{"id":8995,"date":"2015-12-17T12:39:32","date_gmt":"2015-12-17T11:39:32","guid":{"rendered":"https:\/\/xnet-x.net\/?p=8995"},"modified":"2021-07-01T12:21:05","modified_gmt":"2021-07-01T10:21:05","slug":"right-to-privacy-and-encryption","status":"publish","type":"post","link":"https:\/\/xnet-x.net\/ca\/dret-privacitat-encriptacio\/","title":{"rendered":"Dret a la Privacitat i l&#8217;Encriptaci\u00f3"},"content":{"rendered":"<p>Els perills per als drets fonamentals de privacitat i llibertat d&#8217;expressi\u00f3 dels ciutadans que suposen les pr\u00e0ctiques abusives de vigil\u00e0ncia d&#8217;empreses privades i\/o governs s&#8217;estan debatent a la Uni\u00f3 Europea i a nivell internacional.<\/p>\n<p>Com a ciutadans, tenim dret a protegir-nos de pr\u00e0ctiques com aquestes. Les nostres dades personals i les nostres comunicacions s\u00f3n part de la nostra vida privada, i com a tal han de ser tractats.<\/p>\n<blockquote><p><strong style=\"font-style:normal\"> Carta oberta als governs per un encriptat forta, unes comunicacions segures i en defensa de la privacitat:<\/p>\n<div style=\"font-size:90%\">https:\/\/securetheinternet.org\/?lang=es<\/strong><\/p>\n<p>Encoratgem als l\u00edders mundials a donar suport a la seguretat dels usuaris, empreses i governs mitjan\u00e7ant l&#8217;enfortiment de la integritat de les comunicacions i els sistemes. Per aconseguir-ho, els governs haurien de rebutjar lleis, pol\u00edtiques i altres mandats o pr\u00e0ctiques, -incloent acords secrets amb les empreses- que limitin l&#8217;acc\u00e9s o malmetin el xifrat i altres tecnologies i eines de comunicaci\u00f3 segura.<\/p>\n<ul>\n<li style=\"margin-bottom:15px\">&#8211; Els governs no haurien de prohibir ni limitar l&#8217;acc\u00e9s dels usuaris a les tecnologies de xifrat; o prohibir l&#8217;\u00fas de xifrat per graus o tipus; <\/li>\n<li style=\"margin-bottom:15px\">&#8211;  Els governs no haurien d&#8217;exigir el disseny o la implementaci\u00f3 de &#8220;portes del darrere&#8221; (backdoors) o vulnerabilitats en eines, tecnologies o serveis; <\/li>\n<li style=\"margin-bottom:15px\">&#8211;  Els governs no haurien de requerir que les eines, tecnologies o serveis siguin dissenyats o desenvolupats per permetre l&#8217;acc\u00e9s de tercers a dades sense xifrar o a les claus de xifrat;<\/li>\n<li style=\"margin-bottom:15px\">&#8211; Els governs no haurien de tractar d&#8217;afeblir o soscavar els est\u00e0ndards de xifrat o influir intencio-ment en el seu desenvolupament, llevat que sigui per promoure un major nivell de seguretat de la informaci\u00f3 formaci\u00f3.<\/li>\n<li style=\"margin-bottom:20px\">-Cap govern hauria d&#8217;exigir algoritmes, est\u00e0ndards, eines o tecnologies de xifrat in-seguros. Tampoc hauria, mitjan\u00e7ant acord privat o p\u00fablic, obligar o pressionar entitats perqu\u00e8 actu\u00efn de manera incompatible amb els principis anteriors.<\/li>\n<\/ul>\n<\/div>\n<\/blockquote>\n<p><strong>Documents oficials de la Uni\u00f3 Europea i de les Nacions Unides reconeixen l&#8217;encriptaci\u00f3 cap a cap com l&#8217;\u00fanica opci\u00f3 en mans de la poblaci\u00f3 per defensar-se contra la vigil\u00e0ncia massiva<\/strong>. Aix\u00ed mateix, els informes posen l&#8217;accent en la necessitat de fomentar pol\u00edtiques que prohibeixin les pr\u00e0ctiques que pretenguin limitar l&#8217;\u00fas o afeblir t\u00e8cnicament la encriptaci\u00f3.<\/p>\n<p>Hem resumit els continguts de tots dos documents a continuaci\u00f3 (en angl\u00e8s) i posem a disposici\u00f3 els documents \u00edntegres enlla\u00e7ats, perqu\u00e8 puguin ser usats com a eina i base per defensar i exigir el nostre dret a la privacitat ia la encriptaci\u00f3:<\/p>\n<div style=\"background:white; padding: 15px 5%\">\n<h3>European Parliament Science and Technology Options Assessment (STOA) on Mass Surveillance<\/h3>\n<p>Read the <a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2015\/527409\/EPRS_STU(2015)527409_REV1_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">full text<\/a><\/p>\n<p>The publication of the secret documents leaked by Edward Snowden disclosing controversial mass surveillance programmes by intelligence and national security agencies has evoked an international debate on the right of citizens to be protected from illegitimate or warrantless  collection and analysis of their data and meta-data.