That Napoleon’s jewels were stolen from the Louvre in seven minutes is not a miracle. It is something much worse for France

You have hardly been able to escape to the news of the weekend. It happened when the morning of Paris had not yet acquired the pulse of tourism. Then, a four-man gang climbed the facade of the Louvre as if the very principle of deterrence did not exist. Everything was surprising: there was no night, no disguise of technological ingenuity, no escape into an interior labyrinth. Thus, in the seven minutes it took us humans to have a coffee, the group removed from the heart of the museum the most sensitive remains of the French imperial lineage. The most guarded museum in the world could be crossed like if it were a decoration. The material blow. He told in a detailed report this morning Le Monde that the command arrived on the side of the Seine taking advantage a context of works and the functional anonymity of an urban furniture-mountain. They forced a porte-fenêtre towards the Galerie d’Apollon (the room that condenses the mythology of state sovereignty: joyaux de la CouronneNapoleonic inheritances, diadems and colliers that condense continuity of power) and broke two high security display cases in seconds, collecting eight pieces of heritage value not translatable to the market. The operation lasted around seven minutes. The withdrawal was done along the same vertical axis with the support of two large displacement scooters. In the rush of escape, the criminals dropped the Eugenie’s crownlater recovered damaged. What they took and what they didn’t. The theft affected pieces of the corpus Marie-Amélie/Hortense (including sapphire colliers, earrings and tiaras) and jewelry linked to Marie-Louise. They were unable to extract the diamant-régent (one of the three canonical diamonds of the French canon) nor, as we said, preserve Eugénie’s crown in the flight. What is stolen is, strictly speaking, unmarketable as an entire heritage object, but its dismantling (gold, diamonds, sapphires separately) suppresses cultural and biographical traceability, which is where the irreparable lies. Structural failure. They count national media that the gap was not the cunning of others but the internal predictability: five agents for a room thermodynamically saturated with risk, a relay that reduces to four personnel in the exact strip in which the coup is carried out, a security architecture whose modernization was postponed, and a prioritization curve that armored the Joconde but it decompensated the surrounding heritage periphery. In fact, the runion and staff action (boos to management, demand for an independent audit, denunciation of years of unattended alerts) indicates that the failure was not only big, it was known and was never corrected. Political responses. The assault detonated a immediate response of Macron, of the Interior and of the judiciary, with the affirmation that the authors were going to be captured and the pieces recovered. For its part, the opposition transferred the episode to a frame of state decay: If the Louvre (symbol of the nation’s continuous narrative) is permeable during opening hours, the crack is more than museum-like. In other words, from that prism, public humiliation then operates in two planes: exterior (Country-image) and interior (delegitimization of the chain of command over heritage). The crown of Empress Eugenia de Montijo Criminal logic. We said it at the beginning. The pieces, en bloc, do not circulate. Its economic power lies rather in its deconstruction. The likely incentive is not conventional private collecting (impossible to display) but the supply on demand (unknown contractor, including state or quasi-state) or the cannibalized high margin industrial bulk. According to Le Mondehe recent pattern (Cognacq-Jay, Museum of Nature History, Limoges) shows a vector of criminal professionalization with a logistical window close to civil works, rapid emergence, cold extraction, brief departure and, sometimes, exogenous assignment. The discarding of an item in the flight suggests, perhaps, operational friction, but not global improvisation. Precedents. There is no doubt, France knows famous robberies (1911 the Joconde1976 sword of Charles, 1998 the Corot) but the qualitative leap lies in the practical deactivation of the Louvre taboo during visiting hours. The museum was closed to preserve vestiges and the criminal investigation is open with focus on escape routeabandoned equipment, construction perimeters and cameras. In fact, the hypothesis of a foreign commission is not ruled out, nor is the performance of a cell trained in high-density urban theater patterns. Hunting status. From what is known, the investigation focuses in four authorsscooters and routes already mapped, with cameras analyzed and forensic material in progress. One damaged piece was recovered, but eight remain missing. Plus: the probability of intact recovery decreases with time because the thief’s rational incentive is, a priori, to disassemble, volatilize and recombine. The cultural loss is absolute if the components are assembled in another vector or if the metal is melted and sold through other channels. What the robbery reveals. The reputational implosion now forces us to accelerate what years of internal warnings They did not move: comprehensive shielding, redistribution of personnel due to real risk and not due to tradition, closing of logistical windows associated with civil works, and a redefinition of the security perimeter by layers, not only by a single idol (the Joconde-Gioconda). The only “advantage” of an open-hour robbery with global symbolic production is that it makes it politically unaffordable to return to the previous status quo. If you also want, the episode, rather than pointing out an unusual criminal genius, points to the country itself. The escape in seven minutes did not measure the capacity of the thieves, but rather the exact time in which the State left open the possibility that the largest museum in the world could be treated like the entrance to a bathroom in full public service. Image | Tore Sætre, Alexandre-Gabriel Lemonnier In Xataka | Everyone wants to see the Mona Lisa, a problem that the Louvre is going to solve drastically: by hiding it In Xataka | A Saudi prince paid $450 million for a Da Vinci painting. The problem is that it may not be by Da Vinci

