How it works and how to prevent them from doing with yours

We are going to explain a type of fraud that has been growing more than a year, and that is being used to steal your Google accountand with it both access to Gmail and your photos or other services. It is a hoax that mixes both artificial intelligence and classic phishing, and that should be known. We are going to start the article explaining how this deception works, so you know how to recognize the way you proceed and you can upload your guard if you recognize that behavior. And then we will end up with several tips to avoid it that you should always keep in mind. How this deception works To perform this deception, cybercounts use artificial intelligence systems to make phone calls. With the AI, it seems that on the other side a real person is talking, and in this call you are told that your Gmail account has been compromised. They also tell you that they will help you. So, in the next step you are sent An email that seems to come from Google. In this email there are seemingly reliable links that take you to fraudulent pages. The idea is that you press in these links thinking that you are going to configure the safety of your account or change the password. But what you really do is Give your Google data so that the cybercriminals are left, and can access your account. How to avoid this scam To avoid these types of scams, the first thing you should keep in mind is that Google won’t call you to let you know. Simply, this company will never tell you if your email has been compromised, nor will they send you a chat to tell you. As for the emails that can reach you, Look well in the direction of the sender. Even in cases where he comes from Google as the person’s name, look at the address of the mail from which he writes to detect if they are accounts that have nothing to do with Google. Always be careful with the web pages That they arrive by mail or by message to perform procedures that include writing your account. For that, the mouse passes over a link so that the real direction to which it goes, and detect when it is an address that has nothing to do with it. In both emails and addresses, it verifies that the URL ends at Google.com or Gmail.com. Be careful if only the company’s name appears in the middle From the address, or if after the first point of the URL another word appears before the .com. Finally, in the case of having doubts Manually enter the official pages of Google or Gmail without clicking on any link, and simply change the password of your account manually. In Xataka Basics | The best pages and online tools to detect leaks and prevent your accounts from hacking

This is how Ech works, the Technological Shield of Cloudflare that has put the operators between the sword and the wall

The LaLiga fight against illegal soccer broadcasts It has encountered an unexpected obstacle: Ech (Encrypted Client Hello), an encryption protocol that stars in the great conflict and the collateral damage of this battle, which splashes thousands of companies. Turning point. It all started when Cloudflare implemented in October 2023 (Encrypted Client Hello), an extension of TLS that prevents operators from identifying which specific domain is requesting the user. This protocol makes it technically impossible for operators to see which specific domain requests a user. The contrast. ECH works as an additional encryption layer that completely hides the final destination of a connection: When a user tries to access a website, his browser initiates an encrypted “negotiation” (Handshake TLS) With the server. Before ECH, although this connection was encrypted, the name of the domain was traveling “in clear” so that the intermediate servers could enrut the traffic. With ECH, the name of the domain is also encrypted, making it impossible for the operators to know which concrete website the user is accessing. The system is even more complicated because Cloudflare uses shared IPS: The same IP address can house hundreds or thousands of different websites. Without ECH, the operators could see what domain each user requested and block selectively. With ATU activated, they only see an encrypted IP that could be serving both legal and illegal content. This leaves two options to the operators: block all the IP (affecting hundreds or thousands of sites) or not blocking anything. When they choose the first thing the Blocked legitimate websites. To avoid blockages, which also translate into a reputational crisis, some operators are resorting to alternative techniques such as: Traffic patterns analysis. Deep inspection of packages (DPI). BLOCK BY SNI (Indication of the server name) when ECH is not active. But these solutions are complex, expensive and not always effective. The conflict has climbed, Movistar has softened his blockages, Digi has hardened them and Vodafone says to have a more precise solution although it has not revealed details yet (since Xataka We have asked them for this without having received an answer at the time of publishing this article). They possibly use one of the last points. The next. Ech has supposed a huge change in Internet architecture. The precedent of Austria, where IPS blockades were prohibited To protect the neutrality of the network, it suggests that the current regulation model needs to adapt to this new reality. Meanwhile, the pulse between LaLiga and Cloudflare persists, and thousands of Spanish companies also remain trapped in the midst of the conflict. Outstanding image | Cloudflare In Xataka | What is cloudflare, how it works and why a fall or block makes half the Internet fail