<\/p>\n<p>The agencies involved in mass surveillance practices justify these methods with the doctrine of pre-emptive prevention of crime and terrorism. While targeted lawful interception constitutes a necessary and legitimate instrument of intelligence and law enforcement agencies, mass surveillance is considered a threat to civil liberties such as the right to freedom of opinion and expression. These civil liberties are essential human rights in democratic societies and of particular importance for safeguarding independent journalism and political opposition.<\/p>\n<p>For an end user it is practically impossible to detect whether data and meta-data generated is being analysed or used by third parties and even less, if a system is subject to a complex attack orchestrated by powerful opponents like government agencies.<\/p>\n<p>To protect citizens&#8217; rights of privacy and freedom of expression in front of mass surveillance the issue must be addressed technical and politically. <\/p>\n<p style=\"text-indent: 20px;\"><strong>Technical options available to citizens for counteracting mass surveillance, first and above all, encryption<\/strong>, a statement that is shared and confirmed by the security community and Edward Snowden, who says that <em>\u201cProperly implemented strong crypto  systems are one of the few things that you can rely on.\u201d<\/em><\/p>\n<p>Yet, policy makers must understand that the problem of mass surveillance cannot be solved on a technical terrain, but needs to be addressed on a political level.<\/p>\n<p>Security agencies will always have a competitive advantage in winning a race for technological supremacy in Internet security due to the resources at their command.<\/p>\n<p>An adequate balance between civil liberties and legitimate national security interests has to be found, based on a public discussion that empowers citizens to decide upon their civil rights affected and the societal values at stake.<\/p>\n<p style=\"text-indent: 20px;\"><strong>To reduce the risk of privacy intrusion by mass surveillance encryption must be promoted and defended<\/strong>. Policy options that are considered of help in reducing the risk of privacy intrusion.<\/p>\n<p>&nbsp;<br \/>\na) Promote and invest in resilient open source implementations of different encryption specifications that can be verified and validated for correctness<\/p>\n<p>b) The promotion of open source operating systems and applications that allow for constant inspection and scrutiny by a large community of experts and verification and validation bodies<\/p>\n<p>c) Investing in and stimulating the integration of user friendly, utility-like encryption software solutions<\/p>\n<p>d) Regulate Telecom Operators to apply security mechanisms in form of adequate encryption over their entire networks, avoiding backhauls<\/p>\n<p>e) Invest in user awareness creation (\u201cknow the digital traces you are leaving\u201d) about who, under which conditions, where and when can access private data and what is being done with it<\/p>\n<p>f) Regulations that require applications to adopt maximum privacy settings as default\n<\/p><\/div>\n<p>&nbsp;<\/p>\n<div style=\"background:white; padding: 15px 5%\">\n<h3>United Nations report on the promotion and protection of the right to freedom of opinion and expression<\/h3>\n<p>Read the <a href=\"http:\/\/www.ohchr.org\/EN\/HRBodies\/HRC\/RegularSessions\/Session29\/Documents\/A.HRC.29.32_AEV.doc\" target=\"_blank\" rel=\"noopener noreferrer\">full text<\/a><\/p>\n<p>Contemporary digital technologies offer Governments, corporations and criminals unprecedented capacity to interfere with the rights to freedom of opinion and expression, and to perform online censorship, mass and targeted surveillance and data collection, digital attacks on civil society and repression force individuals around the world.<\/p>\n<p>Encryption and anonymity, today\u2019s leading vehicles for online security, provide individuals with a means to protect their privacy, empowering them to browse, read, develop and share opinions and information without interference and enabling journalists, civil society organizations, members of ethnic or religious groups, those persecuted because of their  sexual orientation or gender identity, activists, scholars, artists and others to exercise the rights to freedom of opinion and expression. Such security may be essential for the exercise of rights, including economic rights, privacy, due process, freedom of peaceful assembly and association, and the right to life and bodily integrity. <\/p>\n<p>Because of their importance, restrictions on encryption and anonymity must be strictly limited. The United Nations rapporteur on the promotion and protection of the right to freedom of opinion and expression therefore recommends the following:<\/p>\n<ul>\n<li>States should adopt policies of non-restriction or comprehensive protection of encryption and anonymity, only adopt restrictions on a case-specific basis and that meet the requirements of legality, necessity, proportionality and legitimacy in objective, require court   orders for any specific limitation.