Italian producers are fed up with the Parmesano stolen. So they are putting microchips

Gouda, ManchegoCheddar, Roquefort and Parmesano, of course. All have in common that they are Cheese typesbut also that, together with many others, they represent something more important: culture, tradition and even a country. Such is the importance of certain foods that the European Union created the DOP seal, A quality system To protect them. But outside the EU, products are still confused under the DOP that have a lower quality. In Italy they have tired have decided to take action on the matter armoring the Parmesan cheese. As? Inserting microchips. Parmesan. Parmesan is one of the most ‘copied’ cheeses in the world. And it is not due to its flavor, but to something that interests the industry much more: its prestige and the high value of it. Parmesan is used in recipes as dear as Pizzas Or a certain type of pasta, and if you have ever bought a Parmesan, you will know that the price is very different from other wedges. Out of Europe is the jungle. It is one of those cheeses with the seal of Denomination of Protected Origin And, although the European Union prohibits the use of the name “Parmesan” for products that are not ‘Parmigiano Reggiano Dop’, the problem is that there are markets, such as the American, in which a cheese ‘parmesan’ is sold that nothing has to do with Parmesan. Apart from the United States or Latin America, there are versions of ‘ParmesanReggianito‘Argentine after World War Ithat it was consolidated so much that it caused the creation of the Reggiano Parmigian consortium. It is estimated that this imitations market moves around 2,000 million dollars annually. To put it in context, the authentic Parmesan moved 3.2 million in 2024. The bark is like a huge barcode And the detail of the QR where the microchip goes A Burrada. Estimates point to 90% of products labeled as “Parmesan” that are not really Parmesan. These are cheese made based on cheaper cheese mixtures, with extreme cases of some stuffed with wood fibers. And, as you can imagine, it is something that entails several inconveniences for the DOP, such as direct damage to the consumer being a lower quality product, but with a high price. And also affects Parmesan’s own industry, eroding its cultural value. The Italian consortium He has managed to block some attempts to parmesan cheesebut it has not been enough and manufacturers have gone to action. Microchips in food. For a few years, the Parmesan cortex (which is a part that is not usually consumed, although it is very good to make a cream or to some popcorn) incorporates QR codes. They allow a traceability of the product and are “printed” based on dairy proteins. If you want to eat the bark that carries that QR, there would be no problem. The wheel also has a system of points that act as a kind of identity document. However, the volume of fraud forced the sector to look for new solutions. There the microchips come into play. Developed By the American company P-chipthis microchip is somewhat larger than a salt grain and is inserted into the casein label. Each has A unique code that stores all cheese information: Origin. Production date. Place of production. Origin of milk. Protecting the denomination of protected origin. It is something that allows producers and distributors to verify the authenticity of that piece and, of course, gives a guarantee to the consumer, who knows that he is paying a high price for the product he wants to buy. According to security tests, and how we can read in The Guardianalthough the chip is in contact with the food, it does not leave toxic waste and can be easily removed at home because yes or yes it is in the QR code. This began to be implemented in 120,000 of the four million wheels annually in Parmesano, but the Reggian Parmigian consortium wants this technological solution to become a standard in its industry. Beyond Parmesan. In the end, it is a measure for Protect the economic value of the product And, if the DOP seal does not say – not protect – nothing outside the European Union (a seal that shares cheeses such as Manchego or Roquefort), which at least between QR and microchips There is a traceability and a fight against “falsifications”. The objective, according to account The president of the PRC, “is to transmit the value of our product globally and distinguish it from products with similar names in the market that do not meet our strict production and area of origin.” And, precisely, the Reggian Parmigian can teach the way to other products with denominations of origin such as the Padano Grana or the aforementioned Spanish and French protected cheeses. Images | Parmigianoreggiano, Udo Schröter, Morgan Cheeses In Xataka | Bodegas have been labeling their bottles with all kinds of animals for years. It turns out that they are key to choosing wine

