That WhatsApp devours my mobile memory is a thing of the past. These are the three habits I follow to avoid it

Running out of memory on our mobile is quite common and many times The culprit has a name: WhatsApp. With more than 3 billion usersis the undisputed queen of messaging apps. Everyone uses it, which means receiving hundreds of messages, photos, videos and audios through WhatsApp, making The size of the app increases exponentially over time. It’s happened to me too, but for years I’ve been able to keep it at bay by following these habits. Automatic download disabled If you haven’t done it already, it’s the first thing I recommend and you will only have to do it once (unless you change your mobile phone). The option is within WhatsApp in Settings – Storage and data – Automatic file download. By default, WhatsApp downloads all the photos they send us. For the rest of the files such as audio or videos, it only downloads them when we are connected to a WiFi network to save mobile data. The only ones that always download, whether you like it or not, are voice messages. If you want to control storage space, my advice is to change all options to ‘never’. This does not mean that you cannot see the photos they send you, you can do so but first you will have to download them. It’s adding one more step, but like this you can choose which ones you want to see and which ones you don’t. It is useful, for example, if you are in groups that send a lot of files, but you are not always interested in seeing them. WHATSAPP Tricks and tips to HIDE YOURSELF TO THE MAXIMUM and maintain your PRIVACY Delete multimedia content from time to time Even though automatic download is limited, I still download many of the photos and videos that my contacts send me, so the storage is increasing. Every so often I manually delete multimedia content that I have been receiving. WhatsApp has a very useful section to do this in Settings – Storage and data – Storage manager. I do two things here. The first is to access the section where the files that are larger than 5MBgenerally videos, and I delete those that I don’t want to keep. Here you will also see videos that you have sent yourself and that sometimes appear duplicates (this is because you have sent them to several different chats). When you have selected them, click on the trash icon (bottom right). The second thing is to go to the section ‘Storage details’, where you’ll see a list of all your chats ordered from the one that occupies the most size to the one that occupies the least. Entering one by one are all the files, also ordered from largest to smallest size, and I delete those that I am not interested in keeping. The storage you free up It will depend on how many files you are willing to delete. In my case, except for specific things, I don’t have much attachment to the content I share on WhatsApp and sometimes I delete everything at once. Review channels and groups that I no longer use Let them put us in WhatsApp groups for everything It is quite common. Personally, if I’m not interested or the group no longer makes sense (for example, if it was created for a specific event and has already expired), I leave and delete the entire chat. To leave a group you can do so from the chat list by holding down on it or, if you are in it, by clicking on the group name and choosing the ‘Leave Group’ option. You will see that two options appear, the one that interests us is ‘Exit and delete for me.’ Only then will the files and content that have been shared be deleted. With channels and communities I follow the same procedure. When it has stopped being useful to me for whatever reason, I quit. You can do this by entering the community you want to leave and clicking on the three dots icon in the upper right corner. Cover image | Gemini In Xataka | A viral message claims that “AIs can access group messages” on WhatsApp. It’s a manual hoax

how it works and how to avoid this scam to steal money by earning your trust

Let’s explain What is the Like Scama new type of online deception that already Police and Civil Guard have warned. It is a scam that is being given in instantaneous messaging applications such as Telegram and social networks, and that will lead you to steal money after earning your trust. We are going to start the article explaining the mechanics and the procedure of this deception with which thieves earn your trust before Timing you. Then we will give you A series of tips To avoid falling into the trap. How is this scam First, scammers are going to contact you through different platforms, from Telegram to social networks. There, they will propose to you perform simple online tasks in exchange for moneysomething apparently easy that will not take you long. These tasks are things like Give and receive likes on social networksfollow profiles, etc. In exchange for this, they promise you small economic amounts for your time. With this they will feed both your trust and your greed. The tempting of all this is that At first they may pay you In exchange for what you are doing, they will give you small amounts of money. That is when your trust will be gained. When they have already convinced that they can help you earn money with little effort, they will rise to “higher groups”, where they will propose make investments in exchange for a lot of money. When you make these investments, cybercounts will simply disappear keeping your money. In addition, they will also stop paying for any task. And what is worse, the personal data you have given them to make the first payments are also possible to use them to Open bank accounts in your name and get more money at your expense. In addition, there are times when they can ask for money in exchange for continuing with these methods of winning, money that will also take. How to avoid falling this scam The first thing you should always do is distrust any method to earn fast moneysince everyone is usually deception online. It is sweet to be able to win some euros with simple tasks such as giving likes in accounts, but it is also a very common deception. Besides, suspect you who are asking for money or perform major actions. It doesn’t matter if you have been paid something, they are still people who do not know, so if you easily ascend in their ranges to be able to do greater actions, you have to suspect. Another important thing is Never give bank or personal dataand if they ask you right away you must be alert. Finally, no one with good intentions will ask you for money to continue working, even if it is an alleged “bargain” job. You must also suspect est. In Xataka Basics | Scam of the false winner on Facebook: how this scam works when you participate in competitions and how to avoid it