<\/li>\n<li>Discussions of encryption and anonymity have all too often focused only on their potential use for criminal purposes in times of terrorism. But emergency situations do not relieve States of the obligation to ensure respect for international human rights law. General debate should highlight the protection that encryption and anonymity provide, especially to the groups most at risk of unlawful interferences. <\/li>\n<li>States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online and promote security and privacy online through public education. Legislation and regulations protecting human rights defenders and journalists should also include provisions enabling access and providing support to use the technologies to secure their communications.<\/li>\n<li>States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards. In addition, States should refrain from making the identification of users a condition for access to digital communications and online services and requiring SIM card registration for mobile users. Corporate actors should likewise consider their own policies that restrict encryption and anonymity (including through the use of pseudonyms). <\/li>\n<li>Court-ordered decryption may only be permissible when it results from transparent and publicly accessible laws applied solely on a targeted, case-by-case basis to individuals (i.e., not to a mass of people).<\/li>\n<li>States, international organizations, corporations and civil society groups should promote online security and access to encryption and anonymity without discrimination.<\/li>\n<li>Companies, like States, should refrain from blocking or limiting the transmission of encrypted communications and permit anonymous communication.<\/li>\n<li>Corporate actors that supply technology to undermine encryption and anonymity should be especially transparent as to their products and customers.<\/li>\n<li>The use of encryption and anonymity tools and better digital literacy should be encouraged. Since the value of encryption and anonymity tools depends on their widespread adoption; states, civil society organizations and corporations are encouraged to engage in a campaign to bring encryption by design and default to users around the world and, where necessary, to ensure that users at risk be provided the tools to exercise their right to freedom of opinion and expression securely.<\/li>\n<\/ul>\n<\/div>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>.@X_net_ informa sobre el dret a la #privacitat i l&#8217; #encriptaci\u00f3. Com defensar el nostre dret fonamental a la privacitat i l&#8217;encriptaci\u00f3 contra la seva vigil\u00e0ncia massiva.<\/p>\n","protected":false},"author":8,"featured_media":8996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-8995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","ejes-libertad-expresion-informacion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n<\/title>\n<meta name=\"description\" content=\"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\"},\"author\":{\"name\":\"Xnet\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\"},\"headline\":\"Dret a la Privacitat i l&#8217;Encriptaci\u00f3\",\"datePublished\":\"2015-12-17T11:39:32+00:00\",\"dateModified\":\"2021-07-01T10:21:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\"},\"wordCount\":4567,\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"articleSection\":[\"Blog - Les nostres accions\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/\",\"url\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/\",\"name\":\"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"datePublished\":\"2015-12-17T11:39:32+00:00\",\"dateModified\":\"2021-07-01T10:21:05+00:00\",\"description\":\"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.