Ukraine has stolen the confidential information of the last nuclear submarine of Russia. And then he has published all his failures

Two news in just a few days offered a summary of the importance of Nuclear deterrence of Russia and its need to update it. On the one hand, Moscow advertisement which will cease to respect the limitations of the treaty of nuclear forces of intermediate scope. On the other, The New York Times confirmed through satellite images that its nuclear submarine base had is damaged After an earthquake. Now Ukraine has just added another asterisk. The end to the treaty. The first news occurred two days ago. Moscow advertisement which will set aside the limitations of the treaty of nuclear forces of intermediate scope (Inf), signed in 1987 to eliminate land missiles with ranges between 500 and 5,500 kilometers and considered a milestone of the cold war. Although the pact was already broken after the United States withdrawal In 2019, Moscow maintained a unilateral moratorium that is now terminated, claiming that Washington plans to display missiles of this type in Europe and Asia. The decision also coincides with the entry into service of the Missile Orshnikcapable of carrying nuclear eyes and unfold in Belaruswhich increases fear in the West to a new arms race in which European capitals would be minutes from a Russian attack. While Medvedev launches direct warningsKremlin seeks to clarify the tone, although the definitive breakdown of the INF confirms the setback of nuclear control mechanisms and raises strategic tensions in Europe and Asia. The “touched” nuclear base. We count the fear And finally it has been confirmed. The earthquake that made the Russian nation tremble caused damage to the strategic base of Nuclear Submarines of Rybachiy, in the Kamchatka Peninsula, according to planet labs satellite images cited By The New York Times. The photos show that a section of a floating dock He got rid of of its anchor, although there are no major damage to the facilities. The Rybachiy base, vital for the Russian nuclear fleet in the Pacific, thus maintains its operation despite the damage located in its infrastructure. Before and after earthquakes in nuclear infrastructure Filtration. A few hours ago, Ukrainian military intelligence (Hur) has announced obtaining internal documents classified from the K-55 Knyaz Pozharskythe most more modern Russian nuclear nuclear submarine in the Borei-A classessential piece of the Kremlin nuclear triad. This ship, officially incorporated to the northern fleet On July 24, 2025 at a ceremony chaired by Putin, he is armed with 16 intercontinental missiles R-30 Bulava-30each capable of carrying up to ten nuclear eyelets. According to kyivthe material obtained includes complete lists of the crew with details of functions, physical preparation and qualifications, combat manuals, schemes of survival systems, organizational structure, internal regulations for life on board, protocols for evacuation and transfer of injuries, as well as Technical documents on failed communication equipment and engineering records. It would even have secured an excerpt from the daily service book, which regulates routine tasks and submarine combat operations. Part of the classified documents filtered The failures. The most surprising thing about the case is that Filtration now published represents a significant coup for the operational security Russian, as it offers Ukraine and its allies critical information on technical vulnerabilities not only of Knyaz Pozharskybut of the entire series of borei-a submarines, considered the more modern nucleus of Moscow nuclear deterrence. These data, according to The intelligence of Ukrainethey will allow identify From design limitations to safety protocols and resistance capabilities, eroding, in addition, the perception of invulnerability that Russia tries to project with its strategic fleet. Hur itself He stressed That this intelligence dismantles the “imperial myth” on the strength of the Russian nuclear arsenal, by exposing the fragilities of systems that Kremlin presents as unwavering. Part of the classified documents filtered The naval context in the war. Plus: the revelation arrives at a time when the Russian navy has suffered a palpable deterioration of its prestige and effectiveness, especially In the Black Seawhere the fleet has lost several key ships at the hands of Ukrainian naval drones and Western missiles. He sinking of the landing ship Caesar Kunikov, of the Patrol Sergei Kotov and of the Ivanovets Corvetteamong others, has weakened an instrument that until 2022 was perceived as dominant in the region. The NATO careMeanwhile, it moves towards the Arctic and North Atlanticwhere Russian underwater activities are closely monitored and have motivated the display of new forces Maritime Allied. In this context, know the specifications and vulnerabilities of the Borei-A class, which constitutes the strategic arm of the northern fleet in Gadzhievo, results from An incalculable value to calibrate nuclear balance and reinforce allied deterrence. The information in the modern war. If you want also, the Hur operation It is more than a espionage success: it symbolizes how, in the war of the 21st century, information can have both power as a precision missile. Ukraine, confronted with an adversary with palpable material, converts intelligence into An asymmetric weapon able to undress the vulnerability of the jewel of the Russian strategic fleet. On the other sidewalk, the lesson for Moscow seems clear: not even its nuclear submarines, designed to guarantee the survival of the State in case of total war, are immune, not only Natural disastersbut to Information War. Image | Ukrainian intelligencePlanet Labs In Xataka | It is not that Russia does not find the F-16 of Ukraine, is that kyiv has discovered the perfect hiding place for the future of wars In Xataka | A new challenge has arrived to Ukraine: it measures 4 meters, it has 75 kilos of explosives and uses AI to hit Russia

