The United States has found how to protect its most vulnerable ships on the high seas: with escort drones

The planet’s oceans and seas are anything but a pond of oil, and not precisely because of the climate: the Black Sea with the war between Russia and Ukrainethe Baltic Sea with hybrid warfare and ghost fleets, Strait of Hormuz tensions through which 20% of the world’s oil passes or the Red Sea crisiswith Houthi drones and missiles. And those are just some of the hot spots that cause logistics and merchant vessels to face serious problems in carrying out their functions. The possibility of sending the navy as a companion for those routes where the atmosphere is heated is obviously not an option. So the US Defense Advanced Research Projects Agency (DARPA) has contracted to a company to solve it with an autonomous escort system with drones. Context. If the Strait of Hormuz is a strategic point for international trade, the Bab el-Mandeb Strait is not far behind: 12% of world maritime trade passes through it, according to the Middle East Research Center. But since 2023, passing through there is a minefield, which has led to thousands of boats (according to Wikipedia citing Pentagon sources) follow an alternative route that involves going around all of Africa passing through the Cape of Good Hope. That’s 20,000 extra kilometers, ten more days of travel and the consequent expense in fuel. This specific case is not a mere example: it is what has led DARPA to make the decision to count on Raytheon to unclog this bottleneck as soon as possible, as explains the company’s president of Advanced Technology, Colin Whelan. Why is it important. Because 80% of world trade circulates by sea and there are a series of straits that are critical and that, in the event of conflict, act as bottlenecks due to their vulnerability. And the effects are immediate in the form of delays in supplies and prices. The protection of merchant ships to date required a naval escort in a slow, expensive operation and for which there are not enough troops to allocate them to that mission. What Pulling Guard proposes is autonomous protection without requiring extra crew or structural modifications. What is Raytheon? That company is not any: Raytheon is the arms division of the RTX group, the largest aerospace and defense company in the world, with 180,000 workers and $88 billion in turnover in 2025. With more than a century behind it and headquartered in Virginia, it has missiles such as the Patriot or the Tomahawk on its resume. It is one of the Pentagon’s Big Five contractors and is a regular in DARPA contracting. What is Pulling Guard. Pulling Guard is the system developed by Raytheon, a semi-autonomous platform towed by the ship it protects. From this, a drone operates with electro-optical and infrared sensors to detect potential threats and transmit information in real time to remote operators on the ground or on board. The latter are in charge of making decisions without the crew exposing themselves. It has two phases: in the first it is an advanced surveillance system and in the second it integrates weapons. Pulling Guard is neither a passive shield nor a preventive warning system: it is, in short, a light autonomous combat unit attached to a civilian ship. What we still don’t know. Beyond technical unknowns such as the budget, the phase schedule or the type of integrated weapons, this proposal raises two tricky questions: international law and gray areas. Without going any further, from issues such as what rules of engagement apply to the remote operator from the ground authorizing fire, who is legally responsible for the attack or what happens if the system acts in the waters of a third state. Not to mention something more mundane like flag registrations or insurance companies. Or something even more basic: does the ship lose its civilian status by carrying this system? In Xataka | The US Navy already knows how to fool enemy radars: drones that create ghost fleets In Xataka | The US is preparing a new radar for Greenland with one objective: to monitor every movement of Russia and China in the Arctic Cover | Raytheo

Mexico has built a true Latin dubbing empire. And now it’s going to protect you from AI by law