How to load the mobile to avoid accidents according to firefighters in Madrid

Let’s tell you How to load your mobile safely To avoid accidents, According to the firefighters of Madrid. Loading your mobile is sure, but that does not mean that accidents do not happen, and those who come in these cases are firefighters, so it is logical that they have detected concrete behaviors that lead to them. That is why The Madrid Security and Emergency Agency has published a series of recommendations for minimize possibilities that misuse of batteries when loading your electronic devices lead to an accident. This applies to both mobiles and tablets and even electric scooters. In addition to these tips, remember that in Xataka Basics we have also taught you How to load your mobile fasterHow to do it maximizing your useful life with The 20/80 ruleeither How to do it when there is no electricity. You also have advice on How to load the mobile at night. Be careful with surfaces One of the first things to take into account when loading the mobile is Be careful with the surface the place where you put them to load. Avoid putting them in a place where they give them the direct light of the Sun, near some device with heat. Come on, nothing to leave them loading on the dashboard of the car in summer or next to a radiator when we are in winter. Neither do you let it carry it on a textile surfacesuch as the bed, a chair or the sofa, and neither close to an easily flammable material such as curtains or cushions. This would make that there is an accident everything accelerated and started to burn. In this aspect, the safest thing is Choose a smooth surface non -fuelone that allows easy ventilation to prevent overheat. In the case of patinetes or electric bikes, it is best to load them outdoors where the dispersion of flammable or toxic gases is facilitated in case of fire. Be careful with the charger you use It is true that technology is increasingly expensive, but using the cheapest charger you find can be dangerous. That is why it is recommended Always use approved loaders. Not only those of the manufacturer itself, but also those of brands with good reputation and that always have security homologation. Nor do you use old loaders who are already deteriorated, however approved they were. In addition, this is important, Disconnect the device when you finish loadingbecause that can lead to overheating. And if when you are going to disconnect the charger you see that it is burning or very hot, again, do not leave it on flammable surfaces or near them. It is also advisable to touch your mobile or device during the load from time to time. If you notice that it is overheating excessivelyyou will have to unplug him and wait for him to return to a normal temperature before starting the load again. This, again, will avoid scares and dislikes. Do not repair the mobile anywhere If something fails on your mobile, do not start opening it and try to repair it on your own. No matter the ability we have, we could always leave something wrong that leads to a bigger problem. That’s why, Repairs must make them a qualified professionalwhat also leaves out that neighbor little hands that makes you quickly. Fume detectors just in case Those who give these advice are firefighters, so it is logical that they also recommend Install smoke detectors in your home. Because sometimes the care you have does not matter, accidents can happen equally, and having a smoke detector can save your life. These devices can warn before a fire occurs, only with the initial smoke, and this It gives you time to act quickly. You can turn off the device or unplug it, and in the event that the fire will start you will have more time to warn of emergency services and evacuate your home.

The return has become the world showcase of the proportions. Madrid has a plan to avoid it: shielding

