{"id":12978,"date":"2017-09-21T14:03:02","date_gmt":"2017-09-21T13:03:02","guid":{"rendered":"https:\/\/xnet-x.net\/?p=12978"},"modified":"2025-01-23T18:28:24","modified_gmt":"2025-01-23T16:28:24","slug":"que-hacer-cuando-nos-bloquean-internet-manual-tecnico-en-caso-de-apagon","status":"publish","type":"post","link":"https:\/\/xnet-x.net\/en\/how-to-guide-for-preserving-fundamental-rights-internet\/","title":{"rendered":"Basic how-to guide for preserving fundamental rights on the Internet"},"content":{"rendered":"<p>Download Orbot\" href='https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Orbot\" aria-describedby=\"gallery-1-12983\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12983'>\n\t\t\t\t<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.torproject.android\" target=\"_blank\">Download Orbot<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open and start Orbot\" href='https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Open and start Orbot\" aria-describedby=\"gallery-1-12984\" srcset=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12984'>\n\t\t\t\tOpen and start Orbot\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You are connected to the Tor network\" href='https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"You are connected to the Tor network\" aria-describedby=\"gallery-1-12985\" srcset=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12985'>\n\t\t\t\tYou are connected to the Tor network\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" href='https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" aria-describedby=\"gallery-1-12986\" srcset=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12986'>\n\t\t\t\tClick on &#8220;Apps in VPN mode&#8221;. You do not need to install Orfox, you can use your usual browser.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Select the Apps that you can not access to because of the blocking\" href='https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Select the Apps that you can not access to because of the blocking\" aria-describedby=\"gallery-1-12987\" srcset=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12987'>\n\t\t\t\tSelect the Apps that you can not access to because of the blocking\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You can also select your browser, other apps, or everything (increases battery consumption)\" href='https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You can also select your browser, other apps, or everything (increases battery consumption)\" aria-describedby=\"gallery-1-12988\" srcset=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12988'>\n\t\t\t\tYou can also select your browser, other apps, or everything (increases battery consumption)\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" href='https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" aria-describedby=\"gallery-1-12989\" srcset=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-768x1365.png 768w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12989'>\n\t\t\t\tVerify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works  <a href=\"https:\/\/check.torproject.org\/\" target=\"_blank\">here<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"To add more Apps to Orbot go to Settings\" href='https:\/\/xnet-x.net\/img\/8-sttings-orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"To add more Apps to Orbot go to Settings\" aria-describedby=\"gallery-1-12990\" srcset=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-sttings-orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12990'>\n\t\t\t\tTo add more Apps to Orbot go to Settings\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"and there &#039;Select Apps&#039;\" href='https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png\" class=\"attachment-medium size-medium\" alt=\"and there &#039;Select Apps&#039;\" aria-describedby=\"gallery-1-12992\" srcset=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png 169w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-768x1365.png 768w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-576x1024.png 576w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-1-12992'>\n\t\t\t\tand there &#8216;Select Apps&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-iPhone\"><\/a><\/p>\n<h3>Tor en iPhone: Onion Browser<\/h3>\n<p>Para iPhone no existe una aplicaci\u00f3n que permita utilizar la red Tor para cualquier aplicaci\u00f3n instalada en el dispositivo. No obstante, con el navegador Onion Browser se puede acceder a sitios web y a la versi\u00f3n web de aplicaciones bloqueadas arbitrariamente.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-2 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-2 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-2 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-2 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-2' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" href='https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" aria-describedby=\"gallery-2-13012\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-2-13012'>\n\t\t\t\t<a href='https:\/\/itunes.apple.com\/us\/app\/onion-browser-secure-anonymous-web-with-tor\/id519296448?mt=8' target='_blank'>Download Onion Browser<\/a> for iPhone; open it and select &#8216;connect to Tor&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"From here you can access blocked websites and blocked web apps\" href='https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"From here you can access blocked websites and blocked web apps\" aria-describedby=\"gallery-2-13011\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-2-13011'>\n\t\t\t\tFrom here you can access blocked websites and blocked web apps\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-PC\"><\/a><\/p>\n<h3>Tor en PC: Navegador Tor<\/h3>\n<p>Descargar el navegador <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tor para PC (Linux \/ MacOS \/ Windows)<\/a>.<br \/>\nV\u00eddeo: C\u00f3mo usar Tor en PCs creado para el lanzamiento de la <a href=\"https:\/\/xnet-x.net\/buzon-denuncias-anonimas-ciudad-barcelona-bustia-etica\/\" target=\"_blank\" rel=\"noopener noreferrer\">B\u00fastia \u00c9tica<\/a> de l&#8217;Ajuntament de Barcelona (CAT):<\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"Tdmq8qCEncI\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a id=\"VPN\"><\/a><\/p>\n<h3>VPN<\/h3>\n<p>Una VPN (<em>Virtual Private Network<\/em>) te permite crear una red local virtual. Esto permite que antes de salir al Internet abierto, tus datos viajen por una conexi\u00f3n cifrada, una especie de t\u00fanel, y se conecten a la red global desde otra localizaci\u00f3n.<br \/>\nLa aplicaci\u00f3n m\u00e1s f\u00e1cil y r\u00e1pida de instalar para  activar una conexi\u00f3n VPN es Bitmask, que adem\u00e1s es gratuita. De momento solo est\u00e1 disponible para m\u00f3viles Android y PCs Linux aunque su versi\u00f3n para MacOs iPhone est\u00e1 a punto de ser publicada y m\u00e1s adelante tambi\u00e9n su versi\u00f3n Windows. Sin embargo, existen muchos servicios de pago muy econ\u00f3micos que ofrecen conexi\u00f3n VPN para todo tipo de dispositivos, por ejemplo <a href=\"https:\/\/protonvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ProtonVPN<\/a> que ofrece tambi\u00e9n una versi\u00f3n limitada de prueba &#8211; v\u00e9ase m\u00e1s abajo indicaciones para utilizar servicios de Internet que garanticen la preservaci\u00f3n de la privacidad e informaci\u00f3n.<br \/>\nEs aconsejable disponer de ambas opciones Tor y VPN. As\u00ed, en caso de que se bloqueara el tr\u00e1fico a trav\u00e9s de Tor, se puede usar la VPN, y viceversa.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-3 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-3 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-3 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-3 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-3' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Download and install Bitmask\" href='https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Download and install Bitmask\" aria-describedby=\"gallery-3-13025\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13025'>\n\t\t\t\tDownload and install <a href=\"https:\/\/bitmask.net\/es\/install\" target=\"_blank\">Bitmask<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open it. Select a provider. Any one of the 3 works \" href='https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Open it. Select a provider. Any one of the 3 works\" aria-describedby=\"gallery-3-13026\" srcset=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13026'>\n\t\t\t\tOpen it. Select a provider. Any one of the 3 works\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Register (or initiate session )\" href='https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Register (or initiate session )\" aria-describedby=\"gallery-3-13027\" srcset=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13027'>\n\t\t\t\tRegister (or initiate session )\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Choose a username and password\" href='https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Choose a username and password\" aria-describedby=\"gallery-3-13028\" srcset=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13028'>\n\t\t\t\tChoose a username and password\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"After logging in, start Bitmask\" href='https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"After logging in, start Bitmask\" aria-describedby=\"gallery-3-13029\" srcset=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13029'>\n\t\t\t\tAfter logging in, start Bitmask\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Accept connection via VPN\" href='https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Accept connection via VPN\" aria-describedby=\"gallery-3-13030\" srcset=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13030'>\n\t\t\t\tAccept connection via VPN\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You will see an icon in the top bar indicating that you are logged in\" href='https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You will see an icon in the top bar indicating that you are logged in\" aria-describedby=\"gallery-3-13031\" srcset=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13031'>\n\t\t\t\tYou will see an icon in the top bar indicating that you are logged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Display the top notification menu to check the status of Bitmask or turn it off\" href='https:\/\/xnet-x.net\/img\/8-info-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Display the top notification menu to check the status of Bitmask or turn it off\" aria-describedby=\"gallery-3-13032\" srcset=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-info-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-info-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-3-13032'>\n\t\t\t\tDisplay the top notification menu to check the status of Bitmask or turn it off\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Para la correcta configuraci\u00f3n de la conexi\u00f3n VPN, sin la cual no solo no podras superar el bloqueo sino que dejas al descubierto tus datos de conexi\u00f3n, es importante asegurar que no estamos sufriendo lo que es conocido como &#8216;Fuga de DNS&#8217;.<a id=\"Cifrado\"><\/a> En la p\u00e1gina <a href=\"https:\/\/hidester.com\/dns-leak-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Leak test<\/a> se explica y se lleva a cabo el test para comprobarlo y como solucionarlo.<br \/>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-4 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-4 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-4 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-4 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-4' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Visit the page DNS Leak test\" href='https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Visit the page DNS Leak test\" aria-describedby=\"gallery-4-13110\" srcset=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-4-13110'>\n\t\t\t\tVisit the page <a href=' https:\/\/hidester.com\/dns-leak-test\/' target='_blank'>DNS Leak test<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Perform a test without the VPN connected. Look at the data.\" href='https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Perform a test without the VPN connected. Look at the data.\" aria-describedby=\"gallery-4-13112\" srcset=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-4-13112'>\n\t\t\t\tPerform a test without the VPN connected. Look at the data.