Tiktok and Instagram have become an immense compilation of stolen videos. And they have no idea how to solve it

Open Tiktok (or your trusted short videos platform) and the following appears: a clip extracted from a podcast uploaded by random account @user97567, a video to a split screen with a talk up and Parkour in Minecraft below and a compilation of cat videos that upload @funnycatslolhaha. What do all these clips have in common? That none is proper. All that content It has been stolen to its original creators And the problem is that no platform seems to know how to solve it. Context. When you go up to the Internet, controlling its distribution is extremely complicated. In the same way that no one can prevent you from copying and hitting this text on a blog, preventing someone from downloading A YouTube video, A Tiktok, A reela content in general, it is not an easy thing. On many occasions the platform itself allows and, if not, it is possible to resort to third -party tools that sometimes can even remove the water brand. 21 Instagram tricks – Tutorial with all secrets! So that. Profiles that rectify content of other users do not do so for love of art. They do it with two possible objectives: monetize the account using dedicated platform funds or inflate the figures to sell them. Surely names Babronazi o PostureoEspañol make the bell sound. It is also possible that it is a fans account, in which case the reason may be more innocent. Be that as it may, these accounts are promoted based on stealing content from other users and republicing it after a slight modification (if any). The typical “for you”: Memes accounts, cat videos and accounts with zero units of own content | Captures: Xataka In fact, there are profiles and courses specialized in what is normally known as “network automation”. Roughlythis system consists of combining AI tools, videos of other creators and fast editing templates to generate a huge volume of videos and monetize the account. It is one of those practices to “generate passive income“, among quotes, how strong they usually hit in a certain segment of the population. The reality, however, is much more complex. Solutions. Few, unfortunately. Some users have found to embed a water mark within the video itself a way that, if any discharge tool can eliminate what generates the platform, that remains. However, the reality is that social platforms have failed to stop the distribution of original content by third parties. Facebook, Instagram, YouTube and Tiktok are full of that content. The algorithm mixes it with the original content and serves it to users, which consume it. To all purposes, the platform is gaining because its objective (increase retention) is achieved. The creator, although it can be relatively benefited in terms of exposure, loses the gain that, potentially, could have had his profile of having published said content. Image | Xataka What are platforms doing. Given this situation, some platforms have tried to take measures with greater or lesser success. YouTube has it well tied. Although it is possible to continue up and monetizing “reused content”, that is, the typical video reacting to the new song of X or the video of another creator, the platform does not allow monetizing what it considers “non -authentic content” (mass made videos) or clips extracted from a podcast that is not yours. This applies to both long videos and shorts. Instagram allows Upstate third parties and does not hit. Now, if you detect that someone has uploaded a video of another person, you will automatically add an “original content of” content and link it to your profile. Politics, however, is … complex. The material edited materially, see “a person appears in a superimposed video and adds new information, such as comments”, is allowed and distributed as normally. Facebook has been more permissive (to the point of allowing direct monetization of videos with non -original content), so far. THE META PLATFORM has announced which will adopt in its reels a policy similar to that of Instagram. However, there are no mechanisms to prevent a reused content page. Tiktok It has some guides That, on paper, they exclude from ‘for you’ the “reproduced or non -original content that does not incorporate new or creative changes.” The reality, however, is that it is enough to add subtitles or make some edition for the video to be distributed as normally. Another issue is intellectual property. This is a swampy terrain and the platforms usually cover their backs in their policies prohibiting it, directly. When we upload a video to Tiktok or Instagram we grant a global license so that this video is exploited, but the rights of said video remain ours. We could, in theory, put a copy of Copyright to all the accounts that we see to use our content, but that is an intense job and, speaking in silver, putting doors to the field. We can find the same in other sectors. For example, models uploaded to 3D printing repositories are, unless it is marked, for personal use. That a Makerworld model is downloaded has no commercial license to exploit it in your Etsy store. However, this a practice known and persecuted by the community, but against which it is difficult to fight. In summary. The accounts that use third parties will not disappear and combat this practice does not seem easy. That is a full -fledged paradox, since the platforms encourage users to raise original content, but at the same time they do not protect it completely. And not only that, but the user does not care in excess because, after all, they go to these platforms to entertain themselves. It is indifferent if that entertainment comes from the most worked video in the world, a compilation of funny babies, the Senimous Iteration of Tung Tung Tung Sahur or a video of a boy dancing on a kayak. Cover image | Xataka