Mexico produces 65% of the dubbing in Latin America. And until now, no rule prevented an AI from copying the voice of its actors without paying or asking for permission. The government of Claudia Sheinbaum has presented this past February 13, 2026, an initiative to legally recognize the human voice as an artistic tool that cannot be cloned. If it prospers in CongressMexico would become something more than a government that looks after the interests of the actors: it would also be a world pioneer in regulation of voice cloning in a cultural setting. Korea is to blame. The trigger for this reaction was not a native series, but some korean dramas. In May 2024, social media users shared fragments of Korean Prime Video series (‘My Boy is Cupid’, ‘The Beat of My Heart’ and ‘Field to Love’) denouncing an unusual feature: the dubbing into Latin Spanish sounded mechanical, robotic and without nuances. And there was also something very suspicious: there were no credits for voice actors anywhere. Without giving explanations, Amazon removed those dubbed versions and did not confirm the origin of the voices. The straw that broke the camel’s back. It was a turning point: the voice actors guild had been denouncing for months how voice actors from all over the continent were losing jobs in favor of AI tools trained, in addition, with their own voices. Some actors, in fact, denounced the Kafkaesque situation that his voice was the one who had replaced him on a YouTube channel for which he worked. Point of no return. In March 2025, Prime Video announced its AI dubbing pilot program in English and Latin Spanish. According to Amazonare twelve series that would not have been dubbed if it had not been for AI, presenting it as an opportunity for series to be seen that would otherwise remain unpublished. The suspicion of Latin professionals, as we have seen, went in a diametrically opposite direction. To calm things down, Amazon assured that localization professionals would monitor and correct the dubbed episodes with AI. The protest. Mexico produces around 65% of the Latin Spanish dubbing destined for Latin America, according to data from the Mexican Association of Commercial Broadcasters (AMELOC), and has some thirty-five active studios with approximately 1,500 actors working. This human force was manifested last July in Mexico under the slogan “AI does not replace.” Among other requests, it was demanded that the voice be recognized as biometric data, at the level of a fingerprint. The purpose is to prevent its use without consent. The proposal. According to the specialized media CO/AISince the summer of 2025, the National Copyright Institute (INDAUTOR) and the Legal Department of the Presidency have worked with more than 128 organizations to build a legal framework always in touch with the union. The resulting text reforms two existing laws: the Federal Labor Law incorporates dubbing actors and announcers as formal workers in the cultural sector, equating them to singers; and the Federal Copyright Law recognizes the human voice as a “unique and unrepeatable” artistic tool That is, any use of it through AI requires express authorization from the owner, plus financial compensation. None of this prohibits dubbing with AI, it only protects the voices that train or replicate the model with mandatory contracts. Missing. The initiative must pass the Chamber of Deputies and the Senate before becoming law, and it will take a while: the Mexican Congress accumulates proposals since 2020. There are more than sixty initiatives related to AI that have not yet received the corresponding legal response. Of course, this one seems to go faster: in November 2025, the Congress of Mexico City had already approved a similar opinionwhich reformed five federal laws. Mexico, spearhead. This beginning of regulation in Mexico is an advance of what other countries are trying to regulate since 2023. For example, in 2024 in Tennessee, Governor Bill Lee signed the ELVIS Act to explicitly add voice among the attributes protected against unauthorized use with AI, something new in the US. The standard also holds responsible platforms that distribute tools whose main purpose is to generate voice replicas without authorization. California and New York have tried to regulate not the technology, but the contracts signed around these activities. However, the limitations of these laws were soon demonstrated: in July last year, a New York judge did not rule in favor of two voice actors who discovered that their voices had been marketed as AI products. As it had not been made with a fixed recording, but with attributes such as tone, timbre or cadence, the court dismissed the claims. That ruling is the type of thing that the new Mexican legislation will try to avoid, and provide more robust protection to artists. Header | Amin Asbaghipour in Unsplash

