What is it, how does it work and how safe is this application to install OpenClaw on your mobile with just a couple of clicks

Let’s explain to you What is QuickClaw and how does it work?an application created by developer Max Blade to install OpenClaw easily on your mobile. Thus, you can have this popular AI agent without having to deal with APIs, servers and long configuration processes. The application does all this in a completely private way, and creating the agent within a virtual machine for your greater security. You just have to go to their website quickclaw.appclick on the download that is currently exclusive for iOS, and install everything with a single touch. What is QuickClaw QuickClaw is a mobile application that allows you to use OpenClaw easily on your mobile. Install OpenClaw It is a fairly complex process that can put many people off, and what this does is allow you to install it with a single click and without the need for complications or technical knowledge. Thus, you can have your own agent artificial intelligence on your mobile. This means that you will have an AI that does not limit itself to responding to what you ask or perform simple tasks, but can take control of your applications and perform tasks in multiple steps. All of this is done relatively safely. I say relatively because it will use an isolated workspace within your mobile, although the application will also needs access to a lot of your data to function, which may compromise your privacy. In exchange for this, you will have an application that will be able perform various types of tasks for yousuch as creating or editing files, browsing the Internet and taking actions there, managing your calendars, managing your reminders and more. How QuickClaw works The first thing you have to do is install the QuickClaw application, which at the moment It is only available for iOS in the App Store from Apple. When you install the app, you just have to launch it and An OpenClaw instance will be created and launched on a virtual machine “safe”, so as not to touch your device or its operating system. All this in just one minute. The process will then create a Gateway or user service that remains running, in addition to other components that allow OpenClaw to control applications, send messages and execute actions. All this will be done automatically with the recommended OpenClaw installer. This application is configured so that OpenClaw connect to Claude’s AIwho will be in charge of understanding your requests and carrying out the tasks you ask of her. All of this will be designed to be able to control the agent from your mobile using the app itself. What you can do with this app These are some of the tasks you will be able to perform from your mobile just by asking OpenClaw through QuickClaw: Write documents, essays and code, which are delivered as real files. Browse the web and research topics on your behalf. Set reminders and wake-up calls with personalized summaries. Read and manage your calendar and emails. Create, edit and organize files in your private workspace. Execute multi-step tasks autonomously. Remember the context of the conversations. How secure and private is the app One of the features of QuickClaw is to isolate OpenClaw in a virtual machine. This is an important security measureso that nothing the AI ​​agent does can damage the operating system of your mobile device. OpenClaw is an open source agent, which makes it transparent and secure, people can check that it doesn’t do more than what it says it does. However, QuickClaw is not open sourceso you have to trust the word of its creator. Lastly, you should know that everything you make is sent to Anthropicthe company behind Claude. Currently this company is known for its commitment to offering ethical AI, although this can always change in the future. Your data within QuickClaw will be encrypted and anonymous. In addition, your conversations stay within your mobile, since everything runs locally. In Xataka Basics | Dangers of OpenClaw (formerly Moltbot or Clawdbot) and how to protect yourself from them before deciding to use it

How to create a Christmas sugar cookie image with your pet’s photo in a couple of clicks with ChatGPT

We are going to explain to you step by step how to create a Christmas sugar cookie image with your pet’s photo wearing ChatGPT Imagesthe section to create images from photographs of ChatGPT. This tool will allow you to do the editing with artificial intelligence without having to write a prompt certain. Therefore, the best thing about all this is that these images are very easy to makeand you only need a couple of clicks to get them. Furthermore, since when the photo is generated you will also be shown the prompt generated by ChatGPT itself, you can copy and paste it into another AI or make any modifications you want. Make sugar cookies from your pets The first thing you have to do is enter the ChatGPT website or application on your device. Here in the side menu Click on the section Images that will appear just below the search options. Once you enter the section Imagesnow you have to look in the row where it says Test a style on an image. Here, search and click on the option sugar cookie that appears with the drawing of a dog biscuit. This will open a window where you have to choose the photo of your pet that you want to use as a reference. For this, you can use one of the recent ones that you have used in this section, or manually choose another one that you want to use. And that’s it. Just by doing this, ChatGPT will create the sugar cookie image with the photo of the pet that you have uploaded. If you are not satisfied, you can try again or copy and paste the prompt with another photo. You can also edit and modify the prompt so that the result is different. In Xataka Basics | How to create a character in ChatGPT and Gemini to use it in all the images you make with artificial intelligence

Google’s summaries are reducing clicks to half. And that only points in one address: the collapse