This is the goal plan that has stolen brains to OpenAi and Google

Mark Zuckerberg is distributing checks as if there were no tomorrow. The Meta CEO announced yesterday a great restructuring of its artificial intelligence division, which now aims to “superintelligence.” And to reach it, Zuckerberg is stealing engineers from OpenAi, Anthropic and Google with a carver. Restructuring with two star signings. The new division of the company is called the SuperintenTintelligence Labs (MSL) goal, and will be led by Alexandr Wang, Excel of Scale AI. That has been the first star signing of Zuckerberg, which decided to invest 14.3 billion dollars in that company to buy an important participation (49%) but above all to get Wang’s services. The second great signing is Nat Friedman, Exceiver of githubwhich will co -direction that new division with Wang and will focus according to the statement on AI products and also in R&D. The internal statement, to which it has had access Bloomberg And that also shares CNBCreveals more interesting details. Up to 100 million bond. To form this new team, Meta has offered bonds of up to 100 million dollars to the most important engineers of other companies. The salaries and compensation offered in detail are not known, but the figures are simply astronomical. In Bloomberg they point out that the company has offered some investigators shares worth dozens of millions of dollars. Stealing employees to the greats of AI. The engineers who have managed to sign a goal They come from OpenAIGoogle, Deepmind and Anthropic. These are experts who have been the great ones responsible for developing and training products such as GPT-4O, Gemini 2.5 or Claude, and precisely that experience is the one that goal wants to take advantage of making a definitive qualitative leap when it comes to dominating the market. Media like Wired have A list With 11 of those star engineers. And Lecun, what? In that internal statement, however, There is a name that is not mentioned and that is especially relevant. We talk about Yann Lecunthat until now had been visible head of the efforts of the finish line. Lecun has been making it clear that the generative AI It is not the valid path To achieve artificial superintelligence or an AGI. His speech It has always been almost “anti -judicial”, and has been Very critical With the ability of current models, although it has always supported the launch of IA Open Source models, of which Llama is the greatest exponent. Better spend a fortune than regret it later. According to Bloomberg Zuckerberg, he stated that Meta will spend “hundreds of billions of dollars” in AI projects in the coming years. Last summer He already indicated that “it is very likely that many companies are oversizing (their investments in AI). But, on the other hand, I think that all the companies that are investing are making a rational decision, because the disadvantage of being left behind is that you could stay out with the most important technology of the next 10 to 15 years.” And there are also the data centers. Although there are no specific figures on the amount of money that has been spent on salaries and compensation for all that new division, the single investment in Scale AI (14.3 billion) and those hypothetical bonds of tens of millions of dollars already make clear the dimension of the bet. But that’s not all: Mark Zuckerberg himself already indicated months ago that this 2025 plan to invest 65,000 million dollars In data centers. It is a “shy” figure in front of the 75,000 What does Google plan to invest, 80,000 from Microsoft or the 100,000 Millions of dollars that Amazon estimates that it will invest in these facilities for training and inference of AI. Call on the one hand, new models for another. Zuckerberg also explained in the statement how he has a lot of confidence in the progress of flame 4.1 and calls 4.2, which are the goal base AI. However, he says that “in parallel, we will begin to investigate in our next generation of models.” But. The truth is that today calls is an absolute reference for researchers and startups that create their own projects from it, but its performance is behind the most capable models today. Meta has not achieved that the integration of Goal AI in WhatsApp or Instagram I just turned it into a preferential option for AI users, and Chatgpt remains the clear clear in this area. One thing is money and another mission. This “galactic” team can have a problem as Chon Tang explained, of the Berkeley Skydeck Investment Fund, having billionaire salaries can be counterproductive in the Meta Mission In Xataka | The cover of the AI ​​is a goal. He has been betting on her for more than a decade and has much more than she calls