what it is, how it works and how to protect yourself from it

Let’s tell you what is zero click attack typeused by spy applications such as Pegasus. We will all remember that in 2021 The phones of Pedro Sánchez and the Minister of Defense were infected by this malware espionage or Spywareand to do so this technique was used. The zero-click technique in Pegasus was first documented by Citizen Lab in a 2016 reportand it is worth knowing it for its sophistication. Basically, it is a method of infecting devices in which the victim does not need to do anything or touch any link. What is the zero click attack The Zero Click This is what we call an exploit.a trick that exploits a security flaw in operating systems or web pages to do something that you should not be able to do. In this case, what we should not be able to do is install spyware on the mobile phone without the victim knowing. To spy on another person’s cell phone you have to install a spy program, and the most common method to do this is through hacking attacks. phishing: The victim is sent a fake email or message with a link on which, when clicked, the spyware is downloaded. Come on, an interaction is needed on the part of the victim. However, zero-click exploits are designed to function without interaction of the user. This means that they are methods so that a victim’s mobile phone can execute code on its own. This is a very sophisticated type of attack, subtle, and with a high success rate, since we will not realize that it is happening. Thus, your device becomes infected invisibly or by simply receiving a missed call notification from an unknown number. Zero click attacks They are not a virus or malware, but a technique through which these malwares can be installed. Therefore, your antivirus will not detect this attack, although it can detect the program installed on the mobile phone through it. How the zero click exploit works This type of exploit uses vulnerabilities within communication applications completely normal and legal that we carry on our mobile. For example, messaging applications, SMS or social networks. What they do is take advantage failures in automatic processes of mobile phones or applications. For example, when you receive an SMS on your mobile, the application automatically processes it to send you a preview in the notifications, or a notification with the specific message. What attackers do is use flaws that they have discovered but the companies responsible for mobile phones, operating systems or applications do not know about. To follow an example, if the messaging app has a flaw when processing images, PDFs or audio, the exploit can take advantage of it to send a message that has a code with which to exploit this flaw to install the malware in question. For example, Pegasus used zero-click exploits in iMessage and WhatsApp. The attackers only had to send a specially designed message to exploit the flaws of this app, and the phone was infected without you realizing it, even deleting the message afterwards to leave no trace. There are groups of cybercriminals specialized in creating these exploits, which because they are so difficult to design can be worth millions. Today, the most common types are those aimed at smartphones, although they can also be created for other devices. How to protect yourself from zero-click exploits Since these attacks work without requiring any interaction from the victim, you won’t have a chance to identify the threat and defend yourself from it. This makes them extremely difficult to avoid, although we can always resort to proactive security measures. First of all, keep your devices and their applications ALWAYS updated. These attacks work through vulnerabilities that have not been discovered, but if they are discovered, the companies of the apps, devices and operating systems will always send urgent updates. The more unupdated applications or operating systems you have, the more vulnerable you will be. Another very important measure is avoid using unsafe applications. Be careful with almost unknown apps, or those that you download from third-party application stores or directly from websites. I know we all like to explore new apps, but only trusted apps downloaded from reputed app stores can minimize the risks. You can also consider install anti-spyware and malware applicationsthe classic antiviruses. Behind them are companies dedicated to monitoring risks and malware, and zero-click exploits are often used to install this type of virus. Take extreme precautions if you are a public figure. Obviously, a government or an institution is not going to spend millions of euros on one of these exploits to infect the town baker. But if you are an activist or member of an institution or government, then you are going to have to take all these measures more seriously. In Xataka Basics | Cybersecurity for your vacation: tips and recommendations for before and during your days off

France needs to protect its nuclear power at all costs

Emmanuel Macron has decided to immerse himself in the controversy. In a joint interview with the major European newspapersthe French president has attacked the waterline of the Spanish energy model, describing the debate on the lack of interconnections as “false.” But behind his words lies a geopolitical anxiety: we are not facing a technical criticism of the stability of the network, but rather a territorial defense of a nuclear power. that sees its hegemony threatened for cheap energy from its southern neighbor. The direct accusation. “Spain’s problem is that it has a 100% renewable model that its own domestic network does not support,” Macron categorically sentenced The Country. The president insisted that the Spanish blackout “has nothing to do with interconnections,” but rather with the intrinsic instability of renewables. This diagnosis comes at a calculated time: according to the Financial TimesMacron uses external threats – the Greenland crisis and tensions with the US – to demand “Eurobonds” and financial centralism, asking for more Europe for his debt while building physical walls in the Pyrenees. The nuclear bunker. The underlying motivation is the economic survival of Paris. France aspires to be the “battery of Europe” and its nuclear investment plan of 300 billion euros desperately needs profitability. If Spain floods the market with cheap solar energy, the French nuclear model – centralized and expensive – loses competitiveness. Macron is already moving to protect himself: has sealed a pact with German Chancellor Friedrich Merz to classify “pink hydrogen” (nuclear) as green, shielding its technology from the southern solar boom. An island by decree. The data refute the Elysée speech about self-sufficiency. Spain continues to be an “energy island” with barely 2.8% interconnection, very far from the EU’s 15% objective. As the ministers of Spain and Portugal pointed out in a letterFrance has explicitly excluded key Aragon and Navarra projects from its 2025-2035 network plan. What’s more, Ember data show thatDuring the blackout, Spain even exported energy to France because the French reactors were stopped, proving that the bottleneck is the lack of output, not generation. The Danish mirror. The fallacy about “renewable instability” collapses when looking north. with more 80% of wind generationdoes not suffer blackouts because it is ultra-interconnected to North Poolinstantly balancing its load with Germany and Norway. Meanwhile, the “nuclear stability” that Macron preaches is failing: last summer, the French reactors stopped not due to lack of wind, but because the Rhône and Garonne rivers They were too hot to cool them, skyrocketing prices in Europe while the Spanish solar plant continued to operate. Solar asphyxiation. The French blockade has a tangible cost. Without interconnections, Spain suffers curtailment —throwing 7% of their clean energy in the trash because it doesn’t fit on the grid—which sinks prices to zero and ruins investors. In his interview with The CountryMacron calls for a “European awakening” to not be vassals of China or the US. However, by keeping the Pyrenees closed, it effectively turns the Iberian Peninsula into an energy vassal of France, preventing the same strategic autonomy that it claims to defend. Image | House of Lords and freepik Xataka | The solar miracle that went wrong: Spain produces more electricity than it can manage