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it. \" href='https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\" aria-describedby=\"gallery-4-13111\" srcset=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-4-13111'>\n\t\t\t\tConnect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n<\/p>\n<h2><a href=\"#Cifrado\">#<\/a> Cifrado de dispositivos m\u00f3viles<\/h2>\n<p>Cifrar los dispositivos, sobretodo los tel\u00e9fonos m\u00f3viles, es esencial para mantener la privacidad de los datos personales en caso de que se pierda o sea sustra\u00eddo. Por ello, la mayor\u00eda de <em>smartphones<\/em> llevan de serie herramientas instaladas que permiten, en unos cuantos pasos simples, cifrar todo el dispositivo y se recomienda hacerlo proteger la privacidad de los datos, cuentas, contactos e informaci\u00f3n del usuario.<\/p>\n<h3>Cifrado de dispositivo m\u00f3vil: ejemplo con Android<\/h3>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-5 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-5 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-5 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-5 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-5' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" href='https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" aria-describedby=\"gallery-5-13037\" srcset=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-5-13037'>\n\t\t\t\tThe device encryption option is in &#8216;Settings&#8217; -> &#8216;Additional settings&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Privacy&#039;\" href='https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Privacy&#039;\" aria-describedby=\"gallery-5-13038\" srcset=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-768x1365.png 768w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-5-13038'>\n\t\t\t\t&#8216;Privacy&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Device Encryption&#039;\" href='https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Device Encryption&#039;\" aria-describedby=\"gallery-5-13039\" srcset=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-768x1365.png 768w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-5-13039'>\n\t\t\t\t&#8216;Device Encryption&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in  \" href='https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png\" class=\"attachment-medium size-medium\" alt=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in\" aria-describedby=\"gallery-5-13040\" srcset=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-768x1365.png 768w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-5-13040'>\n\t\t\t\tIn order to encrypt the device you need to have the battery charged and it should also be plugged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" href='https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png\" class=\"attachment-medium size-medium\" alt=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" aria-describedby=\"gallery-5-13041\" srcset=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-5-13041'>\n\t\t\t\tWhen loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Cifrado de m\u00f3viles <a href=\"https:\/\/ssd.eff.org\/es\/module\/c%C3%B3mo-encriptar-su-iphone\" rel=\"noopener noreferrer\" target=\"_blank\">iPhone<\/a>.<\/p>\n<p>En geneal, como buena pr\u00e1ctica, no se debe almacenar informaci\u00f3n innecesaria en los dispositivos, borra peri\u00f3dicamente. Aunque est\u00e9s seguro que todo lo que tienes es absolutamente legal, recuerda que no eres t\u00fa, sino el poder el que decide que es legal y que no es legal, y lo que hoy es legal podr\u00eda no serlo ma\u00f1ana en el caso de que un r\u00e9gimen se vuelva autoritario. Eliminar y vaciar la papelera no es suficiente, hay que utilizar herramientas espec\u00edficas que sobrescriben los datos varias veces. M\u00e1s informaci\u00f3n y herramientas para hacerlo <a href=\"https:\/\/securityinabox.org\/es\/guide\/destroy-sensitive-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">aqu\u00ed<\/a> (se descubri\u00f3 una puerta trasera en CCleaner para windows que ya ha sido <a href=\"http:\/\/www.piriform.com\/news\/blog\/2017\/9\/18\/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users\">parcheada<\/a>, descarga siempre la \u00faltima versi\u00f3n). <\/p>\n<p>Recuerda tambi\u00e9n crear y mantener contrase\u00f1as seguras, \u00fanicas y fuertes. Algunos consejos de como hacerlo <a href=\"https:\/\/securityinabox.org\/en\/guide\/passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">aqu\u00ed<\/a> (nota: el desbloqueo por patr\u00f3n es siempre mucho m\u00e1s d\u00e9bil que una contrase\u00f1a alfanum\u00e9rica).<\/p>\n<p><em style=\"font-size:90%\">Nota para el Estado espa\u00f1ol: En caso de que las fuerzas de seguridad requisen el dispositivo de alguien en calidad de investigado, esa persona tiene derecho a no revelar sus claves de cifrado, PIN, patr\u00f3n de desbloqueo, contrase\u00f1a o similares, dentro del derecho a no declarar contra uno mismo (Ley de Enjuiciamiento Criminal <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a118\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 118 h<\/a> y<a id=\"Alojamiento\"><\/a> <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a588septiesb\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 588 septies b 2<\/a>; explicado en este <a href=\"https:\/\/www.asktheeu.org\/en\/request\/3347\/response\/11918\/attach\/5\/Encryption%20questionnaire%20ES%20DRAFT%20PA.pdf#page2\" target=\"_blank\" rel=\"noopener noreferrer\">documento<\/a> a la Secretar\u00eda de Estado de Uni\u00f3n Europea).<\/em><\/p>\n<h2><a href=\"#Alojamiento\">#<\/a> Alojamiento: privacidad y seguridad<\/h2>\n<p>La censura a sitios web por parte de un gobierno autoritario puede darse a otro nivel m\u00e1s profundo cuando en lugar de bloquear el acceso a la web a trav\u00e9s de la red, se cierra la p\u00e1gina ya sea interviniendo en los servidores o requisando el dominio. En este caso herramientas como Tor o una VPN no podr\u00e1n ser de ninguna ayuda.<\/p>\n<p>Para prevenir esta situaci\u00f3n (o crear un <em>mirror<\/em> &#8211; copia de la misma web &#8211; en un alojamiento seguro si la web ya ha sido censurada), los ciudadanos que viven en estados autoritarios no deben alojar sus contenidos en un servidor dentro del territorio de su pa\u00eds. Es necesario buscar y escoger pa\u00edses donde el marco legal ofrezca garant\u00edas fuertes respecto a la libertad de expresi\u00f3n e informaci\u00f3n donde situar el <em>hosting<\/em>. <\/p>\n<p>Tampoco deben registrar el dominio de su sitio web susceptible a ser censurado con <em>Top Level Domains<\/em> propios del pa\u00eds. Es m\u00e1s f\u00e1cil para un gobierno intervenir en su TLD que en otros como <em>.net<\/em>, <em>.eu<\/em> o <em>.is<\/em>. Recientemente hemos vivido un desproporcionado ejemplo de ello, sin precedentes en la Uni\u00f3n Europea, aqu\u00ed en Estado espa\u00f1ol con el TLD <em>.cat<\/em>:<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-6 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-6 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-6 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-6 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-6' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters \" href='https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"206\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters\" aria-describedby=\"gallery-6-13052\" srcset=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg 206w, https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg 400w\" sizes=\"auto, (max-width: 206px) 100vw, 206px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-6-13052'>\n\t\t\t\tFundaci\u00f3 Puntcat <a href=\"https:\/\/twitter.com\/puntcat\/status\/909525852446187521\">denounces<\/a> to ICANN the inordinate action of the courts assaulting its headquarters\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" href='https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"256\" src=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png\" class=\"attachment-medium size-medium\" alt=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" aria-describedby=\"gallery-6-13065\" srcset=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png 300w, https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-6-13065'>\n\t\t\t\tInternet Society <a href=\"https:\/\/twitter.com\/internetsociety\/status\/910995196405518336\">statement<\/a> on Internet blocking measures in Catalonia, Spain\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Finalmente para proteger su privacidad y seguridad (para evitar spam, correos no deseados u otro tipo de acoso), deben optar por adquirir su dominio en servicios de registro que ofrezcan garant\u00edas fuertes de seguridad jur\u00eddica, por ejemplo <a href=\"https:\/\/njal.la\/\" target=\"_blank\" rel=\"noopener noreferrer\">Njalla<\/a>.<\/p>\n<p>Muchos registradores de dominios ofrecen la posibilidad de no publicar los datos del propietario y de gestionar ellos mismos las solicitudes que reciba, sean ellas peticiones de contacto de compradores, de particulares o de autoridades e instituciones. Este tipo de servicio es conocido como <em>whois<\/em> privado.<\/p>\n<p>Se puede comprender la importancia de este requisito entrando por ejemplo en <a href=\"https:\/\/whois.icann.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/whois.icann.org\/<\/a>  o en <a href=\"https:\/\/www.nic.es\/sgnd\/dominio\/publicInformacionDominios.action\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nic.es\/sgnd\/dominio\/publicInformacionDominios.action<\/a> (para dominios terminadas en .es) y buscando una web cualquiera.<br \/>\nAparecer\u00e1 un fichero en el que salen todos los datos. Si la persona propietaria del sitio web no ha utilizado un proveedor que se encargue de proteger su privacidad, se ver\u00e1 publicada &#8211; y cualquier persona desde donde sea podr\u00e1 verlo &#8211;  esta informaci\u00f3n:<\/p>\n<div style=\"background:white; font-size:90%; padding:15px;margin-bottom:20px; max-width:600px\">\nREGISTRANT CONTACT<br \/>\nName: NOMBRE Y APELLIDO (n\u00f3tese que dar informaci\u00f3n inexacta o desactualizada es penado)<br \/>\nOrganization: NOMBRE DE LA ORGANIZACI\u00d3N, si la hay<br \/>\nStreet: DIRECCI\u00d3N  (n\u00f3tese que dar informaci\u00f3n inexacta o desactualizada es penado)<br \/>\nCity: CIUDAD<br \/>\nState: ESTADO<br \/>\nPostal Code: C\u00d3DIGO POSTAL<br \/>\nPhone: N\u00daMERO DE TEL\u00c9FONO COMPLETO (n\u00f3tese que dar informaci\u00f3n inexacta o desactualizada es penado)<br \/>\nEmail: EMAIL\n<\/div>\n<p>Si el propietario ha tomado la medida funcional y habitual de que las peticiones sean gestionadas por el proveedor (ha optado por activar el servicio de <em>whois<\/em> privado) , los datos remiten al proveedor del servicio. El proveedor se encargar\u00e1 de comunicar al propietario si alguien le ha buscado o requerido por esa v\u00eda. Es importante que en el contrato el proveedor te asegure de los plazos en los que te comunica la informaci\u00f3n. Los proveedores m\u00e1s \u00e9ticos y respetuosos de los derechos de sus usuarios suelen ofrecer unos plazos entre el requerimiento y la comunicaci\u00f3n de tus datos a quienes los requieren si t\u00fa no has contestado.<\/p>\n<p>No todos los dominios lo consienten ya que no todos los dominios son gestionados del mismo modo. Los dominios gen\u00e9ricos, los .com, .net, .biz, .org, etc\u2026 est\u00e1n gestionados por la ICANN &#8211; la Corporaci\u00f3n de Internet para la Asignaci\u00f3n de Nombres y N\u00fameros, m\u00e1ximo organismo de la gobernanza de Internet, y es esta organizaci\u00f3n la que permite el uso de que los dominios puedan recurrir a la protecci\u00f3n de Whois.  Los dominios .es en cambio, est\u00e1n gestionados por Red.es y en estos dominios no se permite el poder ocultar los datos del registro de los usuarios que quieren adquirir de un dominio .es.<a id=\"Mensajeria-VOIP-email\"><\/a><br \/>\nLos dominios .cat, gestionados por la Fundaci\u00f3 puntCAT, tampoco ofrecen privacidad total de la identidad.<\/p>\n<h2><a href=\"#Mensajeria-VOIP-email\">#<\/a> Mensajer\u00eda, VOIP, email e intercambio de archivos de forma privada y segura<\/h2>\n<p>La vigilancia masiva de lo que hacemos y decimos en Internet (y en todas las comunicaciones electr\u00f3nicas) por parte de los gobiernos es una evidencia a partir de las revelaciones de Snowden. A continuaci\u00f3n unos consejos para ayudar a defender la privacidad frente a estas pr\u00e1cticas mediante herramientas de cifrado.<\/p>\n<h3>Mensajer\u00eda<\/h3>\n<p><a href=\"https:\/\/wire.com\/en\/\"><img loading=\"lazy\" decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/wire-app.jpeg\" alt=\"Signal\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<p>Para proteger la privacidad de tus comunicaciones utiliza siempre aplicaciones de mensajer\u00eda que dispongan de cifrado punta a punta por defecto. Recomendamos para ello el uso de <strong>Wire<\/strong> (descargar e instalar <a href=\"https:\/\/wire.com\/en\/download\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wire<\/a> para tel\u00e9fonos Android o iPhone; PCs Linux, MacOS o Windows; o en naegador web), app de mensajer\u00eda cifrada punta a punta cuyo uso es f\u00e1cil e intuitivo. <strong>Es posible crear una cuenta en Wire sin necesidad de asociarla al tel\u00e9fono m\u00f3vil<\/strong>. Para hacerlo es necesario crear primero la cuenta en Wire desde el PC, proceso que no requiere el n\u00famero de tel\u00e9fono m\u00f3vil, y luego instalar la app Wire en el dispositivo m\u00f3vil y logearte en esa cuenta. Por esta y otras caracter\u00edsticas Wire encabeza esta lista de aplicaciones recomendadas.