What is cloudflare, how it works and why a fall or block makes half the Internet fail

Let’s explain What is cloudflare and how it works This shield and accelerator for web pages. It is one of those almost essential services for the correct functioning of the Internet, but that we are not aware until it fails or blocks and you can enter hundreds of websites. We will begin this article explaining in a simple way what is cloudflare, summarizing the operation of the Internet and the role that CDNs have like this service in it. Then, we will tell you why a fall or lock of the service makes half the Internet seem to fall. What is cloudflare and how it works Cloudflare is a CDN, a Content Delivery Network either Content distribution networkthat in Spanish is Content distribution network. It’s about a network of servers distributed throughout the world destined to help better distribute Internet content and make you can quickly and safely access the content of a website. To understand its operation you must first understand how the Internet works. A web page is housed on a server, and simplifying it a lot, when you enter it you connect your computer to that server, to access the contents of a website. The same happens when you want to enter any online service or web application, you have to connect to your server. The problem is that perhaps the server of my application is in a country far from the computer from which someone wants to connect. So, that distance makes the connection speed very slow, or that even from some countries cannot be entered. The same happens if the web or the service you are going to access had a single server. Then, having thousands of users entering that single server would make everything slower because I would have to work more and for more people. It is here where the CDNs and their networks of servers come into play. When a website, an online service or application resorts to them, is as if they had copies of the content and cache distributed all over the world to be able to connect in a faster and more efficient way. There will always be a server close to you, and traffic can be distributed by the hundreds of servers. Thus, if I connect from Spain to an American service, I will not join a giant user queue wanting to enter a single server that is also far away, something that would make the connection slow. Simply, I will connect to the nearest server of the CDN network that is using that service. Everything will go faster, and the traffic that accesses the service will be more distributed. Cloudflare is one of the most used CDNs of the world. There are many web pages that resort to this company, because in addition to a very wide network of servers, it also offers protection against various types of online attacks that could collapse access to the contents. This way, Cloudflare is an intermediary between a customer or user and the content of the website or the online service they want to access. It is a network that houses copies of a service so that you always have geographically close, technologically safe access, and less traffic collapsed. Why if Cloudflare Failure Middle Internet does it When you stop accessing this network of servers, you can access its content. This means that if your Internet operator blocks you access to Cloudflare or if this service has a failure, stop being able to enter most web pages. There will be no network that distributes traffic and access to these websites, and simply connect to one would be too slow or you would be too far. For practical purposes and simplifying it a lot, Not being able to access Cloudflare means not being able to access many servicesand that those who use it and are not fallen simply go extremely slow. This is so for The dependence of Cloudflare. Being one of the most popular CDNs in the world, many important and top -level services access it. And these services that use it, depend on their servers network to work properly. In this PDF You can see the services and websites used Cloudflare, such as X, Bluesky, Microsoft, Mozilla, Snapchat, Temu, Efe, Github, Wikimedia, Facua, CaixaBank and many more. All these services will stop working or work extremely slow if the Cloudflare network stops working. When a website or online service fails, it is sure that there is a problem with the infrastructure of the server network that provides you with access to it. So Errors like the 502 Bad Gateway indicating this problem. If the one who cannot access a website, app or service is due to this, all you can do is cloudflare or the CDN to use the error. When an operator blocks access to cloudflare Or some other concrete CDN, the problem is that your IP cannot access this network of servers, although it works correctly. In these cases solving it is easyand you just have to use one VPN to access from a different IP that does not have access. In Xataka Basics | CG-NAT: What is it, what problems can cause and how to know if you have it in your Internet connection

