appeared on the scene. Beijing has shown it in a video without saying a single word

China has decided to show its new stealth drone in the most direct way possible: iincluding it in an official video and letting the image speak for itself. The device appears rolling from a hangar and forming with two J-20, a gesture that does not require subtitles to capture attention. It is an austere presentation, almost silent, but full of intention. The movement that changes reading. The official video published by the chinese air force for its 76th anniversary, it combines historical images with recent scenes, following a format that the institution has used for years. It is a simple production piece, focused on showing some of the advances that they consider relevant at this stage. Within this general route, the final section incorporates material that until now had not been seen on official channels, among them the inclusion of the GJ-11. It is a drone that belongs to the category of flying wing stealth platforms, a design that China has been researching for years and that fits with long-distance attack missions and surveillance tasks. What is known comes from sightings at test bases and analysis of their configuration, since Beijing has not published technical specifications. Some analysts interpret that its size and architecture allow prolonged flights, but that information is not part of official statements. Is it already operational? The official video does not confirm that the GJ-11 is in service, but it does fit with the indications that point to a program in an advanced phase. In recent months there have appeared at least three units in Shigatse, an active site where China tests systems in real scenarios. The inclusion of the drone in institutional material adds another element to the chronology, although by itself it is not enough to affirm that its operational deployment is a reality. The key doubts. Despite the relevance of the video, the Chinese Air Force has not offered details about the capabilities, range, sensors or weapons of the GJ-11. There is also no data on its production rate or on possible contracts associated with the program. The footage confirms its form and activity, but does not clear up technical unknowns that allow us to understand its exact role within the operational structure. The absence of this information keeps the program partially in the shadows. The appearance of the GJ-11 in an official video does not dispel all doubts, but it does consolidate an idea: China wants the drone to be part of its public story without the need to communicate technical details. Between previous indications and recent material, the image that remains is that of an advanced program that advances at its own pace. Images | People’s Liberation Army Air Force (Weibo) In Xataka | They have just leaked Russia’s best kept secret: their “invisible” nuclear bomber has exploded into the air

Vigo has shown that Christmas can be a million-dollar business. So northern Portugal has decided to take note