<\/p>\n<p>Otra alternativa segura es Signal (<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.securesms&#038;hl=es\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a>| <a href=\"https:\/\/itunes.apple.com\/es\/app\/signal-private-messenger\/id874139669?mt=8\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone<\/a>), app de mensajer\u00eda cifrada punta a punta recomendada por el mismo Snowden.<\/p>\n<p>Entre otras aplicaciones populares de mensajer\u00eda, tambi\u00e9n Whatsapp ha integrado el cifrado punta a punta en todas sus comunicaciones por defecto (a pesar de ello, Facebook ya ha <a href=\"https:\/\/techcrunch.com\/2016\/08\/25\/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out\/\" target=\"_blank\" rel=\"noopener noreferrer\">compartido datos de sus usuarios<\/a> entre Whatsapp y la red social, por ello Signal sigue siendo mejor opci\u00f3n). Telegram, dispone de opci\u00f3n de cifrado pero no est\u00e1 activa por defecto.<\/p>\n<p>Es importante notar que aunque sean cifradas punta a punta, excepto en el caso de Wire si se ha creado una cuenta desde el PC como explicamos, las aplicaciones anteriores est\u00e1n asociadas al n\u00famero de m\u00f3vil del usuario. As\u00ed pues, aunque la comunicaci\u00f3n sea cifrada (una tercera persona no puede ver el contenido) no es an\u00f3nima y se conoce la identidad del emisor y receptor as\u00ed como las horas y tiempos de conexi\u00f3n y geolocalizaci\u00f3n.<\/p>\n<h3>Video llamadas \u2013 VOIP<\/h3>\n<p>Se pueden realizar llamadas y video llamadas a trav\u00e9s de Internet cifradas con Signal (y Whatsapp) a un contacto. <a href=\"https:\/\/meet.jit.si\/\" target=\"_blank\" rel=\"noopener noreferrer\">MeetJitsi<\/a> permite hacer videollamadas cifradas en grupo as\u00ed como tambi\u00e9n Wire. Las llamadas y videollamadas a trav\u00e9s de Skype, Hangouts u otras no protegen suficientemente la privacidad de tus comunicaciones.<\/p>\n<h3>Correo electr\u00f3nico cifrado<\/h3>\n<p>En el caso del correo electr\u00f3nico, es importante saber que todo email enviado y recibido puede ser le\u00eddo (y de hecho es procesado) por los proovedores de servicio mail. Algunos de ellos, cuando requeridos por las autoridades, tienen escaso cuidado cuanto a la privacidad y seguridad jur\u00eddica de sus clientes\/usuarios. Desaconsejamos en general el uso de servicios como gmail, yahoo, hotmail, etc. En todo caso, se ha de saber que enviar email sin cifrado es casi como enviar correo en sobre abierto. Una buena alternativa a estos servicios es <a href=\"https:\/\/protonmail.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protonmail<\/a>, que aplica autom\u00e1ticamente cifrado punta a punta a todos los correos electr\u00f3nicos. Como resultado, los correos electr\u00f3nicos cifrados no se pueden compartir con terceros. La versi\u00f3n gratuita tiene 2 GB de almacenamiento.<\/p>\n<p>Sea cual sea el servidor de correo es possible proteger el derecho al secreto de la comunicaci\u00f3n empleando el cifrado mediante <strong>PGP<\/strong>. Esto te permite proteger la privacidad de las comunicaciones y de los archivos enviados a trav\u00e9s de correo electr\u00f3nico. En esta gu\u00eda de Security in a Box se explica como usar email con PGP en <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/linux\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">MacOS<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows<\/a>.<\/p>\n<p>Nuevamente en este caso, la comunicaci\u00f3n es cifrada en cuanto a contenido, pero no an\u00f3nima.<br \/>\n\u00bfQu\u00e9 significa? Significa que aunque no indiquemos nuestro nombre, utilicemos una cuenta de correo electr\u00f3nico en la que no aparece nuestra identidad o uno de usar y tirar, toda comunicaci\u00f3n electr\u00f3nica deja un rastro, la llamada direcci\u00f3n IP, que  es una direcci\u00f3n \u00fanica asignada a cada dispositivo en la red y que indica desde donde se ha efectuado una comunicaci\u00f3n. Adem\u00e1s el remitente , destinatario, y asunto del mensaje as\u00ed como otros &#8220;metadatos&#8221; del correo  no son cifrados e indican quien lo recibe, cuando y otros datos. Por esto, el \u00fanico anonimato real posible para transferencia de archivos e informaci\u00f3n solo puede conseguirse a trav\u00e9s de la red Tor, porque esta comunicaci\u00f3n no se realiza de punto A a punto B sino que la conexi\u00f3n pasa por varios nodos intermedios dentro de la red Tor de los cuales ning\u00fan punto conoce a la vez el origen y destino. Evidentemente, acceder a nuestra cuenta ordinaria de gmail o cualquier red social a trav\u00e9s de la red Tor desvela la identidad a pesar de ocultar la direcci\u00f3n IP.<\/p>\n<p><a href=\"https:\/\/onionshare.org\/\" rel=\"noopener noreferrer\" target=\"_blank\">OnionShare<\/a> es una herramienta de c\u00f3digo abierto que permite compartir de forma segura y an\u00f3nima ficheros de cualquier tama\u00f1o. Funciona creando una URL temporal que apunta al archivo y que s\u00f3lo es accesible a trav\u00e9s de Tor. Aprende c\u00f3mo funciona y c\u00f3mo utilizarlo en la <a href=\"https:\/\/github.com\/micahflee\/onionshare\/wiki\" target=\"_blank\" rel=\"noopener noreferrer\">wiki<\/a>.<\/p>\n<p>Otro ejemplo sobre como entregar informaci\u00f3n de forma an\u00f3nima y<a id=\"Bloqueo-Mensajeria\"><\/a> segura es el <a href=\"https:\/\/xnet-x.net\/buzon-xnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Buz\u00f3n de Xnet<\/a> para denuncia de corrupci\u00f3n, basado en <a href=\"https:\/\/www.globaleaks.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Globaleaks<\/a> y accesible a trav\u00e9s de Tor.<\/p>\n<h2><a href=\"#Bloqueo-Mensajeria\">#<\/a> Bloqueo de aplicaciones de mensajer\u00eda<\/h2>\n<p>Alternativas para comunicaci\u00f3n privada y p\u00fablica en caso de que se bloqueen las aplicaciones de mensajer\u00eda tipo Signal o Whatsapp, y redes sociales. Como prevenci\u00f3n ante posibles bloqueos u otras pr\u00e1cticas represivas siempre es aconsejable diversificar y disponer de varias aplicaciones alternativas.<\/p>\n<h3>FireChat: para Android y iPhone<\/h3>\n<p>FireChat permite es una aplicaci\u00f3n de mensajer\u00eda que permite la comunicaci\u00f3n entre dispositivos y la publicaci\u00f3n en foros p\u00fablicos entre dispositivos cercanos a trav\u00e9s de <em>mesh-networks<\/em>.<\/p>\n<ul>\n<li>Salas p\u00fablicas: tipo <em>#SalaPublica1<\/em>, son chats abiertos en los que todos los mensajes llegan a todos los participantes del chat. <strong>Todos los mensajes son p\u00fablicos y no cifrados<\/strong>. Los mismos creadores de FireChat recomiendan no usar datos personales y tener precauci\u00f3n con la informaci\u00f3n personal que se comparte en los chats p\u00fablicos.<\/li>\n<li>Mensajes privados: Los mensajes privados son cifrados y solo pueden ser vistos por el emisor y los receptores, que pueden ser uno o varios.<\/li>\n<\/ul>\n<p>Esta es la aplicaci\u00f3n que usaron los manifestantes de la revoluci\u00f3n de los paraguas amarillos en <a href=\"https:\/\/www.theguardian.com\/world\/2014\/sep\/29\/firechat-messaging-app-powering-hong-kong-protests\" target=\"_blank\" rel=\"noopener noreferrer\">Hong Kong<\/a> cuando se bloquearon sus comunicaciones. <\/p>\n<p>Descargar FireChat para Android o iPhone: <a href=\"https:\/\/www.opengarden.com\/firechat.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/firechat.html<\/a><\/p>\n<p>C\u00f3mo usar FireChat: <a href=\"https:\/\/www.opengarden.com\/how-to.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/how-to.html<\/a><\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"GogPPT3ePGQ\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a class=\"scroll\" id=\"Apagon\"><\/a><\/p>\n<h2><a href=\"#Apagon\">#<\/a> Apag\u00f3n de Internet<\/h2>\n<p>En el caso extremo de apag\u00f3n en el que se corte totalmente la conexi\u00f3n a Internet, como pasa en situaciones de gran represi\u00f3n, existen aplicaciones que permiten la comunicaci\u00f3n entre dispositivos m\u00f3viles a\u00fan sin conexi\u00f3n. <\/p>\n<h3>Briar: para Android<\/h3>\n<p><a href=\"https:\/\/briarproject.org\/index.html\"><img decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/briar_logo_large.jpg\" alt=\"Briar, Secure messaging, anywhere\"\/><\/a><\/p>\n<p>Briar es una aplicaci\u00f3n de mensajer\u00eda de c\u00f3digo abierto dise\u00f1ada para activistas, periodistas y cualquier otra persona que necesite una forma segura, f\u00e1cil y robusta de comunicarse. A diferencia de las herramientas de mensajer\u00eda tradicionales como correo electr\u00f3nico, Twitter o Telegram, Briar no se basa en un servidor central: los mensajes se sincronizan directamente v\u00eda p2p entre los dispositivos de los usuarios.<\/p>\n<p>Si Internet est\u00e1 ca\u00eddo, Briar puede sincronizar los mensajes v\u00eda Bluetooth o Wi-Fi, manteniendo el flujo de informaci\u00f3n en caso de crisis. Los dispositivos tienen que poder conectar entre ellos por lo que la distancia m\u00e1xima en el caso de Bluetooth es 70 metros aprox. o algo m\u00e1s en el caso del Wi-Fi dependiendo del alcance de este. En el caso de grupos o foros la sincronizaci\u00f3n p2p puede tener mayor alcance cuanto mayor el grupo.<\/p>\n<p>Con conexi\u00f3n a Internet, Briar se sincroiniza a trav\u00e9s de la red Tor, protegiendo a los usuarios de vigilancia.<\/p>\n<p>Descarga Briar: <a href=\"https:\/\/briarproject.org\/download.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/download.html<\/a><br \/>\n<a id=\"Mas\"><\/a><br \/>\nManual de uso de Briar: <a href=\"https:\/\/briarproject.org\/manual\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/manual\/<\/a><\/p>\n<h2><a href=\"#Mas\">#<\/a> M\u00e1s<\/h2>\n<p>C\u00f3mo se borran los metadatos de un documento: <a href=\"https:\/\/xnet-x.net\/como-se-borran-los-metadatos-de-un-documento\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnet-x.net\/como-se-borran-los-metadatos-de-un-documento\/<\/a><\/p>\n<p>Esta gu\u00eda recoge una serie de indicaciones b\u00e1sicas para preservar tus derechos en Internet. Para mayor seguridad y privacidad en Internet consulta Security in a Box <a href=\"https:\/\/securityinabox.org\/es\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/securityinabox.org\/es<\/a>.<\/p>\n<p>El manual &#8220;Zen y el arte de que la tecnolog\u00eda trabaje para ti&#8221; para leer mas acerca de la creaci\u00f3n y gesti\u00f3n de identidades en linea as\u00ed como acerca de la construcci\u00f3n y mantenimiento de espacios seguros en linea y en la vida f\u00edsica: <a href=\"https:\/\/ttc.io\/zen\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ttc.io\/zen<\/a><\/p>\n<p>MyShadow (Mi Sombra Digital) para leer y aprender acerca de herramientas y metodolog\u00edas para entender y modificar tu sombra digital: <a href=\"https:\/\/myshadow.org\/es\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/myshadow.org\/es<\/a><\/p>\n<p>Finalmente en cuanto a log\u00edstica b\u00e1sica, se recomienda salir de casa siempre con los dispositivos cargados y a poder ser con bater\u00edas externas para mayor autonom\u00eda.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Foto de portada de la campa\u00f1a <a href=\"https:\/\/www.accessnow.org\/keepiton-spanish\/\" target=\"_blank\" rel=\"noopener noreferrer\">KeepItOn<\/a> de Accessnow.<\/em>Download Orbot\" href='https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Orbot\" aria-describedby=\"gallery-7-12983\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12983'>\n\t\t\t\t<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.torproject.android\" target=\"_blank\">Download Orbot<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open and start Orbot\" href='https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Open and start Orbot\" aria-describedby=\"gallery-7-12984\" srcset=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12984'>\n\t\t\t\tOpen and start Orbot\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You are connected to the Tor network\" href='https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"You are connected to the Tor network\" aria-describedby=\"gallery-7-12985\" srcset=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12985'>\n\t\t\t\tYou are connected to the Tor network\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" href='https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" aria-describedby=\"gallery-7-12986\" srcset=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12986'>\n\t\t\t\tClick on &#8220;Apps in VPN mode&#8221;. You do not need to install Orfox, you can use your usual browser.