Surfshark is a top tool to protect your privacy on the Internet

With news of massive hacks almost every week, it is logical that we want to add an extra layer of security while browsing the Internet. Of all the ways there are to do this, the most useful and easy to use is a VPN. If we are actively searching for one of them, we have one of the best VPN available at a discounted price: it is surfsharkavailable now for 1.99 euros per month. Surfshark Starter Subscription – monthly The price could vary. We earn commission from these links A secure, fast VPN that you can use on all the devices you want As we always tell you, a VPN It is one of those tools that does not get in the way and that is always good to have installed on our devices. Yes, there are free options on the Internet that, for specific use, are not bad. The problem is that most of them They are not as safe as they say they are.hence It is advisable to invest a little and get a payment one that is safeas is the case with Surfshark. How can a VPN help us be safer on the Internet? By activating it, what we will be doing is passing our traffic through an encrypted and secure tunnelin such a way that no one will be able to see what we are doing. This is ideal in any scenario, but especially recommended if we are going to use a WiFi network that is not ours, such as that of a hotel. Another thing that a VPN also allows us to do is keep our IP address hidden. By using it, we will be preventing it from being registered anywhere or that no one will be able to intercept it, something ideal, since with it they can even impersonate our identity. Let’s now talk about Surfshark’s offer. This company offers three different plans, the Starter being the cheapest of them. Right now we have it available for 1.99 euros per month if we go for their two-year plan. In this way, in total we will be paying 53.73 euros and we will take three extra monthsso we will enjoy the tool for 27 months in total. And be careful, because you can use it on as many devices as you want without paying more. If we don’t mind investing a little more and are looking for a more complete tool, we can automatically go to your plan Surfshark Onereduced right now to 2.49 euros per month. This, in addition to including the VPN, comes with more additional tools, such as an antivirus or a tool that warns you in case your data is leaked on the Internet. Surfshark One Subscription – monthly The price could vary. We earn commission from these links The improved version of the previous plan, called Surfshark One+is also on sale: it goes for 4.19 euros per month. This includes, essentially, everything from the previous plan, along with a very interesting tool called Incogni. It allows us to delete our data from people’s company databases, which is very useful. Some of the links in this article are affiliated and may provide a benefit to Xataka. In case of non-availability, offers may vary. Image | Nathan Fertig on Unsplash,Surfshark In Xataka | Why it is dangerous to connect to public Wi-Fi and what you should do to protect yourself In Xataka | Free VPN and security: what’s the problem, why you should be careful

Dangers of Clawdbot and how to protect yourself from them before deciding to use it