What is it, how it works and requirements to use this method to renew your DNI

Let’s explain WHAT IS THE EXPRESS DNIa process that is beginning to deploy in Spain to expedite the process of renewing the national identity document. This process usually takes because you have to go to the police to do it, obtaining an appointment first. But now it is starting to expedite, so that renewing the ID can be very easy and fast. We are going to start explaining what the express DNI is and how this procedure works. Then we will tell you What are the requirements To be able to use this method to renew your document, and so know if you will be able to do it. What is and how the express DNI works Express DNO is a new method for renew your fast and easy IDwhich will live with the traditional method. Instead of face to face with an agent to complete some procedures such as putting your fingerprint, you will enter a cabin where everything speeds up. It’s about A multiple expedition module (ME) that are being installed in the police stations that can perform this procedure. This means that it is not in all, but in those where the DNI is renewed, that these machines are being installed. It is a double cabin, and on the other side there are an agent who can serve two people at the same time. In it, in addition to renewing the ID at the moment you will also be able to make the payment, either by card or contactless with your mobile or smart watch. These stations have technologies for biometric capture, with which you can Remove the photo of a person and get their fingerprints. Come on, the two things that are needed for you to renew the DNI can be done in this cabin. The term DNI Express refers to the fastest process without renewal, not the identity document, so what you get is exactly the same as if you do by the traditional method. The advantage of this method is that You do not need to request a previous appointmentsomething that in some cities can have a long waiting. In addition, it reduces the costs, since You don’t need to take a picture for the ID In no establishment, the machine takes it out for you. REQUIREMENTS TO USE THE EXPRESS DNI These are the requirements that you must meet to use this new service. You have to fulfill them alland if there is any that is not fulfilled you will have to renew your document for the traditional channels: They must miss 180 days or less for the expiration of the DNI, that is, to be within their renewal period. Personal data, such as address, must be maintained. The current ID chip must be in perfect condition for the module to read it without problems. It must be a renovation and not a first expedition. In any case, such renewal should not be caused by the loss or theft of the document. The fingerprints They must be read correctly. As is evident, in addition to this it will be necessary that in the police police station where the ID is renewed in your locality, one of these cabins has been installed, something that can take a little longer in some cases. Cover image | Home Office In Xataka Basics | How to share your ID online safely to avoid hazards

Thanks to this table we can finally understand how metals compatibility works

Materials science is an exciting discipline. It is likely that some people seem unattractive, and it is a respectable opinion, but objectively it is about A very important scientific branch. Its purpose is to study the structure, physicochemical properties and the behavior of the elements with the purpose of Design new materials which can be used in a very wide range of industries. The kevlar used in The bulletproof vests and the diaphragm of some speakers, among other applications; the carbon fiber used in the aeronautical, automobile and sports industries; high performance alloys used, for example, in nuclear reactors and The turbines of the aircraft; or the Carbon nanotubes which are already being used in some electronic devices support the relevance of the science of materials currently. Rufosity matters. And a lot One of the properties that usually study material engineers is roughness. This characteristic identifies often imperceptible irregularities that reside on the surface of a material. To measure them, it is usually necessary to carry out a microscopic analysis, but the really important thing is that this knowledge allows researchers to design and manufacture new components. And it is that roughness is an essential parameter that conditions the performance, durability and applications in which a new material can be used. In fact, there are research groups and companies that are dedicated in body and soul to characterize new materials and measure their roughness. Michigan Metrology It is one of these companies. It resides, as we can intuit, in the state of Michigan (USA), and expressly dedicates itself to measurement, analysis and inspection of roughness and wear of surfaces. To carry out their analysis, it resorts to very sophisticated teams that are capable of precisely identifying the irregularities present on the surface of the materials through a three -dimensional exploration. The table we publish on top of these lines has been prepared by the American mechanical engineer Ernest Rabinowicz, and is the Bible for Michigan Metrology and other companies that are dedicated to material engineering. In fact, it is the authentic protagonist of this article. And it is because it gives us a lot of information about the roughness and sliding compatibility of a good part of the metals that we can find in the periodic table of the chemical elements. Two pieces work better together if they are metallurgically incompatible, or, what is the same, if the metals involved are not dissoluble with each other As you can see, Rabinowicz occurred to be placed on the horizontal and vertical axes of the table the symbol that identifies each metal. And at the intersection between each pair of them appears A very illustrative symbol that identifies whether these two metals are incompatible, partially incompatible, partially compatible, compatible or identical taking as reference their roughness. In the field of metallurgy this information is very valuable. And it is because metals that are compatible from a metallurgical point of view tend to adhere to each other, a process that increases friction and wear. As we can intuit, knowing precisely the degree of compatibility between each couple of metals is fundamental in the design of the sliding interface between two metal pieces. In fact, two of these pieces work better together if they are metallurgically incompatible, or, what is the same, if the metals involved are not dissoluble with each other. Image | Kaboomps.com More information | Construction Physics In Xataka | Copper has reigned in the chips industry for decades. It already has an unbeatable substitute: Ruthenium