There is a runrún that runs through digital media writings around the world. The editors look at their traffic metrics with a face of concern while they see how Google, which has been being mainly mainly to attract readers between SEO and Discover, has now become its greatest rival. And now, A PEW Research Center study It puts figures to what many already intuited: Google’s summaries are sweeping with a good part of the web traffic. In addition, it is not a recoverable traffic, it is traffic that will never return. Why is it important. We are facing the balance that has been holding the Internet for decades. Google sent traffic to the websites … … that, in return, created content that fed the search engine. It was a symbiotic ecosystem: the search engine made sense by the websites, the websites received traffic from the search engine. Now only Google wins. When the Ai overViews26% of users directly leave their search session, compared to 16% in traditional searches. The AI becomes the final destination, not to the starting point. The result will be paradoxical: Many digital media and independent websites will close due to lack of traffic. That will leave Google with less content for Your AI summaries and to train future models. The golden egg chicken, dead to pecks. In figures. The numbers are devastating. Only 8% of searches with the summary of AI generate clicks to web pages, compared to 15% when Google shows only traditional results. And just 1% of users click on the sources cited within the AI summary itself. The study tracked the online activity of 900 American adults during March 2025. More than half (58%) ran into a search that produced an automatically generated summary. The context. The Ai overViews They appear in one in five Google searches. Long consultations, formulated as questions or written in complete phrases are more likely to activate these automatic summaries. The sources that most quote the AI remain the usual: Wikipedia, YouTube and Reddit concentrate 15% of all appointments. Between the lines. Google faces an inevitable strategic dilemma. If it does not evolve towards smarter experiences, it runs the risk of losing relevance against PerplexityChatgpt and other competitors that give direct answers. But this evolution generates a paradox: the company feeds on the content that others create, while its tools of eliminating economic incentives to continue creating that content. Web editors report traffic falls from 15% to 35% since these summaries were generalized. So far there was a balance, but it is increasingly broken. The big question. How will the web content creation ecosystem support when traditional incentives disappear? The summaries of AI need updated information to work, but are eroding the business models that make that creation possible. Corrective measures are already beginning to appear: OpenAI has signed license agreements with various mediaand Google is valuing similar formulas. But the consequences of the problem come much faster than these solutions. A foreseeable scenario: formulas will end up balance the balance. But they cannot prevent the ecosystem from being reduced, with means closing or reducing their templates. It is the market, friend. Yes, but. Google doesn’t see it that way And ensures that AI Overviews “help understand complex topics faster” and continue “directing billions of daily clicks.” He has described PEW’s study as “methodologically defective.” However, the trend is unanimously perceived in the industry. Google is completing its transformation: to be the great web traffic distributor to become the final destination where the information is consumed without ever leaving its domains. It is the logical evolution of a search engine in 2025, but also the end of an era for the web ecosystem as we knew it. In Xataka | Google continues to redesign its search engine with AI. Your new function speaks by phone with business in your name Outstanding image | Xataka, Mockuuups Studio

We have clicks on ‘Cancel Subscription’ in Correos without thinking. It is just what many cybercriminals expect