Let’s give you some safety tips in case you are thinking of using Clawbot. This is a AI agenta bot that takes control of your computer, and then you can use it to tell it to do things on it. This is something that is having a lot of success, since it is capable of speeding up many processes and doing many things for you. But of course, when you are using this tool you are giving a system of artificial intelligence full access to the machine where you install it, and this has some dangers that you should be aware of. What dangers are there for your data These are the dangers to which you expose yourself when are you going to use this tool. Even the creators of the bot have assured that there is no perfectly safe configuration, so it should be taken into account. Gateway exposure on the web: If you do not have the way in which your bot is accessed properly configured, a third party may have access or the access page may even be filtered. This would allow a third party to take control of your computer. Too open access policies: If you are not careful when configuring access to the bot and allowing others to interact with it, you will be giving them the keys to your computer to control it. Prompt injection: If you make the bot interact with files that you have downloaded from the Internet, perhaps some of them have hidden texts with commands that ask it to ignore what you have ordered and do another task that could be dangerous for you. Plugins or extensions: When you install a plugin on this AI agent to give it more capabilities, it runs alongside the gateway. This means that if you install a malicious plugin or extension, they may contain code that takes control of your computer or performs unwanted actions. Bot malfunctions: Like any bot based on artificial intelligence, it may fail to interpret orders or perform unwanted actions unintentionally. This could endanger the contents of the computer where you run it. In short, the main danger is exposing your bot and access to it, allowing others to control it. If another person has access to your bot, they can simply take control of your entire computer and the data you have on it. How to keep Clawdbot safe First of all, and the most recommended is do not use Clawdbot on your main computer or machine. Just don’t have it where you keep your most private data and files, and this way you will prevent unwanted access or malfunction from putting you at risk. And if you don’t have a secondary computer, use a sandbox mode, install a virtual machine with limited files. By installing Clawdbot on a secondary or virtual machine, you can decide what files you want on it, what applications do you have installed and what passwords are in the browser to use, as well as bank details. It is simply advisable to only have the accesses and applications that you are going to use, not everything. In addition, for each of the dangers we have mentioned above there are also specific tips to follow. Gateway Dangers: To prevent others from accessing your bot, you need to ensure that Gateway authentication is always enabled with a token or password. Additionally, you must use Tailscale or secure HTTPS for access. If you use a web interface for the bot, disable settings that allow insecure authentication, and if you control it through the chat of a messaging app, take maximum care of the privacy of that application and access to it. Put a password. Too open access policies: Be careful when pairing nodes with elevated permissions, and avoid sharing access in groups if you don’t fully trust all users. It is also advisable to configure the bot so that it only responds to specific users or to messages where it is explicitly mentioned. Prompt injection: Try not to interact with files that you have not created, deleting those that you have downloaded from the Internet on the machine. You should also design your configuration for limited and validated access before processing commands. Plugins or extensions: To avoid any danger from malicious plugins or extensions, you should only install those that you explicitly trust, and only from completely trustworthy sources. It is best to manually review the plugin code before activating it. In addition to this, the creators of Clawdbot have an advanced security guide where they tell you the security hearings that you must perform periodically to make sure everything is working correctly. And finally, the best advice I can give you is that do not use Clawdbot if you do not have minimal knowledge to know how to configure it. If terms like “remote administration API”, “sandboxing”, “localhost” or “reverse proxy” don’t sound familiar to you, it’s best not to install it on your computer. In Xataka Basics | The best prompts to save hours of work and do your tasks with ChatGPT, Gemini, Copilot or other artificial intelligence

What do you have to do to protect yourself if you have received an email saying that you have been affected?