return to its owner the iPhone that had stolen

That they stole your mobile, look for another resemblance in Wallapop and end up finding you who stole it from you. It is something that happened in Roquetas de Mar, according to the judgment of the Criminal Court number 5 of Almería. A curious case in which the play did not go too well. Theft. The thief, who had not yet been identified, forced the door of a vehicle that was parked. After opening it, I stole a bag, several keys and … a iPhone 15 pro max valued at more than 1,300 euros. The Criminal Code states that, in the event that the stolen object exceeds 400 euros, a prison sentence is established. Looking for the mobile. A common practice in Spain is Sell ​​in Wallapop The stolen, and the victim was more than aware. Therefore, he set out to look for the phone on the platform … until he seemed to have found it. The owner of the same agreed to be at a meeting point with the seller to check whether or not the mobile was stolen. Indeed, it was, after what he called the Civil Guard and managed to retain the thief until he was identified and arrested. I have not done anything, honor. The head of the event did not even appear at the trial, held in his absence. Despite this, the magistrate considered that she acted with profit and illicit origin of the phone, declaring him guilty of a Reception crime. In other words, he is condemned for selling a phone knowing that he was stolen, but he could not directly prove his direct participation in the subtraction. The court thus imposed a six -month prison sentence that can still be appealed. Wallapop and scams. Although Wallapop, with the necessary precautions, is a safe place in which to buy second -hand products, products and scams are the order of the day. Not too long, We knew of scam cases in Galicia. The buyer acquired our iPhone, commented that it was blocked by Icloud and promised to return the phone made of money. Obviously, the iPhone never returned back, staying both the phone and the money it had paid. What to do if it happens to you. In the event that the iPhone is stolen, the first step is to denounce the authorities to record. Trying to locate it on your own and stay with the thief is a fairly risky strategy, although there is a solution that allows you to have no contact. If your mobile is linked to an ICloud account (in Android it is easier to format even if it has Google) it is quite complicated that they have managed to close it: these mobiles are usually sold very cheap because they are blocked. You just have to stay with the seller, know that he is in certain location, and look for the iPhone From the network search. If the GPS tells you the position, you can call the authorities without establishing contact at any time. Image | Xataka In Xataka | What can I do to protect myself from my mobile is lost or steal from me