Christmas is a time of peace, reunion, carols, sweets and a lot of other positive things, but also (and increasingly) of ‘pique’ between cities. As the holidays have gained appeal as an economic engine, especially for attract tourists In the middle of the low season, town councils throughout Spain have launched a race to show off the tree with the most meters, the largest display of LED lights or simply be the first to debut the ornament. Vigo is perhaps the greatest exponent of that fever, which in recent years has led him to cross challenges (more or less casual) with Madrid either Badalona. However, its true rival appears from another corner: on the other side of the Miño. Christmas in November? Christmas in November. It’s nothing new. In Vigo they began to install their lights already at the end of July, when they were missing almost 150 days for the start of the festivities. It may seem extravagant (maybe it is), but it certainly has its logic: the Galician city boasts to deploy millions and millions of LEDs along hundreds of streets (12 million in 460 neighborhoods this year), which requires a notable logistical effort. Also a substantial investment. Other cities like Madrid, Badalona, Malaga either Cadiz (to cite a few examples), determined to stand out on the map of national Christmas decorations. In fact, a quick review of the newspaper archive comes to find cross challenges between the mayors of Madrid, Badalona or Vigo on account of the festivities. The objective: to claim itself as the city with the brightest offer (literally). Why’s that? For various reasons ranging from pure economics to politics. After all, Christmas offers a showcase of brilliance barbaric for municipal administrations. If there is one reason that has become more evident over the years, however, it is tourism promotion. It is no longer just a matter of decorations encouraging purchases or more or less boosting commerce. No. Having many lights, large XXXL trees, Ferris wheels, markets… has become an effective hook to attract visitors in the middle of winter. Vigo once again leaves a good example. In December 2012, before the lighting boom, its hotels recorded just 33,600 overnight stays, far from the 100,000 in August. In 2022, already in the midst of the Christmas frenzy, this figure exceeded 101,500 overnight stays. And that’s not just visits, it’s also hard euros. In July the mayor of the town, Abel Caballero, spoke that Christmas attracts some 6.3 million visitors to Vigo and generates an economic return for the city of “more than 800 million euros”. May or may not be suspicious of those figures, but something is undeniable: the city fills every year between November and January and merchants and hoteliers already they have made it clear your support for Christmas. Which city is ahead? The battle between cities is not just about seeing which one achieves the most spectacular display of lights or raises the tallest tree. Another detail that generates expectation are the dates: Which city turns on its lights first? Which one comes forward, in an attempt to be the first to catch the eager Christmas visitors? It may sound strange again, but little by little this struggle has brought forward the festivities until placing its ‘start’ (at least unofficially) in the first half of November, almost immediately after Halloween. In Estepa, a town in the province of Seville, they debuted their lights last friday. Yes, November 7th. This urgency theoretically makes it the first municipality in Spain to activate the Christmas lighting. It won’t take long for other cities to follow in their wake. In Vigo (rain permitting) a ceremony will be held this Friday (November 15) to mark the beginning of the festivities. In other cities you will have to wait longer: Madrid either Barcelona They will press their ‘red button’ the 22ndin Badajoz it will be the 27th and in Malaga the traditional light and music show on Larios Street will also be at the end of the month, on Friday the 28th. What happens in Portugal? The most curious thing is that Vigo’s competition will probably not come from other Spanish cities, but from the other side of the Miño: from the north of Portugal. The neighboring country shares an extensive Christmas tradition and seems determined not to give up the tourist wealth that its Galician neighbor is fighting for. reveals it Vigo Lighthouse in an article in which he explains that near Raia there are towns that this year will surpass Vigo both in dates and in ‘meters’. In Valongo they opened their lights on Friday the 7th. And the next day Ermesinde, one of their parishesalso activated a Christmas tree 55 meters high, the largest in Portugal. With that data it even surpasses that of Vigo, which reaches 45 m. Another early riser town in northern Portugal is Viana do Castelowhich has a light show on one of its main avenues. Viana do Castelo and Valongo share an interesting characteristic, in addition to their Christmas zeal: they are close to Vigo. From Ermesinde it takes about an hour and a half by car. Something less if visitors travel from Viana. Simple coincidence? The commitment of northern Portugal is better understood if one knows a fundamental fact: a large part of the tourists that Vigo receives during Christmas come precisely from Portugal. In fact, in December it is not unusual to find buses in the center loaded with visitors from the neighboring country. So much so that Vigo presume of being the main Christmas destination for the Portuguese, which in turn acts as the main foreign market of the campaign. Although the Galician city has advertised your Christmas United Kingdom, Italy or France, the proximity makes Portugal its great fishing ground for visitors. “Portugal discovered Christmas in Vigo. The city was Portugal’s favorite destination at Christmas. More than Madrid and Barcelona. In 2019 we were eighth, now the first. It is a very important qualitative leap,” … Read more

Character.AI has just shown ChatGPT the way to tackle the problem of AI and minors

The suicide of a teenager and other cases of delusions have put AI chatbots in the spotlight for their effects on mental healthespecially that of the youngest. ChatGPT has already implemented parental controls in response to this growing concern and a few days ago they admitted to being aware that ChatGPT was causing serious mental health problems for some users. . Now, Character.ai, one of the chatbots that is also at the center of the controversyhas made a drastic decision. +18. United States already is legislating to regulate the use of so-called ‘AI companions’ in minors and Character.ai has gone ahead by taking a more drastic measure than parental control. As they say in TechCrunchStarting on November 25, the app will begin limiting the usage time to two hours for those under 18. Little by little, that time will be reduced until it is zero. Age verification. To ensure that those under 18 can no longer use the app, Character.ai is going to deploy an age verification system that analyzes user behavior. If it fails, the app will use additional identity verification and facial recognition to block users who are not of legal age. ChatGPT, warm up as you go out. OpenAI has recently taken steps to prevent cases like that of Adam Rainemainly the integration of parental control in ChatGPT. The measure contrasts with Altman’s statements days later, when he said that ChatGPT would allow us to have conversations with erotic contentbut only for adults. Altman said that the app would require age verification for anyone who wanted to use it, but he did not say anything about blocking it completely to minors as Character.ai has done. Shot in the foot? Making ChatGPT an app for people over 18 years of age would be a strong measure to end the problem or, at least, comply with what the regulations ask for. first laws that want to regulate ‘AI companions’. However, it could be shooting themselves in the foot because it would cause them to lose a lot of users, something that cannot be afforded in the current climate. OpenAI recently published a in-depth report on your usersbut did not share the data of users under 18 years of age, according to them for privacy reasons. We know that almost half (46%) of their total user base are between 18 and 26 years old. That is, a large part of them are very young users. Minors and AI. OpenAI does not want to tell us how many minors use its chatbot, but thanks to other studies we know that the use of generative AI is very popular among this age segment. According to a International Plan studyin Spain 86% of young people between 12 and 21 years old have recently used AI. In turn, 18% of girls and 12% of boys admit to using it “to talk and tell their things.” Image | Character.ai, Pexels In Xataka | The great paradox of cell phones in adolescence: they are bad for performance and mental health, but banning them at school does not help