What happened? That The return to Spain 2025 promises to occupy an outstanding place in the Patria sports chronicle, even in the international, but for a reason that bit It has nothing to do with bikes. The competition par excellence of Spanish cycling has been marked by protests against Gaza’s genocide, which have found an unpayable showcase for their message in the tournament. Why’s that? Simple. Three elements that have caused an explosive mixture coincide. The first is Gaza’s genocide and the deep rejection that is generating in the societies of several countries, including Spain. The second element is the very nature of cycling competitions, which have been used for years Slave shop windows difficult to control. After all, the return is divided into 21 stages that cover More than 3,000 kilometers. The third element is the participation of Israel-Premier Techa Uciproteam team that has become an involuntary protagonist of the appointment. Click on the image to go to Tweet. Why is it controversial? Being linked to Israel and being in the hands of Sylvan Adams, a Canadian-Israeli magnate linked to the real estate sector, who has reached define as “self -proclaimed ambassador to the state of Israel” and It does not hide His tuning with Benjamin Netanyahu. His participation in the Vuelta has marked the edition almost From the beginning and has placed his cyclists in the eye of the hurricane. The best test was left a few days ago by the technical director of La Vuelta, Kiko García, who slid that I only saw “a solution” to the problems with which the return is being found: “that the team assumes that being does not facilitate the safety of all others.” Those responsible for Israel-Primer Tech always They have made clear that this possibility is not on the table because “a dangerous precedent would sit”, but They accepted eliminating The mention of ‘Israel’ of his jersey. The measure, loaded with symbolism, does not seem to have been enough. How serious is the problem? Yes. A week ago the organization of the Vuelta was found with such deployment of protesters as it passed through Bilbao that he chose to end the stage Three kilometers before of the planned end point. And it has not been the only occasion when he has been forced to make a similar decision. In Galicia the organization also decided to advance Eight kilometers The goal. Cyclists have encountered banners, screams, protesters throwing themselves on the road, Blacks or even A tree In the middle of the road. A cyclist from Movistar, Javier Romo, He ended up retiring of the tournament for the injuries he suffered after a fall. The reason? A protester broke into the road and caused him to be protruding and lost his balance. Cyclists have decided to continue competing, but also They warn that will be planted if they consider that they are in danger. “In the previous stage, they launched bottles and even clicks and nails in the neutralized. Before those things, the squad is afraid,” I recognized Recently a team director The country. From the Staff They also regret that the 2025 Vuelta has left shocking images like “chinches on the face of a cyclist.” What will happen in Madrid? The big question. The last two days will be held this weekend with the Community of Madrid as Main scenario: On Saturday there will be a mountain stage between World ball and Robledo de Chavela And on Sunday it will be culminated between ALALPARD and the center of the capital. The authorities want to avoid at all costs that the protests cloud the most symbolic (and media) day of the return and have decided shield Madrid to achieve it. The Government Delegation Recognize That citizens have a “legitimate right” to demonstrate, but also insist that “peaceful” must be exercised. In any case, the administrations have preferred to work in health and deploy hundreds of police and civil guards, with an operation that reminds of draft appointments, such as The NATO Summit in Madrid. From the City Council they have also reinforced security and They call “To responsibility.” The right of the people to demonstrate is not questioned, but they want to avoid scenarios such as those who lived in the Basque Country or Galicia. “It works to compatible the development of the sports test, with the legitimate right of demonstration of those citizens who decide,” Underline Francisco Martín Aguirre, the Government delegate in the Community of Madrid. How many agents will there be? Many. The Government Delegation in Madrid speaks of 1,100 National Police agents and 400 of the Civil Guard, effective who “will join the usual ones of the return device.” The City Council has also announced a reinforced deployment, with a thousand troopssum of local police (800), mobility agents (100) and Samur (100). The objective: shield The gold brooch for a cycling return that, beyond sports achievements, will be marked for subsequentness by protests. Images | Madrid Emergency Vehicle (Flickr) In Xataka | Cycling has always been used as a huge vindictive showcase. And that is now going back to the return

China has found the formula to avoid reciprocal tariffs with the US: “dropshipping” of semiconductors