The entrance tray of our email usually becomes chaos. Or, at least, in a digital landfill where messages that we have not asked or want. The reasons are simple: in almost any online procedure, however innocent it may seem, they ask us for a Mail address. From registering on the website of your electric company to connect to the free wifi of a cafeteria, the email always goes ahead. Then there comes a time when we decided to put some order in this personal space. One of the most obvious ways to start is to stop receiving emails that do not interest us. And for this, the most logical step is usually clicking on that link that some messages include at the end. It can appear as “cancel subscription”, “if you want to discharge, click here” or the classic “Unsubscribe”. The promise is clear: pulses and that sender disappears. That click to stop receiving spam can take us just where we didn’t want to enter The problem is that, although this function is legitimate, it can also be used for malicious purposes. According to DNSFilterthere are hundreds of cancellation links that actually lead to sites potentially dangerous. And that turns a harmless gesture – whispering an annoying email – into an entrance door for much more serious problems. A real example of the ‘Cancel Subscription’ button that appears in many mails. In this case it is presented as ‘discharge’ When we click to cancel a subscription we are leaving the controlled environment of our mail supplier. It takes us to an external website, and there begins the risk. The link may not have us to lower us, but to confirm that our address is active. Like those calls that hang instantly: If you answer, you know you exist. Something similar happens here, but by email. With that simple verification, who is behind can bombard us with more advertising to launch attacks on Phishing or more elaborate scam attempts. And that’s not all. There are other even more dangerous possibilities. Some malicious links can try to inject malware In our system. It is technically complex, yes, but not impossible. It is also frequent that they redirect us to pages that mimic legitimate services. There, we can end up introducing our credentials or sharing personal data under a false promise of cancellation. At this point, the doubt is inevitable: and then what do we do? Do we resign ourselves to a saturated input tray of trash emails? The answer is no. There are alternatives that allow to maintain control without assuming so many risks. The first step, as we have already mentioned, is to be aware of danger. Understanding it allows us to act with head. Let’s look at some others. Use the integrated function of cancel subscription. Some mail services, such as ICloud, Gmail or Yahoo, incorporate this option directly into their interface. It is a safer alternative than clicking on the message links. They usually appear at the top or lower part of the mail, and are part of the supplier’s environment, not the sender. Gmail (above), Mail of iOS (center) and Yahoo Mail (below) include integrated buttons to cancel subscriptions from the app itself, without the need to open links inside the mail Mark the message as spam. Another option is to point out the mail as unwanted. The effect is immediate: the message disappears from the entrance tray and the system learns to block future similar emails. But be careful, it is convenient to use this tool only when we are clear that it is spam. Otherwise, we would be training badly to the system. Use disposable email addresses. It is a very useful third way, which we analyze in depth in the article ‘How I learned to use several email addresses to keep all my protected digital accounts’. Logic is simple: if the problem is to share our real direction, the most effective thing is to avoid doing so. And for that there are tools such as the “hide my email” function of Apple. The option ‘Log in with Apple’ allows you to hide your real email and use a random address that you can delete at any time from ICLOUD Those who use apple brand devices can activate this function by registering in a service. The system generates a random direction that forwards the emails to the main account. If you start receiving annoying messages, you just have to check which of those temporary addresses are coming and eliminating it. It is worth remembering that this function is free, but those who have Icloud+ They can create new ones addresses at any timenot only during the registration process. This gives even more margin to protect privacy and improve security. All this adds to the classical recommendations: maintain updated software and have a protection tool against malware. They are not absolute guarantees, but security layers that make a difference. No, we will not be 100% safe. No system is. But we can be informed and take some measures to avoid falling into the traps that cybercounts have. Images | Mariia Shalabaieva | DC Studio In Xataka | New drug traffickers do not need boats or borders. The major in Europe directed its empire from a Barcelona floor In Xataka | Password managers: which are the best to protect and remember all you have

Three methods to do it with few clicks

Let’s tell you three methods to release space in Windows 11 with few clicksso that you can delete a lot of leftover files. In the end, just using the computer you end up accumulating various types of temporary files that are useless, but occupy space. In Xataka Basics we have already told you How to clean Windows in depthbut now we are going to focus on faster methods. Thus, if you do not have time for thorough cleaning, you will be able to perform a quick eliminating a lot of leftover files and accumulated garbage. Access temporary files One of the fastest methods is to open the Windows start menu and write Execute. When you do, In the written dialog box %TMP% and click on Accept. This will open the file explorer in the folder where all the temporary files that you have compiled since the last time you clean. Once you are in this folder, you just have to select and delete all files temporal. Before doing, be sure to have all closed programs and applications to avoid problems. And do not worry, because in the case of erasing something that a program needs, the temporary file will be lowered. Use storage settings Another option is to resort to the tool designed by Windows for this task. To do so, enter the Windows configuration, click on Systemand then Storage. In it, you can see immediately The space you are using on your hard drivesalso indicating what things are going to you. Here inside, now you have to click on the section Temporary filesto access all of them with this method. Windows will take a few minutes to analyze and load the files. When finished, click on Remove filesand all the storms and the paper saving space will be erased. Use the storage sensor And the last option is activate and configure the Storage sensor of Windows. It is an internal program that is automatically and periodically erase the temporary files, the duplicates or those that have not used time, and thus save space. To access this option, go to the Windows configuration, click on Systemand enter the section of Storage. Here inside now Activate the option of Storage sensor. This will leave this program active to analyze your hard drive and clean it with garbage files every little time. When you do, you will also be able click on Storage sensor To enter your configuration. This will allow you to choose how it works, being able to delete the temporary files of applications you do not use, choosing every day how many days the content of the recycling folder is eliminated, or even automatically erasing the content of the folder every day Downloads. You can also choose when to execute this sensor, being able to make it only be done when it starts to take some space on your hard drive. In addition, you can configure how to act with the files that are lowered and are also synchronized in the cloud. And you don’t have to do anything else. You can click on Clean now To execute the storage sensor or leave it activated to act on your own when you see it necessary as you have configured. In Xataka Basics | How to clean Windows 11 thoroughly: Delete what you don’t need safely and effectively

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.