They report absences of immigrants in works and schools in the face of ICE raids

The undocumented immigrantseven without criminal record, they fear being trapped by Immigration and Customs Control Agents (ICE) that carry out operations nationwide, so various industries and even schools already report absences. “We are seeing absenteeism, not only of workers, but of students in schoolsparents are afraid to send their children to school, ”confirmed Mónica Villalobos, president and CEO of the Arizona Hispanic Chamber of Commerce. Villalobos participated in a press conference with businessmen and business leaders of several states, such as Florida, Texas and Illinois, to talk about the impact of the mass deportation plan of President Donald Trump and how they have negatively impacted migrant populations. “From Chicago, you know that our members report that pedestrian traffic and operations have decreased up to 50% during the last weekonly for fear, ”said Rebecca Shi, executive director of the US Business Immigration Coalition (ABIC), who operates in Illinois. Shi confirmed that in Chicago some companies have faced “difficulties to open”, due to the absence of people. In that city, the Tsar of La Frontera, Tom Homan, has led raids together with even ICE and ATF officers, some companies “Americans have difficulty obtaining some of the products they usually enjoy. So it is definitely having an impact, ”added Shi. Shi acknowledged that the migratory system is broken, but pointed out that most immigrants have been essential workers. “We know that the reality is that, you know, A significant amount of the population has been essential workers who are workingrespecting the law and can have a path to legal status in several bipartisan solutions, ”he said. The negative impacts for deportations in different industries begin to feel, mainly in agriculture, milk production, among other sectors in California, Florida, Texas. The National Agricultural Workers Survey indicates that 73% of agricultural workers are born abroadbut there is a high percentage, about 40%, it has no papers. The dairy sector also depends on undocumented workerswhere about 50% of them have no papers. End of deportation priorities The Trump administration ended with the deportation priorities of President Joe Biden who focused on people with criminal recordgiving ICE officers the ease of deciding to avoid the persecution of a person only for being undocumented. The Trump Executive Order called “Initial termination of harmful orders and executive actions” revokes the 13993 Executive Order of Biden (entitled “Review of the policies and priorities of compliance with the Civil Immigration Law”). “By eliminating that prioritization, anyone who is present without legal authorization in the United States, regardless of their community ties, family ties or how long it has lived here, will be An objective for ICE“, Warned the New York Immigration Coalition Organization (NYIC). The organization also noted that Trump’s immigration policies include expanding accelerated deportation, which was applied mainly for immigrants who were maximum 100 miles from the border. Homan told Fox News that the arrests of undocumented immigrants will increase. “I think the president is happy, but we are going to make it much happier,” said Homan. “These raids will continue throughout the country. We are not going to give up. ” On average, ICE is stopping almost 500 immigrants daily, but on Sunday he reported the arrest of 956, which is considered a record for a single day of operations. Continue reading:• What documents should a foreigner carry in the United States before ICE raids?• Border tsar attack against Pope Francis for criticizing immigrants deportations• The White House spreads the first images of immigrants by addressing a plane to be deported (Tagstotranslate) Donald Trump (T) Ice

