{"id":125494,"date":"2026-05-04T19:39:09","date_gmt":"2026-05-04T19:39:09","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/"},"modified":"2026-05-04T19:40:24","modified_gmt":"2026-05-04T19:40:24","slug":"china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/","title":{"rendered":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"article-body\">\n<hr id=\"elk-163c1829-9e63-461c-9e1f-b681b908932a\"\/>\n<ul id=\"elk-9a541df8-adaa-4508-9353-8cea6d8e6901\">\n<li><strong>PADJ-X modeled B-21 geometry utilizing solely publicly obtainable imagery<\/strong><\/li>\n<li><strong>Simulation claims counsel a 15% enchancment in aerodynamic effectivity<\/strong><\/li>\n<li><strong>Leaked recordsdata present partial validation of radar cross-section simulation elements<\/strong><\/li>\n<\/ul>\n<hr id=\"elk-aaa555ff-7b8c-474a-b8cd-023e1854ef0e\"\/>\n<p id=\"elk-6e73c24b-1133-4598-9983-ac4130f7d51d\">A Chinese language aerospace simulation software referred to as PADJ X has reportedly recognized aerodynamic and stability limitations in America\u2019s most superior stealth bomber, the B-21 Raider.<\/p>\n<p>The software program operates as an built-in platform that mixes 5 main disciplines: aerodynamics, propulsion, electromagnetics, infrared signature, and sonic growth design.<\/p>\n<p><a id=\"elk-seasonal\" class=\"paywall\" aria-hidden=\"true\"\/><\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-root\"\/>\n<p id=\"elk-6e73c24b-1133-4598-9983-ac4130f7d51d-2\">In keeping with a peer-reviewed paper revealed in Acta Aeronautica et Astronautica Sinica, the researchers utilized 288 parameters to simulate a B-21-type format, utilizing publicly obtainable imagery quite than categorized specs.<\/p>\n<p><span class=\"article-continues-below block py-2 text-sm\">Article continues beneath <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" class=\"inline-block w-2.5 h-2.5 ml-2\" fill=\"currentColor\" preserveaspectratio=\"xMidYMid meet\" viewbox=\"0 0 1000 1000\"><path d=\"M1000 100L500 900 0 100h1000z\"\/><\/svg><\/span><\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-recirculation-type=\"inline\" data-mrf-recirculation=\"Trending Bar\" data-nosnippet=\"\" class=\"clear-both pt-2 pb-0 mb-4\">\n        <span class=\"&#10;            flex&#10;            after:content-[''] after:flex-1 after:ml-4 after:my-[0.7rem] after:border-t after:border-solid after:border-t-[#ccc]&#10;            before:content-[''] before:flex-1 before:mr-4 before:my-[0.7rem] before:border-t before:border-solid before:border-t-[#ccc]&#10;            font-article-heading pb-0 text-[length:var(--article-river-title--font-size,1em)] uppercase sm:text-[length:var(--article-river-title--font-size,0.875em)] font-bold&#10;        \"><br \/>\n            You could like<br \/>\n        <\/span><\/p>\n<\/aside>\n<p><a id=\"elk-c07b6020-c141-490a-a450-155678e50a90\" class=\"paywall\" aria-hidden=\"true\"\/><\/p>\n<h2 id=\"claimed-capabilities-exceed-existing-western-platforms-3\">Claimed capabilities exceed current Western platforms<\/h2>\n<p id=\"elk-cd2c02fb-d1e2-4575-bef2-e58e65bd58c0\">Their evaluation claimed that aerodynamic optimization may enhance the plane\u2019s lift-to-drag ratio by 15%, whereas decreasing shock wave results that degrade stealth and effectivity.<\/p>\n<p>The PADJ X system makes use of adjoint optimization know-how to calculate optimum design instructions throughout all parameters concurrently, decreasing computational prices in contrast with conventional trial-and-error strategies.<\/p>\n<p>A Chinese language researcher famous that the software program \u201cboasts full mental property rights\u201d and allows \u201ccomplete optimization of plane aerodynamic configurations.\u201d<\/p>\n<p>Western platforms reminiscent of NASA\u2019s FUN3D and Germany\u2019s FLOWer solvers don&#8217;t combine as many physics disciplines right into a single setting.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-JLJ7R99Bbj8xybKDzsJmR6\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-JLJ7R99Bbj8xybKDzsJmR6 slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Signal as much as the TechRadar Professional e-newsletter to get all the highest information, opinion, options and steerage your small business must succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>These current methods typically require guide changes when transferring optimization from one self-discipline to a different, making multi-objective tuning slower and extra fragmented.<\/p>\n<p>PADJ X\u2019s all-at-once method suggests a step ahead in built-in plane design, however its sensible affect on real-world stealth bombers stays unproven.