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Select the Apps that you can not access to because of the blocking\" href='https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Select the Apps that you can not access to because of the blocking\" aria-describedby=\"gallery-7-12987\" srcset=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12987'>\n\t\t\t\tSelect the Apps that you can not access to because of the blocking\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You can also select your browser, other apps, or everything (increases battery consumption)\" href='https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You can also select your browser, other apps, or everything (increases battery consumption)\" aria-describedby=\"gallery-7-12988\" srcset=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12988'>\n\t\t\t\tYou can also select your browser, other apps, or everything (increases battery consumption)\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" href='https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" aria-describedby=\"gallery-7-12989\" srcset=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-768x1365.png 768w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12989'>\n\t\t\t\tVerify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works  <a href=\"https:\/\/check.torproject.org\/\" target=\"_blank\">here<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"To add more Apps to Orbot go to Settings\" href='https:\/\/xnet-x.net\/img\/8-sttings-orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"To add more Apps to Orbot go to Settings\" aria-describedby=\"gallery-7-12990\" srcset=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-sttings-orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12990'>\n\t\t\t\tTo add more Apps to Orbot go to Settings\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"and there &#039;Select Apps&#039;\" href='https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png\" class=\"attachment-medium size-medium\" alt=\"and there &#039;Select Apps&#039;\" aria-describedby=\"gallery-7-12992\" srcset=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png 169w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-768x1365.png 768w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-576x1024.png 576w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-7-12992'>\n\t\t\t\tand there &#8216;Select Apps&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-iPhone\"><\/a><\/p>\n<h3>Tor a iPhone: Onion Browser<\/h3>\n<p>Per iPhone no existeix una aplicaci\u00f3 que permeti utilitzar la xarxa Tor per a qualsevol aplicaci\u00f3 instal\u00b7lada al dispositiu. No obstant aix\u00f2, amb el navegador Onion Browser es pot accedir a llocs web i a la versi\u00f3 web d&#8217;aplicacions bloquejades arbitr\u00e0riament.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-8 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-8 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-8 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-8 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-8' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" href='https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" aria-describedby=\"gallery-8-13012\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-8-13012'>\n\t\t\t\t<a href='https:\/\/itunes.apple.com\/us\/app\/onion-browser-secure-anonymous-web-with-tor\/id519296448?mt=8' target='_blank'>Download Onion Browser<\/a> for iPhone; open it and select &#8216;connect to Tor&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"From here you can access blocked websites and blocked web apps\" href='https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"From here you can access blocked websites and blocked web apps\" aria-describedby=\"gallery-8-13011\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-8-13011'>\n\t\t\t\tFrom here you can access blocked websites and blocked web apps\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-PC\"><\/a><\/p>\n<h3>Tor a PC: Navegador Tor<\/h3>\n<p>Descarregar el navegador <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tor per PC (Linux \/ MacOS \/ Windows)<\/a>.<br \/>\nVideo: Com fer servir Tor en PCs creat pel llan\u00e7ament de la <a href=\"https:\/\/xnet-x.net\/buzon-denuncias-anonimas-ciudad-barcelona-bustia-etica\/\" target=\"_blank\" rel=\"noopener noreferrer\">B\u00fastia \u00c9tica<\/a> de l&#8217;Ajuntament de Barcelona:<\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"Tdmq8qCEncI\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a id=\"VPN\"><\/a><\/p>\n<h3>VPN<\/h3>\n<p>Una VPN (<em>Virtual Private Network<\/em>) et permet crear una xarxa local virtual. Aix\u00f2 permet que abans de sortir a l&#8217;Internet obert, les teves dades viatgin per una connexi\u00f3 xifrada, una mena de t\u00fanel, i es connectin a la xarxa global des d&#8217;una altra localitzaci\u00f3.<br \/>\nL&#8217;aplicaci\u00f3 m\u00e9s f\u00e0cil i r\u00e0pida d&#8217;instal\u00b7lar per activar una connexi\u00f3 VPN \u00e9s Bitmask, que a m\u00e9s \u00e9s gratu\u00efta. De moment nom\u00e9s est\u00e0 disponible per a m\u00f2bils Android i PC Linux encara que la seva versi\u00f3 per a MacOs iPhone est\u00e0 a punt de ser publicada i m\u00e9s endavant tamb\u00e9 la seva versi\u00f3 Windows. No obstant aix\u00f2, hi ha molts serveis de pagament molt econ\u00f2mics que ofereixen connexi\u00f3 VPN per a tot tipus de dispositius, per exemple <a href=\"https:\/\/protonvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ProtonVPN<\/a> que ofereix tamb\u00e9 una versi\u00f3 limitada de proba &#8211; vegeu m\u00e9s avall indicacions per utilitzar serveis d&#8217;Internet que garanteixin la preservaci\u00f3 de la privacitat i informaci\u00f3.<br \/>\n\u00c9s aconsellable disposar d&#8217;ambdues opcions Tor i VPN. Aix\u00ed, en el cas que es bloqueg\u00e9s el tr\u00e0nsit a trav\u00e9s de Tor, es pot usar la VPN, i viceversa.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-9 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-9 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-9 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-9 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-9' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Download and install Bitmask\" href='https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Download and install Bitmask\" aria-describedby=\"gallery-9-13025\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13025'>\n\t\t\t\tDownload and install <a href=\"https:\/\/bitmask.net\/es\/install\" target=\"_blank\">Bitmask<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open it. Select a provider. Any one of the 3 works \" href='https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Open it. Select a provider. Any one of the 3 works\" aria-describedby=\"gallery-9-13026\" srcset=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13026'>\n\t\t\t\tOpen it. Select a provider. Any one of the 3 works\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Register (or initiate session )\" href='https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Register (or initiate session )\" aria-describedby=\"gallery-9-13027\" srcset=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13027'>\n\t\t\t\tRegister (or initiate session )\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Choose a username and password\" href='https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Choose a username and password\" aria-describedby=\"gallery-9-13028\" srcset=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13028'>\n\t\t\t\tChoose a username and password\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"After logging in, start Bitmask\" href='https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"After logging in, start Bitmask\" aria-describedby=\"gallery-9-13029\" srcset=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13029'>\n\t\t\t\tAfter logging in, start Bitmask\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Accept connection via VPN\" href='https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Accept connection via VPN\" aria-describedby=\"gallery-9-13030\" srcset=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13030'>\n\t\t\t\tAccept connection via VPN\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You will see an icon in the top bar indicating that you are logged in\" href='https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You will see an icon in the top bar indicating that you are logged in\" aria-describedby=\"gallery-9-13031\" srcset=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13031'>\n\t\t\t\tYou will see an icon in the top bar indicating that you are logged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Display the top notification menu to check the status of Bitmask or turn it off\" href='https:\/\/xnet-x.net\/img\/8-info-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Display the top notification menu to check the status of Bitmask or turn it off\" aria-describedby=\"gallery-9-13032\" srcset=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-info-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-info-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-9-13032'>\n\t\t\t\tDisplay the top notification menu to check the status of Bitmask or turn it off\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Per a la correcta configuraci\u00f3 de la connexi\u00f3 VPN, sense la qual no solament no podr\u00e0s superar el bloqueig sin\u00f3 que deixes al descobert les teves dades de connexi\u00f3, \u00e9s important assegurar que no estem patint el que \u00e9s conegut com &#8216;Fuga de DNS&#8217;. A la p\u00e0gina <a href=\"https:\/\/hidester.com\/dns-leak-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Leak test<\/a> s&#8217;explica i es porta a terme el test per comprovar-ho i com solucionar-ho.<br \/>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-10 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-10 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-10 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-10 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-10' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Visit the page DNS Leak test\" href='https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Visit the page DNS Leak test\" aria-describedby=\"gallery-10-13110\" srcset=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-10-13110'>\n\t\t\t\tVisit the page <a href=' https:\/\/hidester.com\/dns-leak-test\/' target='_blank'>DNS Leak test<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Perform a test without the VPN connected. Look at the data.\" href='https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Perform a test without the VPN connected. Look at the data.\" aria-describedby=\"gallery-10-13112\" srcset=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-10-13112'>\n\t\t\t\tPerform a test without the VPN connected. Look at the data.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it. \" href='https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\" aria-describedby=\"gallery-10-13111\" srcset=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-10-13111'>\n\t\t\t\tConnect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n<\/p>\n<p><a id=\"Xifrat\"><\/a><\/p>\n<h2><a href=\"#Xifrat\">#<\/a> Xifrat de dispositius m\u00f2bils<\/h2>\n<p>Xifrar els dispositius, sobretot els tel\u00e8fons m\u00f2bils, \u00e9s essencial per mantenir la privacitat de les dades personals en cas que es perdi o ens sigui sostret. Per aix\u00f2, la majoria de <em>smartphones<\/em> porten de s\u00e8rie eines instal\u00b7lades que permeten, en uns quants passos simples, xifrar tot el dispositiu i es recomana fer-ho protegir la privacitat de les dades, comptes, contactes i informaci\u00f3 de l&#8217;usuari.<\/p>\n<h3>Xifrat de dispositiu m\u00f2bil: exemple amb Android<\/h3>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-11 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-11 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-11 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-11 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-11' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" href='https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" aria-describedby=\"gallery-11-13037\" srcset=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-11-13037'>\n\t\t\t\tThe device encryption option is in &#8216;Settings&#8217; -> &#8216;Additional settings&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Privacy&#039;\" href='https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Privacy&#039;\" aria-describedby=\"gallery-11-13038\" srcset=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-768x1365.png 768w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-11-13038'>\n\t\t\t\t&#8216;Privacy&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Device Encryption&#039;\" href='https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Device Encryption&#039;\" aria-describedby=\"gallery-11-13039\" srcset=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-768x1365.png 768w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-11-13039'>\n\t\t\t\t&#8216;Device Encryption&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in  \" href='https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png\" class=\"attachment-medium size-medium\" alt=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in\" aria-describedby=\"gallery-11-13040\" srcset=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-768x1365.png 768w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-11-13040'>\n\t\t\t\tIn order to encrypt the device you need to have the battery charged and it should also be plugged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" href='https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png\" class=\"attachment-medium size-medium\" alt=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" aria-describedby=\"gallery-11-13041\" srcset=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-11-13041'>\n\t\t\t\tWhen loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Xifrat de do de m\u00f2bils <a href=\"https:\/\/ssd.eff.org\/es\/module\/c%C3%B3mo-encriptar-su-iphone\" rel=\"noopener noreferrer\" target=\"_blank\">iPhone<\/a>.