We thought two-step authentication apps were secure. Researchers have shown how easy it is to hack them

The two-step verification With authentication apps it is one of the safest methods to protect our accounts, or so we thought. They count in Ars Technica that a group of researchers from several American universities have discovered a new type of attack on Android that is capable of copying these codes in less than 30 seconds, which is precisely the time it takes to refresh. Pixnapping. It is the name of this new attack capable of stealing two-step authentication codes from apps such as Google Authenticator or Microsoft Authenticator. These apps show codes that are automatically refreshed every 30 seconds, so it is more secure than, for example, SMS verification, which usually gives a margin of 10 or 15 minutes to copy the code. With this technique, researchers have managed to crack the six-digit code in just 23 seconds, which leaves plenty of time to use the code and log in to the account they want to steal. How it works. Any app on Android can launch a pixnapping attack without needing to obtain special permissions. Once underway, the attack occurs in three steps: The malicious app uses Android APIs to communicate with the app it wants to spy on. These calls force the target app to display specific data (the authentication codes) and send this information to the Android rendering pipeline, which is responsible for displaying each app’s pixels on the screen. Pixnapping performs graphical operations on the pixels that have been received by the rendering pipeline. Identify the coordinates of each pixel of interest and check if the color is white or non-white. White pixels take less time to render than non-white pixels. By measuring time, pixnapping is able to reconstruct images from the render pipeline data. Speed ​​is key. Pixnapping can also obtain other types of information that is visible on the screen, such as account numbers or personal information, but the speed with which it runs makes it especially dangerous for these authentication apps. To achieve this, the researchers reduced the number of samples per pixel, so that they could decipher all six digits in 30 seconds. Which phones does it affect? As we said, pixnapping only affects the Android operating system, but it seems to extend to quite a few versions. The investigation verified that the attack could be carried out on devices with versions from Android 13 to Android 16. They have only reproduced it on Pixel phones and a Samsung Galaxy S25, but they believe that due to the mechanism of the attack, any Android will be affected. How to protect yourself. Waiting for now. Google has already released a patch does little to mitigate this attack, but they have found that there are ways to bypass it. In statements to The RegisterGoogle confirmed that they would release a second patch in December to put an end to it. The good news is that they say they have no evidence that there are apps taking advantage of this vulnerability. Image | Pixnapping In Xataka | One click and goodbye to our passwords. This is the vulnerability that affects the extensions of several managers

Ukraine has struck Russia a blow to two “amphibious” relics of the cold war. And then he has shown it on video