After one tense climbing in the commercial war between China and the United Stateslast April China announced that it matched Washington imposing 125% tariffs to imports of American products, which of course includes semiconductors. Made the law, made the trap. China has the key to preventing their own tariffs from harming them. The country of origin. It is the key point to prevent their own tariffs from harming them. On April 11, the Chinese Semiconductor Industry Association (CSIA) He published a notice in which the rules to determine the country of origin of semiconductor products were established. According to its norms, the country of origin is determined by the plant in which the wafer has been manufactured and not the country in which they have been designed or where the final packaging has been made. Thus they avoid known as effect Boomerang. The effect Boomerang. It occurs when a tariff designed to punish another country, in this case the United States, ends up harming the economy of the country that imposes it. In response to tariffs imposed by Trump, China matched tariffs at 125%. Although this measure can harm US companies who want to sell their products in China, in the semiconductor sector it is especially delicate since the American chip dependence harms many Chinese companies. Changing the “passport”. This is how some companies manage to escape the Chinese tariff; When importing an AMD chip, an American company, it is not considered an American product but Taiwanés, because it has been manufactured in Taiwan. It is not usual. In fact, for some market analysts It was a surprise Since the country of origin is usually associated with where the product is packaged, not where the factory is located. Why is it important. China is demonstrating that the origin of a product or its “nationality” is not something written in stone, but is something much more fluid and is open to interpretations. This not only affects chips, applies to the entire world supply chain. In July the White House issued a Executive order which established a penalty of 40% for products whose origin has been modified (transsshipping) to avoid tariffs. With this order, the United States is taking measures for the products that arrive, but not for those who come out, although it is very likely that they adapt the legislation in the future. A calculated movement. The movement reminds of the Dropshippingin the sense that the mark of the physical origin is separated from the product, although the objective is different. According to Michael Schulmanresponsible for investments in Running Point Capital, it is “a calculated movement to maintain economic stability and promote foreign investment in local manufacturing.” The affected companies. AMD, Qualcomm or Nvidia outsourcing the manufacture of some of their chips to the TSMC plant in Taiwanso they can dodge the tariff that China imposed as retaliation. On the other hand, others such as Texas Instruments or Intel cannot dodge it because they have their Factories in the United States. Image | Gary Lerude, Stas Knop In Xataka | An industry in the hands of TSMC and Asian factories: the world production map

Avoid “Time Traps”

Often during the working day there is a risk of falling into certain habits and situations that make the workday extends more than planned for not completing the planned tasks. Most of these “time traps” arise from everyday behaviors that They wear the concentration And they are stealing a few precious minutes that accumulate at the end of the day, affecting both productivity and personal well -being. Understand what these practices are and how they influence Time management It is key to preventing the day from eligging unnecessarily and recovering control over working hours. 1. Informal conversations that continue One of the most common reasons to stay until later at work are the improvised talks in the coffee machine that becomes long conversations. According to He counted to Fast Company Kiki Ramsey, CEO of POSITIVE PSYCHOLOGY COACHING AND DIVERSITY INSTITUTE“Quick coffee conversations can easily become 30 -minute talks” The expert explains that, to avoid This type of interruptionit is advisable to program these interactions as conscious breaks. That is, stay with that person with whom you want to comment on something to pause coffee or planned lunch. In this way, it is avoided that they interfere with the concentration and labor agenda. In this way, the social component between colleagues is maintained, which contributes to the good work environment, without interfering with their own productivity or that of the rest of the classmates. 2. Look at an email and finish watching kittens videos Another frequent trap is in the pauses, initially short, which are transformed into long periods of distraction. In this sense, the Unlimited mobile use It is one of the main culprits of the loss of time during the working day. Ramsey advises to establish a timer or an alarm To control these breaks and make sure they are brief. Apps are designed to catch your attention, so it is not strange to take the mobile to consult an email and spend an hour watching videos of kittens. Maintaining control over these moments is essential not to fall into the voluntary overextension of working hours. 3. Attend personal issues during working hours Telework has blurred Classic scheduleswhich can make personal issues attend during the working day. This includes calls, efforts or any other procedure that diverts work attention. Although it seems harmless, Ramsey points out that this type of distractions affects the concentration and extends the day more than necessary. “Although the boundaries between the labor and the personal have blurred, the calls or personalrs can reduce concentration and productivity,” said the expert. The recommendation in these cases is to reserve specific blocks on the weekly agenda to address these issues, or attend them before or after the working day. This will help maintain the concentration and quality of work, preventing personal interruptions from ending up making it come out later. 4. The importance of saying “no” Accepting tasks or responsibilities can alter your own priorities and extend the work schedule. Ramsey advises reject with kindness those tasks that do not correspond to the assigned responsibilities, and redirect them to the right person. If that is not possible, include that task in the day planning Next to avoid interfering with your goals. The lack of capacity to put clear limits generates an overload that causes more time to cover everything. This ability to say “no” is one of the greatest Learning Millionaires like Elon Musk or Warren Buffet. This Difficulty saying “no” It is an important cause of the unplanned extension of the work day, since it forces to add extra activities to the routine without having planned time for them, which lengthens the day without providing real value to your own work. 5. Unnecessary micrognition A factor that consumes a lot of time is excessive surveillance or micrognition of what your classmates do. “Supervising too much the tasks of others is a loss of time and generates unnecessary stress, both for you and for them,” says Ramsey. Instead, try to trust the processes, it offers support for colleagues with less experience only when necessary. Focusing attention on your own tasks improves general efficiency and prevents the extension of the schedule. In addition, this type of management not only delays the progress of your tasks, but can double the workload and create an atmosphere of distrust which makes more hours be invested than necessary. Strategies to avoid these traps and recover your time To avoid falling into these “time traps”, the productivity expert recommends planning in advance the Tasks of the week. At least the most important. “Take time on Sunday to plan your week. It doesn’t have to be sophisticated. It can simply be a rapid review of your prioritiesprojects and objectives for the week. Thus, when I arrive on Monday, you will be ready to start, instead of spending part on Monday morning thinking about what to do first, “says Ramsey. This technique opens a way for better time management, as it allows you to address the tasks in an orderly manner and avoid distractions caused by improvisation, stress or ultimate urgency. The urgent and the important thing do not always go hand in hand, but the first tends to eclipse the second hindering the progress of weekly objectives. Joe Galvin, research director of Vistagean advisory consultancy for managers ensures that Align circadian cycles With the tasks that require greater concentration it is also a way of accelerating the execution of tasks. “Some employees are more alert in the early morning, while others reflect better in the afternoon,” Galvin explains. The ideal is to reserve the complex and strategic tasks for these energy peaks, and leave for other moments the small personal efforts or those tasks that require less concentration. Identify when you are more concentrated or at what time of the day You are more prone to procrastineit also contributes to being more efficient when addressing daily tasks and finishing them in the assigned time. In Xataka | The return to the office has … Read more