Let’s tell you How to act if you have been affected by the Endesa hack. The electricity company has suffered a cyber attack that has affected its Spanish platform, something that has compromised the personal information of a large number of customers, exposing data such as the DNI, your personal data and even payment data such as the IBAN. Endesa has started send emails to affected usersso if you have come across one it is possible that your data has been stolen. Therefore, we are going to tell you several important steps to take to minimize the risks and avoid fraud that may arise when cybercriminal groups purchase this stolen data. Because the worst thing about these hacks is not always that they can steal money from your bank details, but that you can then receive fraudulent emails or messages with which they try to steal even more from you. Therefore, in these cases it is always advisable to pay close attention to what may happen in the following months. Remember that you have a complete and general article about what to do when your data is leaked online. Check your banking transactions The first thing is to check your bank and look if there is any strange movement. As Endesa has said that in some cases payment data may have been stolen, that means they could try to make some type of charge to your account. It is advisable to maximize attention during the coming weeks and months, and for any payment that is not clear, contact your bank to block it and avoid major problems. Be wary of emails, SMS and calls It is assumed that if a cybercriminal group buys the data stolen from Endesa, they will know your name and surname, your telephone number and your email. Therefore, you may receive fraudulent messages By any of these means, campaigns phishing with which to try to steal money from you. Here, be wary of any supposed communication from Endesa in which they ask for personal or banking information by phone or email. If you are asked for this information in a message, be wary immediately.because the real company will never ask you for them. Do not continue the conversation or respond to the message that arrives. Do not click on links or download files Phishing is a technique with which a cybercriminal sends mass messages to hundreds of thousands of people with a virus attached or links to fraudulent pages. Their goal is for at least a handful of people to click on them and become infected or go to the fraudulent page where they give their bank details and steal money with it. Therefore, if you receive a supposed email or SMS from Endesa or any other person with a file or a link to a website, never interact with this content. It’s okay to read the message, but never download anything or click on a link that takes you to another page. Save all Endesa communications Finally, to protect yourself for the future it is important keep the letter or email from Endesa. Thus, if in the future you have to prove possible misuse of your data, you will have proof that there was a hack and it was stolen. Other security measures Lastly, you may also want activate two-step verification on platforms where you use the same email that you have linked to Endesa. In those more sensitive ones, it may be interesting to change your passwords, and also take extreme precautions against any email and message that you may receive from other pages, because they can also be fraudulent. In Xataka Basics | My data has been leaked, now what: the steps you should take whenever there is a massive leak on the Internet that could affect you

Europe has signed the first agreement to protect dogs and cats. Breeders won’t like it

The Animal Welfare Law It came into force in Spain two years ago. Among its measures, the law prohibits individuals from breeding and selling pets, allowing only registered breeders. Now, it is the European Union that wants to put an end to abusive breeding. what has happened. On November 25, the Council and the European Parliament reached an agreement provisional agreement which establishes a series of stricter rules for the dog and cat trade. It will affect both breeders, pet stores and shelters. The agreement still has to be endorsed, but a date has already been set for the standards to be met: 2028. Why it is important. It is the first agreement on animal welfare at community level. Until now, the only European regulation that affected pet animals was the one that regulated movements between member countries, but the fact that the fight against abusive breeding is being prioritized is further proof that animal welfare is at the center of public debate. Starting point. It is estimated that the cat and dog purchasing market moves 1,300 million euros a year and 60% of purchases are made online. In Spain, the Animal Welfare Law expressly prohibits direct sales over the internet and requires breeders who advertise in magazines or other media to include their registration number, but in many other EU countries there is no regulation in this regard. animal welfare. Establishments must meet a series of requirements to provide well-being to the animals they house and which will be aimed at covering the diet, physical environment, health, behavior and mental state of the animals. Some of these requirements are: The environment will have good quality, which means that it is comfortable, that they have enough space and a good temperature. The animals will be safe, clean and healthy. Disease or injury prevention measures must be applied. It is prohibited to have dogs or cats in spaces (cages, showcases…), except for transport. It is prohibited to keep dogs tied for long periods. Dogs and cats must have access to the outdoors to exercise and socialize. They must receive water and food in sufficient quantity and quality. Establishments must have sufficient competence to care for dogs and cats, including an understanding of their biological behavior and ethological needs. At least one caregiver per establishment will have to receive official training in animal care. They must ensure veterinary visits at least once a year and record the results. When selling or adopting an animal, the recipient must be made aware of responsible ownership. Breeders. The regulations focus especially on the breeding and reproduction of animals, with a series of requirements that aim to end harmful practices such as mutilations or inbreeding. They are the following: Age limits will be established for the dogs and cats used for breeding, as well as a frequency between litters. Consanguinity will be prohibited, that is, breeding between parents, descendants, siblings or grandparents will not be permitted. If a female dog or cat has undergone two cesarean sections, she should be removed from breeding to protect her health. The creation of hybrids through crossing with wild species, for example dogs and wolves, is prohibited. Mutilations such as cutting ears, tails or removing nails cannot be carried out. It cannot be used to breed dogs or cats with extreme traits. For example, very short noses or “flat faces” typical of breeds such as the French bulldog or the pug. Mandatory identification. All dogs and cats sold or given up for adoption must be microchipped and registered in the national database. Starting in 2028, breeders and shelters will be obligated, but within ten years it will be mandatory for all dog or cat guardians. In Spain, microchipping is already mandatory for both species. The novelty introduced by this regulation is that the databases will be interoperable at the European level. Who it doesn’t affect. There are exceptions and againthe regulations will not affect hunting dogs, guard dogs or cats that live freely in rural areas. The FAADA Foundation regrets this decision and states that “it will leave some 18 million cats and 2 million dogs in the EU without adequate protection.” There is also an exception regarding the prohibition of consanguinity. It will be allowed when it is to “preserve local breeds with a limited genetic pool.” Small establishments will also not have to comply with the rules except for the identification of animals with a microchip. To be considered a small establishment, they must meet these requirements: Breeders who have a maximum of three dogs or cats and produce a maximum of two litters per year. Pet stores that have a maximum of three dogs or six cats. Animal shelters that have a maximum of ten dogs or twenty cats. Images | Pexels In Xataka | Yes, the neighbors on the tenth floor can have chickens at home even if they don’t want to. The Animal Welfare Law says so