\",\"breadcrumb\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#primaryimage\",\"url\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Derecho a la Privacidad y la Encriptaci\u00f3n frente a la vigilancia masiva\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/xnet-x.net\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Derecho a la Privacidad y a la Encriptaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#website\",\"url\":\"https:\/\/xnet-x.net\/ca\/\",\"name\":\"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]\",\"description\":\"Xnet: Internet, informaci\u00f3 i cultura lliures. Tecnopol\u00edtica. Dades, algoritmes i drets digitals. Llibertat d&#039;expressi\u00f3. Democr\u00e0cia i anticorrupci\u00f3\",\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xnet-x.net\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#organization\",\"name\":\"Xnet - Internet, drets i democr\u00e0cia en l'era digital\",\"url\":\"https:\/\/xnet-x.net\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Xnet - Internet, drets i democr\u00e0cia en l'era digital\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/RedX.Net\/\",\"https:\/\/x.com\/x_net_\",\"https:\/\/es.wikipedia.org\/wiki\/Xnet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\",\"name\":\"Xnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"caption\":\"Xnet\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n","description":"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/","twitter_misc":{"Written by":"Xnet","Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#article","isPartOf":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/"},"author":{"name":"Xnet","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637"},"headline":"Dret a la Privacitat i l&#8217;Encriptaci\u00f3","datePublished":"2015-12-17T11:39:32+00:00","dateModified":"2021-07-01T10:21:05+00:00","mainEntityOfPage":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/"},"wordCount":4567,"publisher":{"@id":"https:\/\/xnet-x.net\/es\/#organization"},"image":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","articleSection":["Blog - Les nostres accions"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/","url":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/","name":"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n","isPartOf":{"@id":"https:\/\/xnet-x.net\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#primaryimage"},"image":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","datePublished":"2015-12-17T11:39:32+00:00","dateModified":"2021-07-01T10:21:05+00:00","description":"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.","breadcrumb":{"@id":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/"]]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#primaryimage","url":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","contentUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","width":1200,"height":800,"caption":"Derecho a la Privacidad y la Encriptaci\u00f3n frente a la vigilancia masiva"},{"@type":"BreadcrumbList","@id":"https:\/\/xnet-x.net\/ca\/derecho-privacidad-encriptacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/xnet-x.net\/ca\/"},{"@type":"ListItem","position":2,"name":"Derecho a la Privacidad y a la Encriptaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/xnet-x.net\/ca\/#website","url":"https:\/\/xnet-x.net\/ca\/","name":"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]","description":"Xnet: Internet, informaci\u00f3 i cultura lliures. Tecnopol\u00edtica. Dades, algoritmes i drets digitals. Llibertat d&#039;expressi\u00f3. Democr\u00e0cia i anticorrupci\u00f3","publisher":{"@id":"https:\/\/xnet-x.net\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xnet-x.net\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/xnet-x.net\/ca\/#organization","name":"Xnet - Internet, drets i democr\u00e0cia en l'era digital","url":"https:\/\/xnet-x.net\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/xnet-x.net\/img\/xnet-logo.png","contentUrl":"https:\/\/xnet-x.net\/img\/xnet-logo.png","width":512,"height":512,"caption":"Xnet - Internet, drets i democr\u00e0cia en l'era digital"},"image":{"@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/RedX.Net\/","https:\/\/x.com\/x_net_","https:\/\/es.wikipedia.org\/wiki\/Xnet"]},{"@type":"Person","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637","name":"Xnet","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","caption":"Xnet"}}]}},"_links":{"self":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/8995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/comments?post=8995"}],"version-history":[{"count":17,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/8995\/revisions"}],"predecessor-version":[{"id":19306,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/8995\/revisions\/19306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/media\/8996"}],"wp:attachment":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/media?parent=8995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/categories?post=8995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/tags?post=8995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}