This is how this silent (and advanced) system called XProtect works

Malware is not an exclusive threat to PCs. Macs can also become infected. For this reason, there are different third-party security solutions, such as Bitdefender, Intego, Malwarebytes or Avast, among others. What not many people know is that Apple computers have, for more than a decade, had a integrated antivirus called XProtect. XProtect It has been running silently in the background since it landed on Mac OS Unlike Windows Defender, there are no icons in the menu bar, nor do we have an application to manually perform system scans. How does XProtect work on macOS? The Apple ecosystem has a variety of protection measures, and XProtect is one of them. If we focus on macOS, the Mac operating system, Apple tries to avoid the malware from the App Store. The company reviews the applications so that no malicious software lives in its store, but let’s be honest, we don’t always use the App Store. Computers have always given us the freedom to install any compatible external software. To address the issue of external threats, Apple has a certification mechanism, where developers who do not use the App Store to distribute their applications can obtain a trusted certificate for macOS. Apple does not take this task lightly. Scans the applications and grants the certificate only when it cannot find known malware. Once this instance is passed, developers receive a certificate that they can attach to their application so that the target system can verify it, even when it does not have an Internet connection. At this point we find another of the protection measures. This is Gatekeeper, which looks for that certificate in the application that the user is trying to open or install. If the program does not have the corresponding certificate, the system warns users that they are trying to use software that cannot be verified. Since not all developers go through the certification processwe can ignore that message to use the application in question. Sometimes we will have to allow the installation of applications from the App Store and well-known developers from System settings > Privacy and security > Security > Allow applications from… XProtect is responsible for preventing the execution of malicious software. If for any reason the protection measures mentioned above have been violated, XProtect is responsible for preventing the execution of malicious software for the first time or detecting malware that has been executed on the computer. This integrated antivirus uses YARA signatures that are automatically updated periodically. XProtect comes into action at three key moments: when opening an application for the first time, when modifying an application in the file system, and when updating security signatures. If you detect known malware, blocks it immediatelynotifies the user and offers the option to send the software in question to the recycle bin. XProtect’s scope does not end there. Apple has improved the system to address problems that certain infections can cause. Once malicious software is removed, the built-in antivirus continues to scan for threats using a behavioral analysis engine. Of course, it does not have the ability to restart the computer. How do you update macOS built-in antivirus? XProtect updates automatically. However, you can buy if the system is installing the updates automatically. To do this, click the apple icon in the toolbar and then go to System settings > Software Update. Then tap the information icon under Security Answers. In the Automatic Updates category make sure the Install security responses and system files switch is turned on. So am I completely sure now? Although macOS has a solid security system, it is important to clarify that no system is 100% secure. In the world of cybersecurity it is often said that what is sought is to increase the level of difficulty for cybercriminals. And we achieve this in many ways. Integrated system tools are only part of this. The security features of the applications themselves, our security practices and, if necessary, third-party security tools also come into play. The level of difficulty varies according to the needs of each user. For example, for a long time iPhones and Macs can activate Isolation Mode. This is an extreme solution, but it is a good example of what it means to put higher barriers. This mode limits the functionality of applications, web pages, and certain system features. As a result, we obtain a more protected system, but much less useful than in its standard configuration. Images | Apple | Jakub Zerdzicki | Screenshot In Xataka | The Bank of Spain warns of malware capable of “capturing banking credentials.” His name: TrickMo