Your IP address can allow them to locate or impersonate you. You can protect it with a VPN for less than 2 euros per month

Nothing has to happen to us by regularly using the Internet, but we are never exempt from all risk. There is a factor that we do not usually give much importance to in terms of security and that is actually quite relevant: the IP address. How can you protect yourself? The simplest and most comfortable way to do it is, without a doubt, with a VPN. It is undeniable that there are free ones. These work and can be a specific resource if we need it, but in the long run they are not worth it. Nobody gives anything for free, so the normal thing is that they are full of advertising or something much worse: that they are not as safe as they say they are. We have an economical and quality alternative with Surfshark: Black Friday gives us its VPN for only 1.99 euros per month. Surfshark Starter Subscription – monthly The price could vary. We earn commission from these links A quality VPN for less than the cost of a coffee As we say, keeping our IP address safe is important. Through this, the web pages we browse or even cybercriminals They can get to know our approximate location. Not only that, but it is also the door to our identity being impersonated on the Internet, so they can carry out attacks or illegal activities impersonating us. With a VPN activated, these risks disappear. This Black Friday also makes it easier for us to have to make a smaller investment. Right now and until next December 2, we can get the Surfshark Starter plan for 1.99 euros per month in its two-year modality. This, in addition to VPN, comes with an extra tool called Alternative ID. All without forgetting that with a subscription we can use the VPN on all the devices we want. If we are looking for a greater dose of security and we don’t mind spending a little more, perhaps the Surfshark One subscription is better for us. This includes everything that the Starter plan has, but goes further with a lot of extra tools. Its price is not much higher: goes out to 2.19 euros per month. This is all it brings: VPN. Antivirus. Real-time alerts on email breaches, credit card and ID data theft. Private search tools. Personal data security reports. Webcam protection. Anti-spyware and malware protection. Surfshark One Subscription – monthly The price could vary. We earn commission from these links We have an extra alternative called Surfshark One+. This subscription, as its name suggests, is a superior version of the previous one. The biggest difference, besides its price (which costs only 4.19 euros per month), is that it comes with a tool that is used to delete our data from databases. We cannot forget a detail that affects the three subscriptions that Surfshark has. All of them have these prices in their two-year modality, but right now include three extra months. One more reason to opt for one of them if we are looking for more security on the Internet. Some of the links in this article are affiliated and may provide a benefit to Xataka. In case of non-availability, offers may vary. Images | surfshark In Xataka | Public WiFis: why they are dangerous and tips to connect safely In Xataka | The best solutions to protect your data and your company’s IT equipment

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.