<\/p>\n<p><a id=\"elk-36f6169e-1867-4bf1-b93d-27a9af60d05a\" class=\"paywall\" aria-hidden=\"true\"\/><\/p>\n<h2 id=\"available-data-suggests-a-functional-but-unverified-system-3\">Out there knowledge suggests a practical however unverified system<\/h2>\n<p id=\"elk-e0ce192d-5522-406b-b5f2-386ead47e24d\">The leaked 20GB of recordsdata related to PADJ X comprise earlier variations of the challenge, together with work on the Northrop Grumman X-47B <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/cameras\/drones\/best-drone\" data-url=\"https:\/\/www.techradar.com\/cameras\/drones\/best-drone\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/cameras\/drones\/best-drone\">drone<\/a> and the Chinese language CHN-F1 benchmark mannequin.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-recirculation-type=\"inline\" data-mrf-recirculation=\"Trending Bar\" data-nosnippet=\"\" class=\"clear-both pt-2 pb-0 mb-4\">\n        <span class=\"&#10;            flex&#10;            after:content-[''] after:flex-1 after:ml-4 after:my-[0.7rem] after:border-t after:border-solid after:border-t-[#ccc]&#10;            before:content-[''] before:flex-1 before:mr-4 before:my-[0.7rem] before:border-t before:border-solid before:border-t-[#ccc]&#10;            font-article-heading pb-0 text-[length:var(--article-river-title--font-size,1em)] uppercase sm:text-[length:var(--article-river-title--font-size,0.875em)] font-bold&#10;        \"><br \/>\n            What to learn subsequent<br \/>\n        <\/span><\/p>\n<\/aside>\n<p>Particular person elements of the software program pipeline have been verified to function accurately, together with radar cross-section calculations run in third-party instruments reminiscent of Altair FEKO.<\/p>\n<p>Nevertheless, operating a full multi-parameter geometry optimization from scratch would require extra computing energy and time than has been publicly demonstrated.<\/p>\n<p>The analysis papers referenced within the leak \u2014 numbers 10.7527\/S1000-6893.2025.32221 and 10.7527\/S1000-6893.2025.32816 \u2014 can&#8217;t presently be discovered wherever, even in Chinese language-language repositories.<\/p>\n<p>Entry to those paperwork seems both to have been tightly restricted from the outset or to have been eliminated after the leak from the Nationwide Supercomputing Heart of China.<\/p>\n<p>The absence of verifiable entry to the ultimate December 2025 software program bundle leaves room for doubt, as does the handy narrative of a \u201cmom of all leaks\u201d that can&#8217;t be independently confirmed.<\/p>\n<p>What stays unclear is whether or not Chinese language scientists genuinely cracked the B-21\u2019s aerodynamic limits or whether or not your complete episode serves a distinct strategic goal.<\/p>\n<p>The leaks might rely totally on open-source imagery and publicly identified design constraints quite than real espionage.<\/p>\n<p>This implies that the claims may mix actual technical functionality with a rigorously managed narrative aimed toward influencing perceptions of U.S. stealth superiority.<\/p>\n<p>By way of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.scmp.com\/news\/china\/science\/article\/3338902\/chinas-stealth-design-software-padj-x-finds-potential-flaws-b-21-bomber-configuration\" target=\"_blank\" rel=\"nofollow\" data-url=\"https:\/\/www.scmp.com\/news\/china\/science\/article\/3338902\/chinas-stealth-design-software-padj-x-finds-potential-flaws-b-21-bomber-configuration\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>SCMP<\/em><\/a><\/p>\n<hr id=\"elk-5033b703-7450-4e10-91d6-dc38a8dbaa5a\"\/>\n<figure class=\"van-image-figure pull-right inline-layout\" data-bordeaux-image-check=\"\" id=\"elk-932312d9-69b8-4fe4-b17e-261a79f86d2e\">\n<div class=\"image-full-width-wrapper\">\n<div class=\"image-widthsetter\" style=\"max-width:676px;\">\n<p class=\"vanilla-image-block\" style=\"padding-top:31.51%;\"> <picture data-new-v2-image=\"true\"><source type=\"image\/webp\" srcset=\"https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg.webp 1200w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg.webp 1024w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg.webp 970w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-650-80.jpg.webp 650w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-480-80.jpg.webp 480w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-320-80.jpg.webp 320w\" sizes=\"(min-width: 1000px) 970px, calc(100vw - 40px)\"\/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78.jpg\" alt=\"Google logo on a black background next to text reading 'Click to follow TechRadar'\" data-srcset=\"https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg 1200w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg 1024w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-676-80.jpg 970w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-650-80.jpg 650w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-480-80.jpg 480w, https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78-320-80.jpg 320w\" data-sizes=\"(min-width: 1000px) 970px, calc(100vw - 40px)\" loading=\"lazy\" data-new-v2-image=\"true\" data-original-mos=\"https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78.jpg\" data-pin-media=\"https:\/\/cdn.mos.cms.futurecdn.net\/diM9tpwF2Lz85R8q85CT78.jpg\" class=\"rounded-[var(--image--border-radius,0)] pull-rightinline\"\/>\n<\/picture><\/p>\n<\/div>\n<\/div>\n<\/figure>\n<p id=\"elk-6e2ac97f-f15f-4964-a682-e49dd6f4c549\"><a data-analytics-id=\"inline-link\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEWFJsWTJoeVlXUmhjaTVqYjIwb0FBUAE?hl=en-GB&amp;gl=GB&amp;ceid=GB%3Aen\" data-url=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEWFJsWTJoeVlXUmhjaTVqYjIwb0FBUAE?hl=en-GB&amp;gl=GB&amp;ceid=GB%3Aen\" target=\"_blank\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em><strong>Follow TechRadar on Google News<\/strong><\/em><\/a> and<a data-analytics-id=\"inline-link\" href=\"https:\/\/www.google.com\/preferences\/source?q=techradar.com\" data-url=\"https:\/\/www.google.com\/preferences\/source?q=techradar.com\" target=\"_blank\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em> <\/em><em><strong>add us as a preferred source<\/strong><\/em><\/a><em> to get our skilled information, critiques, and opinion in your feeds. <\/em><\/p>\n<hr id=\"elk-e5fdec13-f65a-45fc-88fb-e3954297cedf\"\/>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/flaws-identified-in-the-b-21-configuration-chinese-scientists-claim-their-mysterious-padj-x-stealth-design-software-exposed-major-weaknesses-in-the-usafs-b-21-raider-programme-using-digital-twins-and-damning-files-in-the-mother-of-all-leaks-from-china-suggest-the-secret-code-has-already-cracked-the-bombers-aerodynamic-limits\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PADJ-X modeled B-21 geometry utilizing solely publicly obtainable imagery Simulation claims counsel a 15% enchancment in aerodynamic effectivity Leaked recordsdata present partial validation of radar&#8230;<\/p>\n","protected":false},"author":1,"featured_media":125495,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-125494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T19:39:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T19:40:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data\",\"datePublished\":\"2026-05-04T19:39:09+00:00\",\"dateModified\":\"2026-05-04T19:40:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/\"},\"wordCount\":586,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/\",\"name\":\"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg\",\"datePublished\":\"2026-05-04T19:39:09+00:00\",\"dateModified\":\"2026-05-04T19:40:24+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/04\\\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/","og_locale":"en_US","og_type":"article","og_title":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2026-05-04T19:39:09+00:00","article_modified_time":"2026-05-04T19:40:24+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data","datePublished":"2026-05-04T19:39:09+00:00","dateModified":"2026-05-04T19:40:24+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/"},"wordCount":586,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/","url":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/","name":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg","datePublished":"2026-05-04T19:39:09+00:00","dateModified":"2026-05-04T19:40:24+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/cndt23E3dLNtDMTiiTPTbM-1920-80.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/04\/china-claims-it-exposed-weaknesses-in-the-b-21-stealth-bomber-using-simulation-software-built-entirely-on-publicly-available-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"China claims it exposed weaknesses in the B-21 stealth bomber using simulation software built entirely on publicly available data"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/125494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=125494"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/125494\/revisions"}],"predecessor-version":[{"id":125496,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/125494\/revisions\/125496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/125495"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=125494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=125494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=125494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}