that students use it to avoid being caught and teachers to catch

Grammarly is a program and browser extension which has been helping us correctly since 2009: ten years before Google Integrate Writing suggestions in Gmail or that generative artificial intelligence will change everything in natural language with chatgpt. And what if it changed, so much that Grammarly has launched An application to improve texts that integrates nine agents. Back to the origins. Grammarly’s new tools are focused on using artificial intelligence for students and teachers to improve in their work: some can write better texts and others can detect plagiarism scanning “databases, academic articles, websites and published works.” In that sense, there is an agent that gives a numerical score that reflects the probability that the text is generated by AI or written by a human. Something striking of the announcement is that the founders of the company, before launching Grammarly, They undertook creating My Dropbox In 2002 (not confusing with Dropbox) with a nature that now recovers: as a plagiarism detector. Why it is important. Grammarly’s movement is relevant because it shows the recent impact of artificial intelligence even in companies that already had a lot of agricultural help component. Now they have to adapt because any great language model can bury them, such as It also happens with Duolingo. But, above all, it is interesting by how it exemplifies the moment that education lives with the boom of chatgpt: in conflict between students that They use artificial intelligence to do essays and other jobs looking not to be detected … And teachers looking for all means that do not “sneak” plagiarized and elaborated with AI, for which they will use an artificial intelligence agent that will also help them correct jobs. Luckily, there are universities that already They are implementing it in class. An agent who makes Stalking To teachers. The thing does not end there: the agent who helps to rewrite texts too Improve the process with the bibliography And deepen something that obsesses students: predict the note. The most impressive thing about Grammarly’s promise is how they claim that he does it: investigate on the Internet about which teacher the subject teaches to try to know his tastes and evaluation priorities, and help the result to approach as much as possible to what he will please. With giving him the name of the professor, subject and the university, the Grammarly agent promises to predict what note we will take out. The great challenge. As a way to differentiate, Grammarly’s proposal is ambitious, because until now there is no detector for the use of artificial intelligence that has been widely accepted as effective. According to A studydetectors we have detected less than 40% of the content generated by modified artificial intelligence to avoid being detected, and are even more imprecise (17.4%) when they have to analyze manipulated content. Some great American universities They do not support the use of detectorsbecause They do not work. For its part, OpenAi launched A tool to detect plagiarismand then He withdrew it silently. Although according to leaks now they have a tool that works, They do not throw it. If Grammarly manages to become the era of artificial intelligence in what Turnitin It has been in traditional plagiarism, it can become an actor who plays a great role in the market. Tensions. That detectors do not work is generating problems, and not only teachers, because work generated by artificial intelligence is sorry as if they were more handmade. Students are suffering from be falsely accused of lyingwith fatal consequences as suspensions in subjects. But in the background there is a reality: students cheating artificial intelligence for artificial intelligence detectors. To a future generated, summarized and read by the. Two years ago, with the launch of GPT-4 still fresh, Javier Lacort, Xataka editor, He drew a future that today sounds even in present: a reality full of emails written by artificial intelligence, in which we summarize those same emails with artificial intelligence, and in which we respond with the same tools. The most comic scenario: that “we turn to AI by postureo, to artificially lengthened emails that the receiver will not read, because that same will be in charge of summarizing it.” Today, integration into Gmail, WhatsApp, social networks and other day -to -day places already makes that future very present. Image | Annie Spratt in Unspash and generated with AI In Xataka | Goal has realized that right now it doesn’t matter to have the best AI. Just have one with the one to have you hooked on the screen