They had stolen 1.2 million euros

The most spectacular robbery in June has had an unusual victim: Nintendo. A truck that transported almost 3,000 units of its last console It has been devaluedwhich can be a problem for an apparatus that is already having Supply problems. Although perhaps the biggest problem is going to have thieves to give them out. More than one million euros. That is what the almost 3,000 consoles cost Switch 2 stolen on June 9 of a truck in Colorado. The truck driver did not know what goods he transported, only that it was games and toys. He was on the way from the headquarters of Nintendo of America in Redmond, Washington, to a Gamestop branch in Grapevine, Texas. Caught Possibly, thieves have difficulty getting all the desirable game to consoles: Nintendo will have perfectly located the serial numbers of the consoles. If someone connects to Internet or uses an account with them, they can disable them at a distance without any difficulty, so the consoles will have to be cracked using a Jailbreak not authorized to convert them into functional consoles. Of course, this last procedure involves its risks, and the user could meet a luxurious pisapapeles if something fails. To the Dark Web. As usual in these cases, consoles (unless thieves want to resort to direct scam and sell consoles that know that unusable as soon as they connect to the Internet) possibly move For the Dark Webselling them at much lower prices than the originals. There is another solution: selling the consoles outside the United States, although that does not guarantee that they will not be blocked by Nintendo and, in any case, it could imply an size in the robbery that perhaps it was not so planned. It is not found. The desired Nintendo console, which despite the precautions that the Japanese company is taking are experiencing supply problems, has become the most desired technological product of the moment, and has quickly become the launch of a console most successful in history. This robbery adds a peculiar mythical desired product to the launch. More and more steal is complicated. When a technological device is stolen, there are several systems that can lead to useless. For example, in the case of mobile phones, the IMEI (International Mobile Equipment Identity) is a unique code that identifies each device, which allows the company to Distance block. This prevents the phone from connecting to mobile networks and disables it for calls, messages and data even if the SIM card is changed. Something could make Nintendo with these consoles. With the church we have encountered. Nintendo takes the Protection of your devices and, in general, of their legal rights. It is one of the companies that has most exhaustively fought against unauthorized copy of your gamessuch as cartridges, USB memories and modchips, which allow playing roms. Nintendo has obtained numerous judicial sentences in their favor worldwide in that sense. Nintendo also supports these efforts with unique certificates and tickets linked to both the device and the Nintendo account to identify unauthorized users, to which regular software updates of their consoles are added to close vulnerability. It has reached to change hardware components (such as chip Mariko in Switch) to hinder the Homebrew and piracy. Header | Arapahoe County Sheriff Office In Xataka | I have tried the Nintendo Switch 2 and I already have an answer to the question “Is it worth buying it if I have the original switch”?

Without knowing very well how, two KIA employees have stolen 1,000 engines in five years. And the hole is 2.3 million dollars

“In this plant there are missing engines.” Something like that must have said in the plant Kia in India where an audit discovered that there were missing engines. Specifically 900 combustion blocks that nobody had news and that They would have disappeared during the last three years. With the passage of time the investigations have followed their course and, with them, they have discovered that the hole was even greater than expected. They point out in Motorpasion that the last investigations suggest that the engines would have disappeared because, during five yearstwo employees have stolen them from the factory itself. And, specifically, it has been a total of 1,008 combustion blocks that have raffled the safety of the plant at some point throughout it. 2.3 million in combustion engines The investigations, evidently, wondered how two operators could get more than a thousand engines out of the Kia plant without anyone noticing. And the answer seems obvious: they were not alone. According Police have unraveled what happened have discovered that, at least, they calculate that Six people They were involved. Two of them inside the factory, two others who worked on their transport and one last couple were in charge of their distribution. The workers had positions of responsibility within the motor line and point to The Economic Times that falsified company documentation as invoices and papers in which the output of the engines was registered to transfer the doors. One of these workers is detained and is being investigated but the second is missing. Once this first control is over, it is believed that engines They were transferred in a truck to Nueva Dheli. That is, a trip of more than 2,000 kilometers since it is necessary to cross a good part of the country. Trucks used false registration plates and indicate in Reutersalready in the city they were distributed selling them as they had left the factory. That is, completely assembled. The money that points to a hole in KIA accounts of 2.3 million dollars, according to the police, was used for personal expenses, purchase of homes and solve past debts. The robbery realized in Kia following some strange movements registered by the security and documentation cameras that did not square. Regarding punishment, in Motorpasion They point out that the two employees They have not yet been accused of a specific crime for which they will have to wait for the trial. However, Local media They point to sentences that could exceed 10 years in prison once the process ends. Photo | Kia In Xataka | After the theft of 12,000 cars in a year, the police in this city have given a neighborhood council: leave the keys in sight