<\/p>\n<p>En geneal, com a bona pr\u00e0ctica, no s&#8217;ha d&#8217;emmagatzemar informaci\u00f3 innecess\u00e0ria als dispositius, esborra peri\u00f2dicament. Encara que estiguis segur que tot el que tens \u00e9s absolutament legal, recorda que no ets tu, sin\u00f3 el poder qui decideix que \u00e9s legal i que no \u00e9s legal, i el que avui \u00e9s legal podria no ser-ho dem\u00e0 en el cas que un r\u00e8gim es torni autoritari. Eliminar y buidar la paperera no \u00e9s suficient, cal utilitzar eines espec\u00edfiques que sobreescriuen les dades diverses vegades. M\u00e9s informaci\u00f3 i eines per fer-ho <a href=\"https:\/\/securityinabox.org\/en\/guide\/destroy-sensitive-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">aqu\u00ed<\/a> (es va descobrir una porta del darrere a CCleaner per a Windows que ja ha estat <a href=\"http:\/\/www.piriform.com\/news\/blog\/2017\/9\/18\/security-notification-for-ccleaner-v5336162-and -ccleaner-cloud-v1073191-for-32 bits-windows-users \">corregida<\/a>, desc\u00e0rrega sempre l&#8217;\u00faltima versi\u00f3).<\/p>\n<p>Recorda tamb\u00e9 crear i mantenir contrasenyes segures, \u00faniques i fortes. Alguns consells de com fer-ho <a href=\"https:\/\/securityinabox.org\/en\/guide\/passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">aqu\u00ed<\/a> (nota: el desbloqueig per patr\u00f3 \u00e9s sempre molt m\u00e9s feble que una contrasenya alfanum\u00e8rica).<\/p>\n<p><em style=\"font-size:90%\">Nota per a l&#8217;Estat espanyol: En el cas que les forces de seguretat requisin el dispositiu d&#8217;alg\u00fa en qualitat d&#8217;investigat, aquesta persona t\u00e9 dret a no revelar les seves claus de xifrat, PIN, patr\u00f3 de desbloqueig, contrasenya o similars, dins el dret a no declarar contra un mateix (Llei d&#8217;enjudiciament criminal <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a118\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 118 h<\/a> i <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a588septiesb\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 588 septies b 2<\/a>; explicat en aquest <a href=\"https:\/\/www.asktheeu.org\/en\/request\/3347\/response\/11918\/attach\/5\/Encryption%20questionnaire%20ES%20DRAFT%20PA.pdf#page2\" target=\"_blank\" rel=\"noopener noreferrer\">document<\/a> a la Secretaria d&#8217;Estat d&#8217;Uni\u00f3 Europea).<\/em><\/p>\n<p><a id=\"Allotjament\"><\/a><\/p>\n<h2><a href=\"#Allotjament\">#<\/a> Allotjament: privacitat i seguretat<\/h2>\n<p>La censura a llocs web per part d&#8217;un govern autoritaris pot donar-se a un altre nivell m\u00e9s profund quan en lloc de bloquejar l&#8217;acc\u00e9s a la web a trav\u00e9s de la xarxa, es tanca la p\u00e0gina ja sigui intervenint en els servidors o requisant el domini. En aquest cas eines com Tor o una VPN no poden ser de cap ajuda.<\/p>\n<p>Per prevenir aquesta situaci\u00f3 (o crear un <em>mirror<\/em> &#8211; c\u00f2pia de la mateixa web &#8211; en un allotjament segur si la web ja ha estat censurada), els ciutadans que viuen en estats autoritaris no han allotjar els seus continguts en un servidor dins del territori del seu pa\u00eds. Cal buscar i escollir pa\u00efsos on el marc legal ofereixi garanties fortes respecte a la llibertat d&#8217;expressi\u00f3 i informaci\u00f3 on situar el <em>hosting<\/em>.<\/p>\n<p>Tampoc han de registrar el domini del seu lloc web susceptible a ser censurat amb <em>Top Level Domains<\/em> propis del pa\u00eds. \u00c9s m\u00e9s f\u00e0cil per a un govern intervenir en e seu TLD que en altres com <em>.net<\/em>, <em>.eu<\/em>, que son globales, o <em>.is<\/em>. Recentment hem viscut un desproporcionat exemple d&#8217;aix\u00f2, sense precedents a la Uni\u00f3 Europea, aqu\u00ed a Estat espanyol amb el TLD <em>.cat<\/em>:<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-12 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-12 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-12 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-12 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-12' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters \" href='https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"206\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters\" aria-describedby=\"gallery-12-13052\" srcset=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg 206w, https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg 400w\" sizes=\"auto, (max-width: 206px) 100vw, 206px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-12-13052'>\n\t\t\t\tFundaci\u00f3 Puntcat <a href=\"https:\/\/twitter.com\/puntcat\/status\/909525852446187521\">denounces<\/a> to ICANN the inordinate action of the courts assaulting its headquarters\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" href='https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"256\" src=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png\" class=\"attachment-medium size-medium\" alt=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" aria-describedby=\"gallery-12-13065\" srcset=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png 300w, https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-12-13065'>\n\t\t\t\tInternet Society <a href=\"https:\/\/twitter.com\/internetsociety\/status\/910995196405518336\">statement<\/a> on Internet blocking measures in Catalonia, Spain\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Finalment per protegir la seva privacitat i seguretat (per evitar spam, correus no desitjats o un altre tipus d&#8217;assetjament), han d&#8217;optar per adquirir el seu domini en serveis de registre que ofereixin fortes garanties de seguretat jur\u00eddica, per exemple <a href=\"https:\/\/njal.la\/\" target=\"_blank\" rel=\"noopener noreferrer\">Njalla<\/a>.<\/p>\n<p>Molts registradors de dominis ofereixen la possibilitat de no publicar les dades del propietari i de gestionar ells mateixos les sol\u00b7licituds que rebi, siguin elles peticions de contacte de compradors, de particulars o d&#8217;autoritats i institucions. Aquest tipus de servei \u00e9s conegut com <em>whois<\/em> privat.<\/p>\n<p>Es pot comprendre la import\u00e0ncia d&#8217;aquest requisit entrant per exemple a <a href=\"https:\/\/whois.icann.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/whois.icann.org\/<\/a>  o a <a href=\"https:\/\/www.nic.es\/sgnd\/dominio\/publicInformacionDominios.action\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nic.es\/sgnd\/dominio\/publicInformacionDominios.action<\/a> (per a dominis acabats en .es) i buscant un web qualsevol.<br \/>\nApareixer\u00e0 un fitxer en el qual surten totes les dades. Si la persona propiet\u00e0ria del lloc web no ha utilitzat un prove\u00efdor que s&#8217;encarregui de protegir la seva privacitat, es veur\u00e0 publicada &#8211; i qualsevol persona des d&#8217;on sigui podr\u00e0 veure-ho &#8211; aquesta informaci\u00f3:<\/p>\n<div style=\"background:white; font-size:90%; padding:15px;margin-bottom:20px; max-width:600px\">\nREGISTRANT CONTACT<br \/>\nName: NOM I COGNOM (cal notar que donar informaci\u00f3 inexacta o desactualitzada \u00e9s penat)<br \/>\nOrganization: NOM DE L&#8217;ORGANITZACI\u00d3, si n&#8217;hi ha<br \/>\nStreet: ADRE\u00c7A  (Cal notar que donar informaci\u00f3 inexacta o desactualitzada \u00e9s penat)<br \/>\nCity: CIUTAT<br \/>\nState: ESTAT<br \/>\nPostal Code: C\u00d3DI POSTAL<br \/>\nPhone: N\u00daMERO DE TEL\u00c8FON COMPLET (Cal notar que donar informaci\u00f3 inexacta o desactualitzada \u00e9s penat)<br \/>\nEmail: EMAIL\n<\/div>\n<p>Si el propietari ha pres la mesura funcional i habitual que les peticions siguin gestionades pel prove\u00efdor (ha optat per activar el servei de <em>whois<\/em> privat) , les dades remeten al prove\u00efdor del servei. El prove\u00efdor s&#8217;encarregar\u00e0 de comunicar al propietari si alg\u00fa li ha buscat o requerit per aquesta via. \u00c9s important que en el contracte el prove\u00efdor t&#8217;asseguri dels terminis en qu\u00e8 et comunica la informaci\u00f3. Els prove\u00efdors m\u00e9s \u00e8tics i respectuosos dels drets dels seus usuaris solen oferir uns terminis entre el requeriment i la comunicaci\u00f3 de les teves dades a qui els requereixen si tu no has contestat.<\/p>\n<p>No tots els dominis ho consenten ja que no tots els dominis s\u00f3n gestionats de la mateixa manera. Els dominis gen\u00e8rics, els .com, .net, .biz, .org, etc &#8230; estan gestionats per la ICANN &#8211; la Corporaci\u00f3 d&#8217;Internet per a l&#8217;Assignaci\u00f3 de Noms i N\u00fameros, m\u00e0xim organisme de la governan\u00e7a d&#8217;Internet, i \u00e9s aquesta organitzaci\u00f3 la que permet l&#8217;\u00fas que els dominis puguin rec\u00f3rrer a la protecci\u00f3 de Whois. Els dominis .es en canvi, estan gestionats per Red.es i en aquests dominis no es permet el poder ocultar les dades del registre dels usuaris que volen adquirir d&#8217;un domini .es.<br \/>\nEls dominis .cat, gestionats per la Fundaci\u00f3 puntCAT, tampoc ofereixen privacitat total de la identitat.<\/p>\n<p><a id=\"Mensajeria-VOIP-email\"><\/a><\/p>\n<h2><a href=\"#Mensajeria-VOIP-email\">#<\/a> Missatgeria, VOIP, email i intercanvi d&#8217;arxius de forma privada i segura<\/h2>\n<p>La vigil\u00e0ncia massiva del que fem i diem a Internet (i en totes les comunicacions electr\u00f2niques) per part dels governs \u00e9s una evid\u00e8ncia a partir de les revelacions de Snowden. A continuaci\u00f3 uns consells per ajudar a defensar la privacitat front a aquestes pr\u00e0ctiques mitjan\u00e7ant eines de xifrat.<\/p>\n<h3>Missatgeria<\/h3>\n<p><a href=\"https:\/\/wire.com\/en\/\"><img loading=\"lazy\" decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/wire-app.jpeg\" alt=\"Signal\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<p>Para proteger la privacidad de tus comunicaciones utiliza siempre aplicaciones de mensajer\u00eda que dispongan de cifrado punta a punta por defecto. Recomanem per aix\u00f2 l&#8217;\u00fas de <strong> Wire <\/strong> (descarregar i instal\u00b7lar <a href=\"https:\/\/wire.com\/en\/download\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wire<\/a> per a tel\u00e8fons Android o iPhone; PC Linux, MacOS o Windows; o en naegador web), app de missatgeria xifrada punta a punta d&#8217;\u00fas f\u00e0cil i intu\u00eftiu. <strong> \u00c9s possible crear un compte en Wire sense necessitat de associar-lo al tel\u00e8fon m\u00f2bil<\/strong>. Per fer-ho cal crear primer el compte a Wire des del PC, proc\u00e9s que no requereix el n\u00famero de tel\u00e8fon m\u00f2bil, i despr\u00e9s instal\u00b7lar l&#8217;app Wire al dispositiu m\u00f2bil i logejarte en aquest compte. Per aquesta i altres caracter\u00edstiques Wire encap\u00e7ala aquesta llista d&#8217;aplicacions recomanades.<\/p>\n<p>Una altra alternativa segura Signal (<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.securesms&#038;hl=es\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a>| <a href=\"https:\/\/itunes.apple.com\/es\/app\/signal-private-messenger\/id874139669?mt=8\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone<\/a>), app de missatgeria xifrada punta a punta recomanada pel mateix Snowden.<\/p>\n<p>Entre altres aplicacions populars de missatgeria, tamb\u00e9 Whatsapp ha integrat el xifrat cap a cap en totes les seves comunicacions per defecte (tot i aix\u00f2, Facebook ja ha <a href=\"https:\/\/techcrunch.com\/2016\/08\/25\/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out\/\" target=\"_blank\" rel=\"noopener noreferrer\">compartit dades dels seus usuaris<\/a> entre Whatsapp i la xarxa social, per aix\u00f2 Signal segueix sent millor opci\u00f3). Telegram, disposa d&#8217;opci\u00f3 de xifrat per\u00f2 no est\u00e0 activa per defecte.