27 kilometers under the sea to avoid fjords

Norway has underway A series of megaconstructions that aim to beat numerous records. It is not for less, because it is a country with a very particular geography in which certain types of infrastructure are necessary to opt for certain comforts. One of the most surprising is undoubtedly Rogfast, a four -lane submarine tunnel that will connect the districts of Randaberg and Bokn through 27 kilometers under the sea. This megaobra promises to revolutionize transport on the Norway west coast and drastically reduce travel times on one of the most traveled routes in the country. Fjords don’t make it easy. The E39 coastal road, which travels 1,100 kilometers from Trondheim to Kristiansand, is interrupted seven times by fjords that force Ferris. This turns a direct journey into a 21 -hour odyssey. Rogfast will eliminate one of these interruptions and will cut 11 hours of the total tripbenefiting millions of people who move to the cities of Stavanger and Bergen. Record figures. The tunnel will reach a maximum depth of 400 meters below sea level and extended 27 kilometers, officially becoming The longest road submarine tunnel in the world. It will surpass the current record, the Norwegian Lærdal tunnel of 24.5 kilometers, which crosses mountains but does not go under the sea. Turning Rogfast will take approximately 35 minutes and will have an underground roundabout at 250 meters deep to give access to Kvitsøy island. Image: Telegraph A technical and economical challenge. The works began in 2018 with an initial budget of about 1,838 million euros, although experts estimate that the total cost of modernizing the entire E39 could reach more than 40,000 million euros. The Norwegian government will finance 40% of the projectwhile the rest will recover through a toll of about 34 euros per use. The construction suffered several delays, especially during the pandemic, but maintains its scheduled completion date for 2033. Beyond travel cutting. Engineers have designed a special artistic project to combat monotony and anxiety that a tunnel can cause so extensive. The system promises to include dynamic lighting and decorative elements that will create a sensation of orientation and make the underground path more bearable. The idea is that drivers perceive travel time as shorter than it really is. Goodbye Ferris. Rogfast is part of a larger plan to completely eliminate the Ferris of the E39 and connect the entire Norway west coast with fixed infrastructure. Some sections will require “floating” tunnels anchored to the seabed due to the excessive depth of certain fjords. If the project is successful, Norway will have shown that it is possible to create a completely terrestrial coastal highway in one of the most challenging geographic territories in the world. Cover image | Implane In Xataka | The world’s largest hotel is not in Las Vegas or Dubai. It is in Malaysia and has 7,351 rooms