what it is, how it works and is used, how to hire it and how much it costs

Let’s tell you what is the OpenAI Operatora new launch from the company responsible for ChatGPT with which they are betting on AI agents. But being a quite different product and with other purposes, it is perhaps a little more complicated to understand and more confusing. Therefore, we are going to try to explain everything to you in a simple way. We will start by explaining what AI agents are and what Operator is. Then we will tell you how it works, and we will finish by talking to you about how to access it and the price it costs. What are AI agents This is what Operator looks like in action Operator is an Artificial Intelligence agent created by OpenAI. AI agents are automations that perform actions for you on the computersuch as in the browser. The idea is to streamline processes in which you have to perform several different tasks, and allow the agent to do it for you. It’s going to be something like a virtual secretary. For example, think that you want to go on a trip to a city, and that you have two or three destinations in mind. Currently, what you do is look for hotel options in the cities, look at the weather information, and even see what events that interest you are in these cities to make the decision, and then you book and pay. The agents’ idea is that do all these processes for you. For example, you just write to the agent on your computer (or tell him with your voice) that you want to leave on certain days and that you are thinking about these two or three destinations. Then, the computer is in charge of checking the weather, seeing interesting events, offering you hotel options and collecting and giving you all the options so that you only have to choose one and confirm the payment. However, this is the ultimate goal of the operators. Currently, the options that are being launched are much simpler, although they continue with the objective of being able to do as many things for you. In a few years, this could be a reality. What is Operator? Operator is an AI agent created by OpenAI. It is currently in the development phase, although there are already some users who can start using it. This is an agent that can navigate the web to perform tasks for us. Operator will have the ability to use its own browser to browse the web, and interact with a page writing and clicking and scrolling to find information and perform tasks for us. In this way, what OpenAI wants is for you to be able to tell Operator something like “Reserve me a table for two at Beretta for 7 p.m.”, and for this agent to take care of doing it for you Opening a reservation website, search for the venue, select the date and time, and make the reservation for yourself. If a problem arises such as there is no free place where you want to go, or if some sensitive information about you is required, then it will ask you to intervene. Come on, the idea is not to do things crazy, but to If he can’t do something, he’ll ask you. so you can decide what to do. Following the reservation example, this allows you to choose another date or time, or for you to write your payment method so that the operator does not use your card on its own. But it can also ask you for confirmation of actions or helpthe first in payments and when making final decisions, and the second in other obstacles such as a CAPTCHA or having to write username and password. You will also be able to create custom tasks, configure specific instructions and preferences for automate tasks you do frequently. For example, if every month you make a specific purchase in an online supermarket or do some periodic online action, you can configure this so that Operator does it on its own from time to time. At the moment Operator has only been announced and released to a small group of people. It is in the investigation phasewhich means that they will use the data and feedback from the first users to start fine-tuning it and improving its operation. This also means that at the moment it is not very reliable, and that it can make mistakes. How Operator works Operator uses an own artificial intelligence model. Is called Computer-Using Agent (CUA)and is based on GPT-40. This model is able to “see” what is happening in the browser by taking screenshots, and then allows you to use typical controls such as the cursor or mouse to navigate and take actions on the web page you go to. This model is capable of analyzing and understanding each pixel of the screenshots taken on a website, and thus knowing identify objects on screentext and images. Once it analyzes the content of the website, it does a kind of internal “reasoning” and follows a line of “thought” to carry out the actions. Of course, it is also adapting taking into account past actions. To carry out the tasks, Operator uses an internal browserso you don’t have to install anything. This browser works remotely from OpenAI’s servers, and both your data, what you ask of it, and the captures of the websites end up stored on the company’s servers. This means that, as happens in ChatGPT and almost all AI models that do not work locally on a computer, the company owns the data. OpenAI will then use this data to detect fraudulent activity and to train and improve the model. In any case, you can deactivate this collection from the settings, or decide how long the data is stored. How much does Operator cost? Operator will be included in ChatGPT Pro subscriptionwhich is the one that has a price of 200 dollars a month. Therefore, you cannot hire … Read more

Operator works differently (and better) to other agents who see our screen. Your secret: Cu