On October 18, 1960, from the Taganrog airfield, the Soviet Union presented the world with its first flight The Beriev Be-12an amphibious plane designed to perform underwater and maritime patrol missions that over time was expanding its abilities. In fact, Russia continued to keep several models used in the invasion of Ukraine. Until a few days ago. The attack against a relic. The scene took place September 21when Kamikaze drones Ukrainians reached the Kacha air base, in the Crimea occupied, attacking two of the very scarce be-12 amphibians of the Russian Navy and a MI-8 helicopter. The disseminated images By the Ukrainian Ministry of Defense they show the direct impact on one of these devices (identified With number 08) and reinforce the idea that it is the first confirmed attack against this type of aircraft, known In Russia as chaika (Gaviota) and by NATO with the name in a mail key. The action was claimed by the Special Unit “Ghost” of Ukrainian intelligence, underlining the increasingly relevant role of drones in the campaign against infrastructures and military assets in Crimea. The importance of B2-12. As we said at the beginning, the BE-12 was conceived in the sixties as an anti-submarine platform. Lost that main function decades ago, although kept in service in search and rescue configurations and, above all, as a maritime patrol to detect unmanned Ukrainian boats that Hostigan to the Black Sea fleet. With just Six registered devices In 2023 and only four or five in the operational state, the destruction or damage of two of them could mean the reduction to half of the active fleet. Although one of the specimens achieved could have already been out of service, even in that case it was valuable as a source of spare partsa critical resource to prolong the life of the model. The pressure in Crimea. Since the summer of 2022, the BE-12 have been frequently operating On the Crimea coastacting as support in the detection of unmanned vessels, recognition commands and Ukrainian special operations divers. The drone campaign of Ukraine surface, which began with suicidal models and has resulted in reusable platforms capable of launch FPV drones or even gunners, has weakened To the roller and forced fleet the construction of hardened shelters in air bases Like Belbek. The loss of specialized aerial patrols aggravates Russian vulnerability in this scenario, where early intelligence and detection are vital. The sunset of an airplane. The BE-12 has survived multiple stages of obsolescence, from the dissolution of the USSR to its Official withdrawal in 1992re -giving prominence after Crimea Annexation in 2014. However, without substantial modernizations, it lacks viability in an air environment disputed and can only perform secondary missions under conditions of Russian superiority. Its apparent final, precipitated by Ukrainian drones, symbolizes how a war marked by autonomous systems and precision attacks is dismantling the last vestiges of Soviet aviation in the region. Strategic consequences. If you want also, the attack against the BE-12 He fits the Ukrainian strategy to deprive Russia of surveillance and control capacities in the Black Sea, weakening the operating margin of the enclave fleet and undermine military logistics in the Peninsula. Beyond the tactical blow, the action reflects the War transition Towards a scenario in which cheap, autonomous and difficult to counteract systems are able to neutralize expensive and scarce platforms, accelerating Russian wear and questioning Moscow’s ability to keep an increasingly naval aviation operational relic dependent. Image | Commander, US Naval Forces Europe-Africa/US 6th FleetUkrainian Ministry of Defense In Xataka | Two hidden Russian soldiers wrote something unpublished to a drone. That day in Ukraine changed the rules of wars In Xataka | Italy, Germany, Sweden and Finland have done something that seemed unthinkable: throw their fighters in search of Russian airplanes

We believed to know what killed Napoleon’s army in Russia. The finding of a tooth has shown us something else