<\/p>\n<p>\u00c9s important notar que encara que siguin xifrades punta a punta, excepte en el cas de Wire si s&#8217;ha creat el compte des del PC com expliquem, les aplicacions anteriors estan associades al n\u00famero de m\u00f2bil de l&#8217;usuari. Aix\u00ed doncs, encara que la comunicaci\u00f3 sigui xifrada (una tercera persona no pot veure el contingut) no \u00e9s an\u00f2nima i es coneix la identitat de l&#8217;emissor i receptor aix\u00ed com les hores i temps de connexi\u00f3 i geolocalitzaci\u00f3.<\/p>\n<h3>Video trucades \u2013 VOIP<\/h3>\n<p>Es poden realitzar trucades i v\u00eddeo trucades a trav\u00e9s d&#8217;Internet xifrades amb Signal (i Whatsapp) a un contacte.<a href=\"https:\/\/meet.jit.si\/\" target=\"_blank\" rel=\"noopener noreferrer\">MeetJitsi<\/a> permet fer videotrucades xifrades en grup aix\u00ed com tamb\u00e9 Wire. Les trucades i videotrucades a trav\u00e9s de Skype, Hangouts o altres no protegeixen prou la privacitat de les teves comunicacions.<\/p>\n<h3>Correu electr\u00f2nic Xifrat<\/h3>\n<p>En el cas del correu electr\u00f2nic, \u00e9s important saber que tot email enviat i rebut pot ser llegit (i de fet \u00e9s processat) pels proovedores de servei electr\u00f2nic. Alguns d&#8217;ells, quan requerits per les autoritats, tenen escassa cura pel que fa a la privacitat i seguretat jur\u00eddica dels seus clients \/ usuaris. Desaconsellem en general l&#8217;\u00fas de serveis com gmail, yahoo, hotmail, etc. En tot cas, s&#8217;ha de saber que enviar email sense xifrat \u00e9s gaireb\u00e9 com enviar correu en sobre obert. Una bona alternativa a aquests serveis \u00e9s <a href=\"https:\/\/protonmail.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protonmail<\/a>, que aplica autom\u00e0ticament xifrat punta a punta a tots els correus electr\u00f2nics. Com a resultat, els correus electr\u00f2nics xifrats no es poden compartir amb tercers. La versi\u00f3 gratu\u00efta t\u00e9 2 GB d&#8217;emmagatzematge.<\/p>\n<p>Sigui quin sigue el servidor email sempre \u00e9s possible protegir el dret al secret de la comunicaci\u00f3 emprant el xifrat mitjan\u00e7ant <strong>PGP<\/strong>. Aix\u00f2 et permet protegir la privacitat de les comunicacions i dels arxius enviats a trav\u00e9s de correu electr\u00f2nic. En aquesta guia de Security in a Box s&#8217;explica com utilitzar email amb PGP a <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/linux\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">MacOS<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows<\/a>.<\/p>\n<p>Novament en aquest cas, la comunicaci\u00f3 \u00e9s xifrada pel que fa al contingut, per\u00f2 no an\u00f2nima.<br \/>\nQu\u00e8 vol dir? Vol dir que encara que no indiquem el nostre nom, utilitzem un compte de correu electr\u00f2nic en el qual no apareix la nostra identitat o un d&#8217;un sol \u00fas, tota comunicaci\u00f3 electr\u00f2nica deixa un rastre, l&#8217;anomenada adre\u00e7a IP, que \u00e9s una direcci\u00f3 \u00fanica assignada a cada dispositiu a la xarxa i que indica des d&#8217;on s&#8217;ha efectuat una comunicaci\u00f3. A m\u00e9s el remitent, destinatari, i assumpte del missatge aix\u00ed com altres &#8220;metadades&#8221; del correu no s\u00f3n xifrats i indiquen qui el rep, quan i altres dades. Per aix\u00f2, l&#8217;\u00fanic anonimat real possible per a transfer\u00e8ncia de fitxers i informaci\u00f3 nom\u00e9s pot aconseguir-se a trav\u00e9s de la xarxa Tor, perqu\u00e8 aquesta comunicaci\u00f3 no es realitza de punt A a punt B sin\u00f3 que la connexi\u00f3 passa per diversos nodes intermedis dins de la xarxa Tor dels quals cap punt coneix a la vegada l&#8217;origen i dest\u00ed. Evidentment, accedir al nostre compte ordin\u00e0ri de gmail o qualsevol xarxa social a trav\u00e9s de la xarxa Tor desvetlla la identitat tot i amagar l&#8217;adre\u00e7a IP.<\/p>\n<p><a href=\"https:\/\/onionshare.org\/\" rel=\"noopener noreferrer\" target=\"_blank\">OnionShare<\/a> \u00e9s una eina de codi obert que permet compartir de forma segura i an\u00f2nima fitxers de qualsevol mida. Funciona creant una URL temporal que apunta al fitxer i que nom\u00e9s \u00e9s accessible a trav\u00e9s de Tor. Apr\u00e8n com funciona i com utilitzar-lo a la <a href=\"https:\/\/github.com\/micahflee\/onionshare\/wiki\" target=\"_blank\" rel=\"noopener noreferrer\">wiki<\/a>.<\/p>\n<p>Un altre exemple sobre com lliurar informaci\u00f3 de manera an\u00f2nima i segura \u00e9s el <a href=\"https:\/\/xnet-x.net\/buzon-xnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bustia de Xnet<\/a> per den\u00fancia de corrupci\u00f3, basat en <a href=\"https:\/\/www.globaleaks.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Globaleaks<\/a> i accessible a trav\u00e9s de Tor.<\/p>\n<p><a id=\"Bloqueig-Missatgeria\"><\/a><\/p>\n<h2><a href=\"#Bloqueig-Missatgeria\">#<\/a> Bloqueig d\u2019aplicacions de missatgeria<\/h2>\n<p>Alternatives per comunicaci\u00f3 privada i p\u00fablica en cas de que es bloquegin les aplicacions de missatgeria tipus Signal o WhatsApp, i xarxes socials. Com a prevenci\u00f3 davant de possibles bloquejos o altres pr\u00e0ctiques repressives sempre \u00e9s aconsellable diversificar i disposar de diverses aplicacions alternatives.<\/p>\n<h3>FireChat: per Android i iPhone<\/h3>\n<p>FireChat permet \u00e9s una aplicaci\u00f3 de missatgeria que permet la comunicaci\u00f3 entre dispositius i la publicaci\u00f3 en f\u00f2rums p\u00fablics entre dispositius propers a trav\u00e9s de <em>mesh-networks<\/em>.<\/p>\n<ul>\n<li>Sales p\u00fabliques: tipus <em>#SalaPublica1<\/em>, s\u00f3n xats oberts en els que tots els missatges arriben a tots els participants del xat. <strong>Tots els missatges s\u00f3n p\u00fablics i no xifrats<\/strong>. Els mateixos creadors de FireChat recomanen no fer servir dades personals i tenir precauci\u00f3 amb la informaci\u00f3 personal que es comparteix en els xats p\u00fablics.<\/li>\n<li>Missatges privats: Els missatges privats s\u00f3n xifrats i nom\u00e9s poden ser vistos per l&#8217;emissor i els receptors, que poden ser un o diversos.<\/li>\n<\/ul>\n<p>Aquesta \u00e9s l&#8217;aplicaci\u00f3 que van usar els manifestants de la revoluci\u00f3 dels paraig\u00fces grocs en <a href=\"https:\/\/www.theguardian.com\/world\/2014\/sep\/29\/firechat-messaging-app-powering-hong-kong-protests\" target=\"_blank\" rel=\"noopener noreferrer\">Hong Kong<\/a> quan el seu govern va bloquejar les seves comunicacions. <\/p>\n<p>Descarregar FireChat per Android o iPhone: <a href=\"https:\/\/www.opengarden.com\/firechat.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/firechat.html<\/a><\/p>\n<p>Com fer servir FireChat: <a href=\"https:\/\/www.opengarden.com\/how-to.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/how-to.html<\/a><\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"GogPPT3ePGQ\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a class=\"scroll\" id=\"Apagada\"><\/a><\/p>\n<h2><a href=\"#Apagada\">#<\/a> Apagada d&#8217;Internet<\/h2>\n<p>En el cas extrem d&#8217;apagada en el qual es talli totalment la connexi\u00f3 a Internet, com passa en situacions de gran repressi\u00f3, hi ha aplicacions que permeten la comunicaci\u00f3 entre dispositius m\u00f2bils fins i tot sense connexi\u00f3.<\/p>\n<h3>Briar: per Android<\/h3>\n<p><a href=\"https:\/\/briarproject.org\/index.html\"><img decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/briar_logo_large.jpg\" alt=\"Briar, Secure messaging, anywhere\"\/><\/a><\/p>\n<p>Briar \u00e9s una aplicaci\u00f3 de missatgeria de codi obert dissenyada per activistes, periodistes i qualsevol altra persona que necessiti una forma segura, f\u00e0cil i robusta de comunicar-se. A difer\u00e8ncia de les eines de missatgeria tradicionals com correu electr\u00f2nic, Twitter o Telegram, Briar no es basa en un servidor central: els missatges es sincronitzen directament via P2P entre els dispositius dels usuaris.<\/p>\n<p>Si Internet est\u00e0 caigut, Briar pot sincronitzar els missatges via Bluetooth o Wi-Fi, mantenint el flux d&#8217;informaci\u00f3 en cas de crisi. Els dispositius han de poder connectar entre ells de manera que la dist\u00e0ncia m\u00e0xima en el cas de Bluetooth \u00e9s 70 metres aprox. o una mica m\u00e9s en el cas del Wi-Fi depenent de l&#8217;abast d&#8217;aquest. En el cas de grups o f\u00f2rums la sincronitzaci\u00f3 p2p pot tenir major abast com m\u00e9s gran el grup.<\/p>\n<p>Amb connexi\u00f3 a Internet, Briar es sincroiniza a trav\u00e9s de la xarxa Tor, protegint als usuaris de vigil\u00e0ncia.<\/p>\n<p>Descarregar Briar: <a href=\"https:\/\/briarproject.org\/download.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/download.html<\/a><\/p>\n<p>Manual d&#8217;\u00fas de Briar: <a href=\"https:\/\/briarproject.org\/manual\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/manual\/<\/a><\/p>\n<p><a id=\"Mes\"><\/a><\/p>\n<h2><a href=\"#Mes\">#<\/a> M\u00e9s<\/h2>\n<p>Aquestes guia recull un seguit d&#8217;indicacions b\u00e0siques per preservar els drets a Internet. Per a m\u00e9s seguretat i privacitat a Internet consulta Security in a Box<a href=\"https:\/\/securityinabox.org\/es\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/securityinabox.org\/es<\/a>.<\/p>\n<p>El manual &#8220;Zen y el arte de que la tecnolog\u00eda trabaje para ti&#8221; per llegir m\u00e9s sobre la creaci\u00f3 i gesti\u00f3 d&#8217;identitats en l\u00ednia aix\u00ed com sobre la construcci\u00f3 i manteniment d&#8217;espais segurs en l\u00ednia i en la vida f\u00edsica: <a href=\"https:\/\/ttc.io\/zen\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ttc.io\/zen<\/a><\/p>\n<p>MyShadow (La meva Ombra Digital) per llegir i aprendre sobre eines i metodologies per entendre i modificar la teva ombra digital: <a href=\"https:\/\/myshadow.org\/es\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/myshadow.org\/es<\/a><\/p>\n<p>Finalment pel que fa a log\u00edstica b\u00e0sica, es recomana sortir de casa sempre amb els dispositius carregats i si pot ser amb bateries externes per a m\u00e9s autonomia.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Foto de portada de la campanya <a href=\"https:\/\/www.accessnow.org\/keepiton-spanish\/\" target=\"_blank\" rel=\"noopener noreferrer\">KeepItOn<\/a> d&#8217;Accessnow.<\/em><em>Sources for update:<br \/>\n<a href=\"https:\/\/www.localizationlab.org\/blog\/2022\/2\/27\/digital-security-assessment-amp-list-of-localized-tools-in-ukrainian\" rel=\"noopener\" target=\"_blank\">https:\/\/www.localizationlab.org\/blog\/2022\/2\/27\/digital-security-assessment-amp-list-of-localized-tools-in-ukrainian<\/a><br \/>\n<a href=\"https:\/\/ssd.eff.org\/en\/module\/attending-protest\" rel=\"noopener\" target=\"_blank\">https:\/\/ssd.eff.org\/en\/module\/attending-protest<\/a><\/em><br \/>\n&nbsp;<\/p>\n<p>Everything explained in this guide is to protect the inviolability of our communications, our right to privacy and freedom of political opinion, expression and access to information, all of them fundamental rights that have been legally recognized for centuries.<\/p>\n<p>It is important that legal doctrines that blame the tools for the crimes are not established. The tools are neutral. Making use of a particular tool can never be a crime in itself. It is only the use that is made of them that can be considered criminal.<\/p>\n<p>In the post-Snowden revelation era, many institutions, including the UN and the EU, remember that the only way that people have to protect themselves from mass surveillance is through the use of autonomous tools to protect our communications.<\/p>\n<p>[European Parliament Science and Technology Options Assessment (STOA) on Mass Surveillance: \u201cEncryption is the only option in the hands of the population to defend themselves against massive surveillance\u201d &#8211; <a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2015\/527409\/EPRS_STU(2015)527409_REV1_EN.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.europarl.europa.eu\/stoa\/webdav\/site\/cms\/shared\/0_home\/STOA Study Mass Surveillance Part 1.pdf<\/a>]<\/p>\n<h2>Basic how-to guide for preserving fundamental rights on the Internet<\/h2>\n<ol>\n<li><a href=\"#Blocking\">Arbitrary website and application blocking<\/a><\/li>\n<li><a href=\"#Encryption\">Mobile Device Encryption<\/a><\/li>\n<li><a href=\"#Hosting\">Hosting: privacy and security<\/a><\/li>\n<li><a href=\"#Messaging-VOIP-email\">Messaging, VOIP, email and file sharing privately and securely<\/a><\/li>\n<li><a href=\"#Blocking-Messaging\">Blocking of messaging applications<\/a><\/li>\n<li><a href=\"#Shutdown\">Internet shutdown<\/a><\/li>\n<li><a href=\"#More\"> More<\/a><\/li>\n<\/ol>\n<p>[<em><strong>This guide is to be improved collectively; if you have any corrections write to: info[at]xnet-x.net<\/strong> \/<a href=\"https:\/\/xnet-x.net\/keys\/infoxnet-0x3E59F813-public.asc\">Public PGP key<\/a><\/em>]<\/p>\n<p><a id=\"Blocking\"><\/a><\/p>\n<h2><a href=\"#Blocking\">#<\/a> Arbitrary website and application blocking<\/h2>\n<p>Arbitrary Internet blockages occur primarily &#8211; but not only &#8211; when a government intentionally disrupts access to websites, mobile applications or electronic communication services to censor or control what people say or do.