We already have OpenAi’s agent. It is called Operatorand it is a system capable of seeing our screen and performing actions autonomously in the browser from our requests. It is something we had already seen with ‘Computer Use’ from Anthropic either Deepmind Marinerbut here the company led by Sam Altman has its own special ingredient. Computer-Useing Agent (Cua). Operator uses a model called Computer-Useing Agent (CUA) that is based on GPT-4O. CUA interprets screenshots and interacts with websites through the typical browser controls, such as a cursor or a mouse. How Cua works. As they explain In Openai’s documentationthis system processes those “raw pixels” of the captures that you make and use a mouse and a virtual keyboard to complete its actions. Once you have the screenshot, “reason” and follow a “thought” line in which the past actions take into account. Promising performance. There are several benchmarks since they allow to evaluate the ability of these agricultural models. According to them tests performed internally In Openai, CUA achieves a 38.1% performance in OSWORLD (Use of a computer in general) against platforms such as Anthropic, which achieves 22%. Humans, yes, achieve 72.4% on average, which makes it clear that these systems still have a lot of improvement margin. In the use of the browser, the Benchmarks Webarena and Webvoyager also allow Operator to score very high: 58.1% and 87% respectively, compared to 36.2% and 56% of their competitors. What about those catches that I collect operator. Operator continuously performs screenshots to “see” the browser interface with which he interacts. That browser does not run on our PC, but in a remote browser on OpenAI servers. User data, including these catches, are used according to OpenAI’s privacy policy. This is: they can be used to detect fraudulent activities and to improve the service. That implies that our data can be used to train and improve the model, although We can deactivate that option In operator settings. The user, yes, has the capacity for how long this data is stored in Operator. By default these data are saved until the user decides to delete them. An agent who asks for help (and confirmation) when he needs them. As we have seen in other agents such as ‘Computer Use’ of Anthropic, Operator is an agent who does not act crazy. If you meet an obstacle – like a captcha code or the request to introduce user and password on a website – you will ask that the user take control, and will also ask for the final user confirmation if for example we have to validate a reservation or purchase of a product that has sought Operator. The operator user can also take control at all times. This is how it works. Source: OpenAi Do not release the steering wheel. This reminds us of assisted driving systems such as Tesla FSD. It is true that it is able to take us from one place to another once we introduce the destination address, but it is important to continue paying attention and have our hands in the steering wheel in case they occur unforeseen. With Operator and the rest of this type agents something similar happens. There are things that cannot be done. At the moment Operator cannot complete specialized tasks such as managing complex calendar systems or interacting with very personalized or non -standard websites. You will also refuse to do some tasks with high risk of provoking damages. For example, send emails, make electronic transactions or delete calendar events. Its benefits and capabilities will increase, without a doubt, but they will gradually do so and always guaranteeing that the possibility of error is the least possible. Image | OpenAI In Xataka | The generative AI seems stagnant. Big tech believe they have an ace in the sleeve: “agents” who do things for us

Blanca Suárez uses Úrsula Corberó’s anti-aging treatment and works on the area of ​​the face that ages the most at home

