We have been creating whale bones to tools for a long time. Before even learning to hunt them

For centuries, whale hunting was a weight sector in the coastal areas of the Gulf of Bizkaia. Everything took advantage of this animal, or almost everything: the meat served as food and fat served as oil to enliven the flames of the lamps before electricity and oil. His bones have also been A valuable resource Throughout history. Now we know that also during prehistory. Prehistoric tools. A group of researchers, including scientists from the Institute of Environmental Science and Technology of the Autonomous University of Barcelona, He has discovered Tools made of whale bone. The analysis of De Ha throws an estimated age of between 19,000 and 20,000 years. The 83 tools were found In various deposits Distributed by the coast of the Gulf of Bizkaia, including the Cantabrian coast and points in southern France. To these tools you have to add another 90 unrelated bones found in the Cave of Santa Catalina, Located in the Biscay town of Lekeitio. The bone remains would have belonged to specimens of at least five different species, including species such as the sperm whale, the common whale and the blue whale that can still be found in the waters of the Gulf and the gray whale, already disappeared from that environment with a more restricted habitat to areas of the northern Pacific and the Arctic Oceans, explains the team Investigating what and when. For the identification of the species and dating the tools, the equipment resorted to the mass spectrometry techniques and radiocarbon dating. Thus they managed to find the origin of the tools in the five species mentioned above. It was also like the team determined that it was, In words of the Jean-Marc Pétillon group “some of the oldest known evidences of human use of whale remains as tools.” “Zooms is a very powerful technique to investigate the past diversity of marine mammals, especially when there are missing diagnostic morphometric elements in bone remains and objects, something common in artifacts made of bones,” explained in a press release Krista McGrath, co -author of the study. Chemical analysis. The study also involved a chemical analysis of the sample. Thanks to this, the team was able to find out data on the eating habits of the whales, which “differed slightly from those of their modern counterparts.” This implies possible changes in the behavior of cetaceans, or in the marine ecosystem itself. The details of the study were published In an article In the magazine Nature Communications. 20,000 years hunting whales? The conclusion that the human being has 20 millennia hunting whales is tempting, but the team responsible for the study considers it “extremely unlikely.” The most likely hypothesis is that the Pleistocene hunters would have taken advantage of the arrival of stranded whales to the coast to obtain their bones and manufacture from them “It is extremely unlikely that these species would have been accessible to the hunters collecting European pelistocene in another way that were not through passive acquisition methods, such as the opportunistic acquisition of stranded whales or the arrival on the coast of corpses,” says the article. “There is no evidence (…) that the collection hunters of the European Pleistocene had the necessary technologies to hunt these species, such as navigation (…).” Change of sea level. Study coastal life in glacial ages since the present coastline is relatively Far from the coastline typical of the last glaciation, although the extension of the lands flooded after the end of the last glacial era differs between area and area. Within the Gulf of Bizkaia, for example, we can appreciate a greater area flooded on the French coast and therefore a greater decline of the coastal line in contrast to the Cantabrian coast. In any case, the coastal recession implies the loss of valuable coastal deposits now flooded by the Atlantic waters. Deposits that could hide countless data that could help us to know better these life modes of the millennium coastal peoples behind in time. In Xataka | The history of the last whale hunted in Spain, on October 21, 1985 Image | ICTA-UAB/Alexandre Lefebvre

Google is even the noses of the fraud by SMS and calls. Android’s new functions are going to hunt

Important day for Android and consumer technology. Google has made official some of the changes that will arrive with Android 16. Among them, Material 3 Expressivethe new design language that will land this 2025. In addition to changes in the interface, Google wanted to focus on security and privacy. To do this, it opens a good number of functions that will land in the coming months. Protection against fraudulent SMS. It is more than probable that, in recent months, you have arrived some SMS that promised to be from a telephone company, parcel company or the like. The detection of Scams in Google messages will improve with Android 16and Android will notify in real time of possible fraud. Within the messages itself, the system will notify us when a message is suspicious of fraud: identity supplant, scams related to cryptocurrencies, fraudulent billing … This analysis will be carried out in a 100% local way within the device, so that nothing that comes to us will be processed in the cloud. Also in calls. Google has been doing something very well for years: Filter suspicious spam calls. However, sometimes this is not enough to protect the user. With Android 16, there are certain actions that cannot be made during calls. The objective is to prevent scammers from asking the user to make behaviors that play against them (change security settings, modify some aspects of the system, etc.) during a call. In other words, Android will not only have protection against spam. He will also have it against the SCAM: the various scams that are so on digital roads. Key Verifier. Another of the new tools that lands in the new version of Android is Key Verifier. This is focused on combating fraud due to impersonation of identity, and will allow us to verify the identity of the people with whom we communicate through public encryption keys. Through a QR code it will be possible to verify that the contact is verified in the Google messages app, since its keys must coincide with those assigned. It is a great solution to the popular problem of Sim Swapping, in which they replace our identity by passing through our telephone number. This measure is not linked to Android 16. It will arrive from summer to all devices that have Android 10 or higher. Anti -theft protection. Google premiered interesting Anti -theft functions not too muchand now he wants to take a twist. Safety measures will be reinforced in sections such as the factory reset of a device. It will no longer suffice to know the mobile key, it will also be possible to add an additional layer through a security question. In the same way, this will apply to the remote device block, to minimize the possibility that an attacker can make changes to our mobile if he has had access to any of his keys. Find Hub. Do you remember Find My Device? Well, you can forget him. This Google service evolves to Find Hub, the natural evolution of the app to track our devices. With Find Hub we will have more unified locations not only of objects, but of the contacts that we add to our network, as well as the objects that carry tracking devices such as Tile, Moto Tag and others. Security protection. To finish strengthening system safety, the device protection function arrives. This is a function in which the apps will be informed that it is active, to avoid the temptation to access our information. What exactly do you? While active, anti -theft functions, memory optimizations and applications against possible bugs and errors that can be exploited, network connection protection to avoid insecure websites, and the aforementioned messaging and SCAM options will always be operational. With these fu Image | Google In Xataka | Android anti -theft protection: What is it, what functions it has and how to activate it on your mobile

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.