In 1812 there is a moment that was going to be registered in the history books. The Russia invasion by Napoleon culminated in one of the greatest military tragedies: The great arméeformed by more than half a million men, was forced to a devastating withdrawal marked by hunger, cold and disease, a combination that cost the lives of hundreds of thousands of soldiers. Or we believed. Health catastrophe. In the summer of 1812, Napoleon Bonaparte gathered up to 600,000 soldiers for his campaign against Russiathe greatest force he had ever deployed. However, the burned land strategy of Tsar Alejandro iwhich involved Evacuar Moscow and deprive the supplier of supplies, forced the withdrawal of the French army to Poland during a brutal winter. Between October and December of that year, more than 300,000 men perishedvictims of hunger, the extreme cold and a wave of diseases that devastated to an already weakened force. For a long time, the testimonies of survivors and the first scientific analyzes pointed to the TIFUS and the trench fever as the main culprits, reinforcing the idea that the bad hygienic conditions had sealed the fate of the great Armée. The new findings. Now, research carried out In the Pasteur Institute in Paris they have contributed a more precise vision thanks to metagenomic techniques, capable of identifying genetic material of any pathogen present in human remains. Nicolás Rascovan’s team analyzed Thirteen soldiers Buried in Vilna (current Lithuania), epicenter of mortality during the withdrawal. The results did not detect traces of typhus or trenches fever, but they did reveal the presence of Salmonella Entericacause of paratyphoid fever, and Borrelia recurrentis, transmitted by lice and responsible for recurring fever. These diseases, although not always fatal, would have deeply weakened soldiers already exhausted by endless marches, lack of food and glacial temperatures. In that context, even pathologies that in other circumstances could have overcome became mortal. Napoleonic invasion in Russia Lethal combination He New scenario It suggests that defeat is not explained by a single infectious agent, but by a devastating combination: physical exhaustion, starvation, extreme cold and a set of diseases that, together, undermined the resistance of tens of thousands of men. The Parathyphoid fever It would have caused diarrhea and dehydration, while recurring fever progressively weakened with cyclical episodes of high fever. All this, added to the lack of hygiene, to the spread of lice and the impossibility of adequate medical care in the middle of the chaos of the withdrawal, turned the Napoleon army into a paid field For the disease. The magnitude of the health catastrophe even exceeded combat losses, and became one of the decisive factors that precipitated the collapse of the campaign. Historical and scientific implications. Although some experts warn that the amount of recovered DNA is reduced and that the results are not entirely conclusive, The study It marks an important advance in the use of modern tools to reinterpret historical episodes. Demonstrates the Metagenomics potential To trace diseases in ancient human remains and offers new perspectives on how biology, and not only military strategy, it can explain the collapse of whole armies and populations. Researchers They point That these techniques could also be applied to the study of communities in America and Australia after European contact, where the lack of reliable records and historical biases make it difficult to understand the true impact of epidemics. The defeat that sealed the empire. The Tragedy of 1812 It is still one of the most studied inflection points in military history. The collapse of the Great Armée Not only stopped the Napoleonic expansion, but triggered the offensive of his enemies and the beginning of the end of his empire. While the epic of the campaign has traditionally been narrated in the key of battles and strategic decisions, the New evidence They confirm that biology and disease played a central role in the debacle. The withdrawal of Russia was, ultimately, both a military disaster and an epidemiological catastrophe, and the DNA of a few teeth found in Vilna has allowed to illuminate more precisely the executioners invisible and tiny that decimated the soldiers of Napoleon in one of the most lethal winters in history, starting with an unexpected “army” of lice. Image | Jean-Louis-Ernest Meissonier, Blaue Max In Xataka | “Even if I told you, you would not believe me”: the mystery of what Napoleon saw when he slept in the great pyramid of Egypt In Xataka | ‘Napoleon’ is Ridley Scott’s most controversial film in years. Not among critics: among historians

Open the car from the mobile promises comfort. A failure has shown that we may not be the only ones with the key

Imagine that it is enough to look at the windshield of a car to score its frame number – a 17 -character code visible from outside – introduce it into an internal tool, find out the name of the owner and link that vehicle to a mobile account. From there, you could unlock the doors remote from an official app, without touching a lock or forcing anything. That is fair what a cybersecurity researcher demonstrated After accessing the internal portal used by the dealers of a large car brand. We do not talk about an attack on users or public servants, but about a gap on the business platform that connects the manufacturer with its sales network. A rear door with access to connected functions and personal data. The failure was not in the car, but in the chain that unites everything Behind this finding is Eaton Zveare, who has been tracking vulnerabilities into digital platforms of large brands, especially of the automobile sector. This time it was no different. Zveare discovered that the internal web portal of a known car brand It allowed to modify the behavior of the system from the browser itself. Specifically, it managed to alter the login page code to skip security checks and create an administrator account with national privileges. With that account, access covered more than 1,000 concessionaires in the United States. From there, the problem dimension changed completely. It was not just about accessing internal resources of a concessionaire. The account he managed to generate gave access to the complete system: I could see the data of all the concessionaires connected, act in the name of other users without knowing their credentials and, the most delicate, accessing tools that allowed them to consult information about vehicles and their owners. All that from a platform that, in theory, is reserved for professionals in the sector. Zveare did not force anything, did not installed any malicious software or attacked from the outside. What he found was a badly closed door within a legitimate system. And the most worrying thing is that this door not only allowed him to enter: he offered, from within, a set of tools that nobody outside the manufacturer should control so easily. In the United States, the laws that regulate the sale of vehicles vary by state, but share a common principle: in most of them, Manufacturers cannot sell new cars directly to the consumer. They are obliged to do so through independent dealers, legally protected against direct competition of the manufacturer. That has given rise to a franchised network structure that groups thousands of points of sale and after -sales. Tesla has tried to uncheck that model and sell directly, but it has not been easy. Although he has achieved it in some states, in many others he continues to find legal restrictions that prevent him from selling or even delivering vehicles directly. Your case is the most visible exception, but not the norm. The most delicate is not that this system showed confidential information. The serious thing is that it allowed to act with high privileges, as if one is part of the official structure of the manufacturer. From there, it was possible to assume identities of other employees, intervene on registered vehicles anywhere in the country or access functions designed exclusively for authorized technicians. The portal was designed to give agility to the dealer network, not to resist malicious access from within As we say above, each car has a unique frame number. It is a code of 17 characters – right and numbers – that serves to legally identify it throughout the world. What the average driver probably does not imagine is that this code is visible from the outside, at the base of the windshield, and that in the context of this case it was the entrance key. In a real test, Zveare introduced a visible vin from the outside and obtained the name of the owner. From the portal it was also possible to match the vehicle to a new mobile account. Zveare did not try to drive any vehicles or alter its physical configuration. But with the control that I had, open it at a distance and empty its interior would have been perfectly possible. Today, The name of the affected manufacturer has not been made public. And it’s not because nobody knows. The researcher who discovered vulnerability, does know what brand he was behind the committed portal, but has decided not to mention it in his report or during his defense presentation. Nor Techcrunch, the first medium that echoed the case, has revealed the identity of the manufacturer. It is not something so unusual. In some cases, researchers choose to maintain the anonymity of the company involved by prudence, even when vulnerability has already been corrected to avoid putting third parties at risk: concessionaires, employees or customers who still depend on that system. It can also influence the fact that the compromised platform gave access to entire networks, not an isolated server. Images | Xataka with Gemini 2.5 Flash In Xataka | Bugatti decided not to put speakers in a car of four million euros. His secret is a technique of 1881