Blanca Suarezwho we will be able to see again on the big screen this spring with the premiere of The trace of evila film directed by Manuel Ríos San Martín, has always defended natural and unfiltered beauty. In fact, he posts frequently on his social networks. photos without makeup in which we see her boasting a radiant face. © Getty Images The actress take good care of your skin and shares some of her beauty secrets with her virtual followers. He especially likes masksyes. Combine its use at home with cabin beauty treatments to show off a face that is always young and free of imperfections. © ursulolita © blanca_suarez Blanca Suárez and Úrsula Corberó connected by the treatment that is in fashion “Living exomada”Blanca Suárez wrote on social networks after having acquired the doctor Lidia Maroñas, founder and medical director of Clínica Oneskinmed (located in the heart of the Chamberí neighborhood, in Madrid) a exosome treatment. Úrsula Corberó, like Kim Kardashian, Kourtney, Sofía Vergara and Sarah Hyland, also uses this to show off radiant skin. This regenerative therapy, based on the action of stem cells, improves skin in an incredible way: unifies spots, illuminates, combats expression wrinkles and firmness. This is explained by Elizabeth Álvarez, founder of Inout, the beauty center that Corberó chooses, precisely. Elizabeth tells us that It has been investigated since the 80s of the last century. at a regenerative level, but it is now when it is incorporated into skin aging procedures. Exosomes contain genetic material, proteins and growth factors, among other substances. They are capable of stimulate collagen and elastinhydrate, repair DNA damage, protect from oxidative stress, improve skin texture, reduce spots and treat dermatitis or psoriasis. Next to nothing! In Spain, to date, Only those of plant origin and topical origin are authorizedalthough it is expected that they can be injected in the near future. At the moment, on a topical level, they leave wonderful results and you just have to see it on the faces of Úrsula and Blanca. The second, furthermore, work on an important area of ​​the face at home that It is worth taking care of to show off an always young face.. © blanca_suarez The area of ​​the face that, like Blanca Suárez, you should work on Although also resort to clay and gel masksthe Madrid have recently worn a face veil that specifically affects the so-called nasolabial fold. We call the nasolabial fold the line that extends across the cheekbones, cheeks and around the mouth; a line that becomes accentuated with the passage of time. © blanca_suarez © blanca_suarez Dr. Carlos Gómez, a specialist in aesthetic medicine, assures that “we are used to referring to the nasolabial fold in general, but this unsightly problem is the sum of the appearance of three very marked lines: the nasolacrimal, nasolabial and labiomental or mental lines. puppet and that they are a product of facial sagging process that happens over the years, as well as the bone and fat loss in the cheekbone area“. Therefore, although Using the so-called nasolabial patches like those from Blanca Suárez can help you a lot, it is essential to also work the cheekbones. In this sense, the doctor is clear: “Anatomically, The nasolabial fold is formed as a result of loss of bone and fat structure of the entire cheekbone regiontherefore, returning the lost volume to that structure and stimulating again the collagen and elastin formation allows us to reverse the nasolabial fold from the origin and the rest signs of aging tensing upwards”. © Getty Images How can we prevent it from being marked more? To work the cheekbones, we can not only resort to hyaluronic acid in aesthetic medicine, allowing ourselves to be advised by professionals, but we can also use other methods such as yoga and facial gymnastics. The facial gym firm Work Your Face offers its own method based on manual massages, called Workouts, aimed at train facial muscles in the same way that pursues fitness body, working each muscle correctly and in depth until it is strengthened. A few more minutes of reinforcement can be added to these workouts depending on each case, either due to skin needs or to work on specific areas such as the neck, shoulders or neckline, or the nasolabial fold. © Getty Images The best solution and some recommended products It must be taken into account that, as stated by Dr. Guillermo Llopis, from Clínica Ferraro, “there is no conclusive scientific evidence that supports the benefits of facial yoga to define the face.” Yes they can help us tone certain muscles But we will perceive the real difference when we work on all levels: bone, muscle and skin. “As There are many factors that influence agingwe work on different levels, both the bone, the superficial fatty compartments and the outermost part of the skin,” explains Dr. Llopis. As always, the best thing is a 360 approach and keep in mind that the foundation on which doctors and experts work is laid by oneself. That is why physical exercise to maintain good bone and muscle health, as well as diet, home treatments and a good self-care routine, are crucial. According to pharmacist Marta Munar, from G19, active ingredients such as retinol, glycolic acid or peptides are capable of inducing the synthesis of collagen and elastin and to combat the results of its degradation. Others like him hyaluronic acid They are capable of retaining water to fill wrinkles and reduce expression lines. He also tells us that the vitamin C It acts preventively due to its antioxidant action that stops the degradation of the two supporting proteins. In line with this, we show you some products that can help you. Signing laugh line mask, by Croma The Croma firming mask for expression lines is enriched with hyaluronic acid to intensely hydrate and soothe the skin of the nasolabial folds. Carefully selected ingredients include palmitoyl hexapeptide, a biomimetic peptide that provides a firming effect and smoothes … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.