How it works and how to avoid this method to steal mobiles in summer

Summer arrives, and with the new baking of methods that criminals use to steal. In this case Let’s explain the trap of the false tourist and google mapsa type of thymus that is being seen in cities like Benidorm, and for which it is convenient to be prevented. We are going to start the article explaining the mechanics and the procedure of this deception with which thieves can try to steal your mobile phone. Then we will give you A series of tips To prevent this robbery and to avoid that if they manage to steal your mobile, you can make many misdeeds. How this scam The way of proceeding of thieves is so simple that it is difficult not to fall into the trap. To begin with, a stranger for the street getting through a disoriented tourist That is looking for your hotel. Here, it is normal for us to stop helping. This supposed tourist Ask you to look for your hotel on Google Maps in order to know how to get to him. Then you take out the mobile, unlock it and start looking on Google Maps. That is, just when you unlock the mobile the thief takes ittake it from the hands of a pull and run with the device. The biggest problem of this trick is that The thief takes your mobile already unlockedso you can access your photos, your conversations at WhatsApp or your documents. You can access sensitive information and even impersonate you in WhatsApp chats to ask for things or money from your acquaintances. How to avoid falling into the trap Unfortunately, these types of traps and tricks to steal mobile They are difficult to detectsince they play with our mood to encourage others. The most important thing is be aware that you don’t know the other person and take a series of precautions. The first thing is try verbally Any unknown person instead of quickly getting the mobile. And if there is no choice but to do it, then have well subject the device While you proceed. Pay attention to the movements of the other person, and always try to have two hands on him and have him grabbed hard. Do not trust yourself. There are also A series of precautions to take when you are travelingsince in a tourist city there are more possibilities that there are attempts to rob. For example, Activate additional block for sensitive appsputting an extra layer as a trace block, recognition or even Pin to apps such as the bank, your photos or whatsapp and social networks. Come on, in addition to screen blocking, you activate a specific blockade for apps, something you can do on both Android and iOS. It can be annoying when using them daily, but will save your data if someone steals your mobile already unlocked. Have active mobile location systems to know where you are stealing, and try the mechanisms to block it remote or turn it off so that thieves cannot use it. For this, access from another device will be needed, so you have the family systems configured to be able to block it from the mobile of a spouse or family. In Xataka Basics | Broken rearview scam: how it works and how to avoid the scam in which they hit your car and leave you a note to cheat and steal

In 2023 someone hacked the GPS signal of 20 planes. The European alternative Galileo already offers an option to avoid it

A pilot Fly on the Baltic Sea When, suddenly, all his navigation systems told him that he was tens of kilometers of his real position, drawing ghost circles on Russian territory. Weeks before, in the Middle East, More than 20 crews They had reported a “total navigation failure”, forcing aerial drivers to guide them blind. They were not technical problems. They were deliberate attacks on GPS systems, known as spoofing or signal supplantation. In this type of attack, a powerful transmitter on land emits false signals that mimic the satellites, cheating the plane to calculate an erroneous position and route. Already in 2012, a team from the University of Texas showed that it was possible Take control of a civil drone through Spoofing. In 2017 there were the first cases with ships passing through the black sea. Today the Baltic and the Persian Gulf are black points where maritime operators and airlines routinely report similar incidents. Europe’s response is already here. Until now, the aviation sector has avoided a catastrophe thanks to redundant systems and the expertise of the pilots. But The threat is real, it is growing And you need a robust technological solution. Therefore, the Galileo constellation, the European GPS, has just officially activated its Osnma service: An additional security layer that hinders this type of deception without degrading the performance or precision of positioning. How Osnma works. The Open Service Navigation Message Authentication (OSNMA) is a kind of digital authenticity seal available for free For Galileo users. In essence, it is a cryptographic protocol that introduces authentication data into the signaling system itself. Specifically, in the I/NAV message of the E1-B signal; An already reserved space, hence it does not affect service performance. The process to have a compatible receiver is to obtain the cryptographic public key from the GNSS European Services Center. Upon receiving the signal, the receiver uses that key to verify the “digital signature” of the message. If the firm is false or does not exist, the receiver knows that he is being a victim of a hoax and can alert the pilot or the autonomous system. Prevents the Spoofingnot the Jamming. Osnma makes supplanting a Galileo signal exponentially more difficult. However, it does not prevent the Jammingthat is, someone interfere with the signal through a brute force attack That the receptors saturate. It is good news equally: it is no longer enough to issue a false signal; The cryptographic firm in real time, an immense computational feat should also be falsified. OSNMA will not only serve to Increase security in air and sea traffic management. It will also be key to the future of autonomous cars, smart tacographers and road use systems. Even for sectors such as telecommunications, energy and finance, which depend on an ultra -precise time signal to synchronize their operations. Image | ESA, Euspa In Xataka | The GPS has become the Achilles heel of modern aviation. And engineering already has its sustained ready

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.