Google has shown the future of our videos and photos in Google Photos. A future full of false videos

Google just announce what seemed inevitable after The power of its models of artificial intelligence (Ia) generative In photos and video: Creation of photos and videos in Google Photos from the images of our reel. A novelty that speaks for itself of the future that awaits our content. What’s new. As an AI giant, Google gradually carries all its new advances to the set of services of its catalog. Google Photos has always been a place to experiment with AI, as is the case with the Magic editor or mode Reimagine. Now goes beyond “small touch -ups”, and proposes to create short videos from the photos stored on the reel. At the moment there is not much to indicate to the assistant, who will accept as options “subtle movements” or the classic “I will be lucky” to create a video of up to six seconds. Another novelty of Google Photos is “Remix”, a function that transforms the style of the images we select, being able to choose between styles such as anime, comic, sketches. Google’s anime example remembers Ghibli at Chatgpt. It is a movement that remembers Ghibli moment of Openai, that “Servers melted. Unlike Chatgpt’s global availability, in launch the function will only be available in the United States. Where are we going. With the movement, Google turns a strong trend into personnel and mass: that of the generated videos that seem realistic And social networks and YouTube are flooded. And beyond fun, it presents serious consequences. In Tiktok, for example, there are more and more young people using their mobile to watch mental health videos, with a problem: The most viral are false. The platforms are becoming “Lays of AI“, and far from fighting these trends, they are amplifying them. Meta, for example, has integrated tools such as Advantage+ To create different versions of an ad with little investment. When they try to warn us that the content is created by AI, They are not sure what it is. In text, Openai had its own detector, but ended up closed after admitting that It was not necessary. Our false photos are already a millionaire business. Pieter Levels He is a well -controversial developer and entrepreneur who climbed very soon to the wave of the generative AI with two tools that generate huge amounts to be the only developer, and all using Models ‘Open Source’. One of them, with which he says to enter $ 139,000 Photoai.com. Its function is simple: after training a model with our selfies, we can create an AI model based on us, and then take pictures in the place or possess we want. It goes further that the proposal starts from Google photos, and is already able to make realistic videos of many types, including modeling sessions. Under the slogan “say goodbye to your photographer” points to a future (not very distant) where AI can take care of all the photos we want in paradisiacal enclaves. Fake places where to posture On Instagram, but without the need to move at home. The Spanish Freepik It also has Your alternative. And there are people doing chilling things: inventing their own memories From photographs. Apple plays to improve our memories, without creating them. With iOS 26Apple has presented a function that “gives life to our photos, but in a different sense. The company showed from its inception to Vision Pro as a platform to remember family moments with fidelity. Now it allows photos captured with any iPhone in normal mode become a spatial scene with depth (visible on our mobile, without the need for a virtual reality kit). Image | Xataka and Google In Xataka | How to create images from photos with artificial intelligence

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.