<\/p>\n<p>Internet access is essential for the exercise of our freedoms and should be considered in itself a fundamental right [<a href=\"https:\/\/www.accessnow.org\/keepiton-spanish\/\" target=\"_blank\" rel=\"noopener noreferrer\">#KeepItOn<\/a>]. Partially or totally blocking Internet access is a common practice in countries with authoritarian regimes, for example, to avoid access to certain types of content (in opposition to the regime, LGTBI, etc.) and to exercise control over conversations and the flow of information.<\/p>\n<h3>How to access websites that are arbitrarily censored or blocked in a particular connection\/location: Tor and VPN<\/h3>\n<p>Both the Tor network and a VPN allow access to websites and applications that have been improperly blocked in a region or country, surfing the Internet as if it was being done from another geographical location.<\/p>\n<p>For example, if a country blocks access to Twitter, people can use the Tor network or a VPN to access the social network as if their connection was coming from another point or country where these arbitrary restrictions on freedom of expression and access to information are not happening. Moreover, navigation in both cases is encrypted \u2013 in a \u201cclosed envelope\u201d, so that it can only be read by the sender and receiver.<\/p>\n<ul>\n<li>Tor for <a href=\"#Tor-Andorid\">#Android<\/a> | <a href=\"#Tor-iPhone\">#iPhone<\/a> | <a href=\"#Tor-PC\">#PC<\/a><\/li>\n<li><a href=\"#VPN\">#VPN<\/a><\/li>\n<\/ul>\n<p><a id=\"Tor-Andorid\"><\/a><\/p>\n<h3>Tor for Android: Orbot<\/h3>\n<p>How to use Orbot:<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-13 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-13 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-13 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-13 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-13' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Download Orbot\" href='https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Orbot\" aria-describedby=\"gallery-13-12983\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-descarga-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-descarga-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12983'>\n\t\t\t\t<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.torproject.android\" target=\"_blank\">Download Orbot<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open and start Orbot\" href='https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Open and start Orbot\" aria-describedby=\"gallery-13-12984\" srcset=\"https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/2-abre-e-inicia-orbot.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12984'>\n\t\t\t\tOpen and start Orbot\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You are connected to the Tor network\" href='https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"You are connected to the Tor network\" aria-describedby=\"gallery-13-12985\" srcset=\"https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/3-te-has-conectado-a-la-red-tor.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12985'>\n\t\t\t\tYou are connected to the Tor network\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" href='https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Click on &quot;Apps in VPN mode&quot;. You do not need to install Orfox, you can use your usual browser.\" aria-describedby=\"gallery-13-12986\" srcset=\"https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/4-aplicaciones-en-modo-vpn.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12986'>\n\t\t\t\tClick on &#8220;Apps in VPN mode&#8221;. You do not need to install Orfox, you can use your usual browser.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Select the Apps that you can not access to because of the blocking\" href='https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Select the Apps that you can not access to because of the blocking\" aria-describedby=\"gallery-13-12987\" srcset=\"https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-Twitter-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12987'>\n\t\t\t\tSelect the Apps that you can not access to because of the blocking\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You can also select your browser, other apps, or everything (increases battery consumption)\" href='https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You can also select your browser, other apps, or everything (increases battery consumption)\" aria-describedby=\"gallery-13-12988\" srcset=\"https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-Firefox-Orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12988'>\n\t\t\t\tYou can also select your browser, other apps, or everything (increases battery consumption)\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" href='https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works here\" aria-describedby=\"gallery-13-12989\" srcset=\"https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-768x1365.png 768w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-Orbot-Firefox-connected.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12989'>\n\t\t\t\tVerify that you can access the blocked App with Orbot. If you have also activated it for your browser, check that it works  <a href=\"https:\/\/check.torproject.org\/\" target=\"_blank\">here<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"To add more Apps to Orbot go to Settings\" href='https:\/\/xnet-x.net\/img\/8-sttings-orbot.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png\" class=\"attachment-medium size-medium\" alt=\"To add more Apps to Orbot go to Settings\" aria-describedby=\"gallery-13-12990\" srcset=\"https:\/\/xnet-x.net\/img\/8-sttings-orbot-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-768x1365.png 768w, https:\/\/xnet-x.net\/img\/8-sttings-orbot-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-sttings-orbot.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12990'>\n\t\t\t\tTo add more Apps to Orbot go to Settings\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"and there &#039;Select Apps&#039;\" href='https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png\" class=\"attachment-medium size-medium\" alt=\"and there &#039;Select Apps&#039;\" aria-describedby=\"gallery-13-12992\" srcset=\"https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-169x300.png 169w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-768x1365.png 768w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps-576x1024.png 576w, https:\/\/xnet-x.net\/img\/9-Seleccionar-mas-Apps.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-13-12992'>\n\t\t\t\tand there &#8216;Select Apps&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-iPhone\"><\/a><\/p>\n<h3>Tor for iPhone: Onion Browser<\/h3>\n<p>There is no iPhone application that allows use of the Tor network for any application installed on the device. However, with Onion Browser you can access websites and the web version of arbitrarily blocked applications.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-14 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-14 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-14 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-14 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-14' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" href='https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"Download Onion Browser for iPhone; open it and select &#039;connect to Tor&#039;\" aria-describedby=\"gallery-14-13012\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-onion-browser-1.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-14-13012'>\n\t\t\t\t<a href='https:\/\/itunes.apple.com\/us\/app\/onion-browser-secure-anonymous-web-with-tor\/id519296448?mt=8' target='_blank'>Download Onion Browser<\/a> for iPhone; open it and select &#8216;connect to Tor&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"From here you can access blocked websites and blocked web apps\" href='https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg\" class=\"attachment-medium size-medium\" alt=\"From here you can access blocked websites and blocked web apps\" aria-describedby=\"gallery-14-13011\" srcset=\"https:\/\/xnet-x.net\/img\/iphone-tor-browser-2-300x244.jpg 300w, https:\/\/xnet-x.net\/img\/iphone-tor-browser-2.jpg 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-14-13011'>\n\t\t\t\tFrom here you can access blocked websites and blocked web apps\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p><a id=\"Tor-PC\"><\/a><\/p>\n<h3>Tor for PC: Tor Browser<\/h3>\n<p>Download Tor browser for <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux \/ MacOS \/ Windows<\/a>.<\/p>\n<p>How to install and use Tor in <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en#linux\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a> \/ <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en#macosx\" target=\"_blank\" rel=\"noopener noreferrer\">MacOS<\/a> \/ <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en#windows\" target=\"_blank\" rel=\"noopener noreferrer\">Windows<\/a>.<\/p>\n<p>Video: How to use Tor in PCs created for the launching of the <a href=\"https:\/\/boingboing.net\/2017\/01\/19\/barcelona-government-officiall.html\" target=\"_blank\" rel=\"noopener noreferrer\">Whistleblowing Platform against corruption<\/a> of the City Hall of Barcelona (CAT):<\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"Tdmq8qCEncI\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a id=\"VPN\"><\/a><\/p>\n<h3>VPN<\/h3>\n<p>A VPN (Virtual Private Network) allows your data to travel through an encrypted connection, or a kind of tunnel,before heading out to the open Internet, and connect to the Web  from another location.<br \/>\nThe easiest and fastest application to install in order to activate a VPN connection is Bitmask, which is also free. At the moment it is only available for Android phones and Linux PCs although its version for the MacOs iPhone is about to be released and, in the not too distant future, its Windows version. However, there are many very low-cost payment services that offer VPN connection for all types of devices, for example <a href=\"https:\/\/protonvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ProtonVPN<\/a> which also offers a limited free version \u2013 see below for information on Internet services that ensure the preservation of privacy and information.<br \/>\nIt is advisable to have both Tor and VPN options. Iftraffic is blocked through Tor, you can then use the VPN, and vice versa.<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-15 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-15 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-15 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-15 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-15' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Download and install Bitmask\" href='https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Download and install Bitmask\" aria-describedby=\"gallery-15-13025\" srcset=\"https:\/\/xnet-x.net\/img\/1-descarga-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-descarga-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13025'>\n\t\t\t\tDownload and install <a href=\"https:\/\/bitmask.net\/es\/install\" target=\"_blank\">Bitmask<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Open it. Select a provider. Any one of the 3 works \" href='https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Open it. Select a provider. Any one of the 3 works\" aria-describedby=\"gallery-15-13026\" srcset=\"https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-elige-un-proveedor.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13026'>\n\t\t\t\tOpen it. Select a provider. Any one of the 3 works\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Register (or initiate session )\" href='https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Register (or initiate session )\" aria-describedby=\"gallery-15-13027\" srcset=\"https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-registrate-inicia-sesion.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13027'>\n\t\t\t\tRegister (or initiate session )\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Choose a username and password\" href='https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Choose a username and password\" aria-describedby=\"gallery-15-13028\" srcset=\"https:\/\/xnet-x.net\/img\/4-elige-usuario-password-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-elige-usuario-password.