Desperate to find his stolen motorcycle, he ended up locating a container with another 25 about to sail. It wasn’t thanks to GPS

In Spain a motorcycle is steal every six minutes. It is enough with a van and two or three people willing to make it disappear. It is not the only country that this scourge suffers. In the United Kingdom Motorcycles are stolen worth three million each monthsomething that leads to a curious story. One in which the London police could find much more than he was looking for. Biketrac It is a company specialized in GPS tracking devices based in the United Kingdom. Next to the police, and after investigating the theft of a client, he has been able to locate many more motorcycles than he had planned. One of the company’s clients called those responsible for the service, desperate after the theft of their BMW R 1200 GSone of the stars in the German house. Biketrac, which offers a tracking service by combining both GPS and radiofrequency, located the motorcycle at a point of Essexa small county that may sound to you if you like Viking history. They soon realized that the motorcycle was still moving, getting closer and more to a load spring near the port. They were quite clear that thieves wanted to send the motorcycle abroad, and that time ran against him. According to the company, the authorities could be indicated to the exact container that contained them thanks to the radio frequency, and not to the GPS. Within a container, GPS ceases to be a precise technologyand that is where the radiofrequency You can emit small radio pulses that, tracked with appropriate portable receptors, can determine locations exactly. Simply approach the container and check the signal intensity. When it reaches its maximum, you are facing it. With the police authorization, readings were taken in the area to triangular the exact position of the container, identifying its corresponding number to subsequently inform the authorities. Location and number in hand, the police requested permission from the port to access the container. Bingo. Inside it was not alone the BMW R 1200 GS, there were a total of 25 motorcycles stacked in the container, ready to leave the country. This was how, in the task of finding a single motorcycle, almost thirty of them, thanks to radio frequency technology. An unusual in most trackers sold in Spain. Image | BMW In Xataka | Electronics has started a war to kill the most sacred piece of motorcycles: the traditional clutch

I had set up the Amazon of the stolen data

José Luis Huertas, aka AlcasecIt wasn’t just a hacker. At 21 he had built “UDYAT – The Eye of Horus“, a commercial platform that sold stolen data with sophistication not so far from that of Amazon or Netflix. Why is it important. The Alcasec detention He has brought to light that Spain had a “parallel data market where anyone could buy segmented personal information as if it were a subscription service to use. His business model was indistinguishable from a legitimate startup. The context. Although media is presented as a youth hacker from Your detention in 2023the reality is more complex. Alcasec had created a complete business infrastructure: Cloud storage. Customer service bot on social networks. Data segmentation by profiles. And even a cryptocurrency billing system. The facts. The platform offered “custom consultation services” through an encrypted bot. Customers could buy individualized data packages according to specific individuals or legal entities. Like any modern electronic commerce, but selling your ID, your phone number and your bank data. His “catalog” included: Complete telephone listings. Operator customers. Madrid transport fertilizers. Pet records. Databases of educational centers. Civil Registry Information. In figures. Alcasec invoiced 1,866,175 euros through its platform. In their devices, 32,943 bitcoins were found. Between December 2021 and February 2022 he received cryptocurrency notifications worth 365,000 euros. Between the lines. The participation of former State Secretary Francisco Martínez was not accidental. The network He used his figure to appear to be a legitimate security consultancy, thus bleaching its criminal operation through corporate structures. Police Define the organization as “a structural threat with the capacity for economic and strategic destabilization.” They do not exaggerate. They had made public institutions violated without realizing it, turning their databases into an online supermarket. Deepen. The most worrying is the scalability of the model. Alcasec didn’t need to hack every time I wanted money. He had automated the process: the systems continually stole data, the platform automatically classified them and the BO served 24/7 customers. A business that worked alone. The difference between Alcasec and a normal technological company is that one sells legal services and the other illegal data. Specifically, your private life. Outstanding image | National Police In Xataka | After the mysterious Hackers Careto group was an unexpected agent: the Government of Spain, according to Techcrunch

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.