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13028'>\n\t\t\t\tChoose a username and password\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"After logging in, start Bitmask\" href='https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"After logging in, start Bitmask\" aria-describedby=\"gallery-15-13029\" srcset=\"https:\/\/xnet-x.net\/img\/5-inicia-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-inicia-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13029'>\n\t\t\t\tAfter logging in, start Bitmask\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Accept connection via VPN\" href='https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Accept connection via VPN\" aria-describedby=\"gallery-15-13030\" srcset=\"https:\/\/xnet-x.net\/img\/6-aceptar-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/6-aceptar-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13030'>\n\t\t\t\tAccept connection via VPN\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"You will see an icon in the top bar indicating that you are logged in\" href='https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png\" class=\"attachment-medium size-medium\" alt=\"You will see an icon in the top bar indicating that you are logged in\" aria-describedby=\"gallery-15-13031\" srcset=\"https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-169x300.png 169w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN-576x1024.png 576w, https:\/\/xnet-x.net\/img\/7-navegando-por-VPN.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13031'>\n\t\t\t\tYou will see an icon in the top bar indicating that you are logged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Display the top notification menu to check the status of Bitmask or turn it off\" href='https:\/\/xnet-x.net\/img\/8-info-bitmask.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Display the top notification menu to check the status of Bitmask or turn it off\" aria-describedby=\"gallery-15-13032\" srcset=\"https:\/\/xnet-x.net\/img\/8-info-bitmask-169x300.png 169w, https:\/\/xnet-x.net\/img\/8-info-bitmask-576x1024.png 576w, https:\/\/xnet-x.net\/img\/8-info-bitmask.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-15-13032'>\n\t\t\t\tDisplay the top notification menu to check the status of Bitmask or turn it off\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>For a correct configuration of the VPN connection, it is important to ensure that you are not suffering &#8216;DNS leakage&#8217;. Otherwise you will not be able to overcome the blockade and will reveal your connection data. In the page <a href=\"https:\/\/hidester.com\/dns-leak-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Leak test<\/a> you can find out how to test it and how to solve it,.<br \/>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-16 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-16 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-16 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-16 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-16' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Visit the page DNS Leak test\" href='https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Visit the page DNS Leak test\" aria-describedby=\"gallery-16-13110\" srcset=\"https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-169x300.png 169w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page-576x1024.png 576w, https:\/\/xnet-x.net\/img\/1-DNSLEAK_test_page.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-16-13110'>\n\t\t\t\tVisit the page <a href=' https:\/\/hidester.com\/dns-leak-test\/' target='_blank'>DNS Leak test<\/a>\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Perform a test without the VPN connected. Look at the data.\" href='https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Perform a test without the VPN connected. Look at the data.\" aria-describedby=\"gallery-16-13112\" srcset=\"https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-DNSLEAK_test_result_sin_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-16-13112'>\n\t\t\t\tPerform a test without the VPN connected. Look at the data.\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it. \" href='https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png\" class=\"attachment-medium size-medium\" alt=\"Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\" aria-describedby=\"gallery-16-13111\" srcset=\"https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-DNSLEAK_test_result_con_vpn.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-16-13111'>\n\t\t\t\tConnect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n<\/p>\n<p><a id=\"Encryption\"><\/a><\/p>\n<h2><a href=\"#Encryption\">#<\/a> Mobile Device Encryption<\/h2>\n<p>Encrypting devices, especially mobile phones, is essential to maintain the privacy of personal data should they be lost or stolen. This is why most smartphones have installed by default tools which, in a few simple steps, encrypt the entire device, and it always is recommended to protect the privacy of data, accounts, contacts and user information.<\/p>\n<h3>Mobile Device Encryption: Example with Android<\/h3>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-17 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-17 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-17 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-17 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-17' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" href='https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg\" class=\"attachment-medium size-medium\" alt=\"The device encryption option is in &#039;Settings&#039; -&gt; &#039;Additional settings&#039;\" aria-describedby=\"gallery-17-13037\" srcset=\"https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-169x300.jpg 169w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-768x1365.jpg 768w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes-576x1024.jpg 576w, https:\/\/xnet-x.net\/img\/1-cifrado-ajustes.jpg 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-17-13037'>\n\t\t\t\tThe device encryption option is in &#8216;Settings&#8217; -> &#8216;Additional settings&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Privacy&#039;\" href='https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Privacy&#039;\" aria-describedby=\"gallery-17-13038\" srcset=\"https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-169x300.png 169w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-768x1365.png 768w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales-576x1024.png 576w, https:\/\/xnet-x.net\/img\/2-cifrado-adicionales.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-17-13038'>\n\t\t\t\t&#8216;Privacy&#8217;\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"&#039;Device Encryption&#039;\" href='https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png\" class=\"attachment-medium size-medium\" alt=\"&#039;Device Encryption&#039;\" aria-describedby=\"gallery-17-13039\" srcset=\"https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-169x300.png 169w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-768x1365.png 768w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad-576x1024.png 576w, https:\/\/xnet-x.net\/img\/3-cifrado-privacidad.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-17-13039'>\n\t\t\t\t&#8216;Device Encryption&#8217;\n\t\t\t\t<\/dd><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in  \" href='https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png\" class=\"attachment-medium size-medium\" alt=\"In order to encrypt the device you need to have the battery charged and it should also be plugged in\" aria-describedby=\"gallery-17-13040\" srcset=\"https:\/\/xnet-x.net\/img\/4-cifrado-bateria-169x300.png 169w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-768x1365.png 768w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria-576x1024.png 576w, https:\/\/xnet-x.net\/img\/4-cifrado-bateria.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-17-13040'>\n\t\t\t\tIn order to encrypt the device you need to have the battery charged and it should also be plugged in\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" href='https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png'><img loading=\"lazy\" decoding=\"async\" width=\"169\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png\" class=\"attachment-medium size-medium\" alt=\"When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\" aria-describedby=\"gallery-17-13041\" srcset=\"https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-169x300.png 169w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-768x1365.png 768w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar-576x1024.png 576w, https:\/\/xnet-x.net\/img\/5-cifrado-confrimar.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-17-13041'>\n\t\t\t\tWhen loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Encryption of <a href=\"https:\/\/ssd.eff.org\/es\/module\/c%C3%B3mo-encriptar-su-iphone\" rel=\"noopener noreferrer\" target=\"_blank\">iPhones<\/a>.<\/p>\n<p>In geneal, as a good practice, you should not store unnecessary information in your devices, delete periodically. Even though you may be sure that everything you have is absolutely legal, remember that it is not you, but the power who decides what is legal and what isn&#8217;t, and what today is legal might not be so tomorrow in case that the regime becomes authoritarian. Deleting and emptying the bin is not enough, you have to use specific tools that overwrite the data several times. More information and tools to do it <a href=\"https:\/\/securityinabox.org\/en\/guide\/destroy-sensitive-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> (a backdoor was discovered in CCleaner for Windows that has already been <a href=\"http:\/\/www.piriform.com\/news\/blog\/2017\/9\/18\/security-notification-for-ccleaner-v5336162-and -ccleaner-cloud-v1073191-for-32-bit-windows-users \">patched<\/a>, always download the latest version).<\/p>\n<p>Remember to also create and maintain secure, unique, and strong passwords. Some tips on how to do this <a href=\"https:\/\/securityinabox.org\/en\/guide\/passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> (note: unlock by pattern is always much weaker than an alphanumeric password).<\/p>\n<p><em style=\"font-size:90%\">Note to the Spanish State: In the case that security forces confiscate someone\u2019s device because this person is under investigation , he or she has the right not to reveal encryption keys, PIN, unlock pattern, password or similar data, in accordance with the right not to testify against oneself (Criminal Procedure Law <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a118\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 118 h<\/a> &#038; <a href=\"http:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1882-6036&#038;p=20151006&#038;tn=1#a588septiesb\" target=\"_blank\" rel=\"noopener noreferrer\">Art. 588 septies b 2<\/a>; as explained in this <a href=\"https:\/\/www.asktheeu.org\/en\/request\/3347\/response\/11918\/attach\/5\/Encryption%20questionnaire%20ES%20DRAFT%20PA.pdf#page2\" target=\"_blank\" rel=\"noopener noreferrer\">document<\/a> to the Secretariat of State of the European Union).<\/em><\/p>\n<p><a id=\"Hosting\"><\/a><\/p>\n<h2><a href=\"#Hosting\">#<\/a> Hosting: privacy and security<\/h2>\n<p>The censorship of websites by authoritarian governments can happen at a deeper level when, instead of blocking access to the web through the network, the page is entirely closed down either by intervening in the servers or by seizing the domain. In this case, tools like Tor or a VPN will not help.<\/p>\n<p>In order to foil such attempts (or create a <em>mirror<\/em> \u2013 copy of the same website \u2013 in a secure hosting if the web has already been censored), citizens living in authoritarian states should not choose a server within the territory of their country. It is necessary to search and choose countries where the legal framework offers strong guarantees regarding freedom of expression and information about where to locate the <em>hosting<\/em>.<\/p>\n<p>Neither should they register the domain of a website susceptible to be censored with <em>Top Level Domains<\/em> of their own country. It is easier for a government to intervene in its TLD than in others such as <em>.net<\/em>, <em>.eu<\/em> or <em>.is<\/em>. In Spain, we have recently experienced a preposterous example of this, unprecedented in the European Union, with the TLD <em>.cat<\/em>:<\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-18 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-18 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-18 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-18 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-18' class='gallery galleryid-12978 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon portrait'>\n\t\t\t\t<a title=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters \" href='https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"206\" height=\"300\" src=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Fundaci\u00f3 Puntcat denounces to ICANN the inordinate action of the courts assaulting its headquarters\" aria-describedby=\"gallery-18-13052\" srcset=\"https:\/\/xnet-x.net\/img\/fundacio-punt-cat-206x300.jpg 206w, https:\/\/xnet-x.net\/img\/fundacio-punt-cat.jpg 400w\" sizes=\"auto, (max-width: 206px) 100vw, 206px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-18-13052'>\n\t\t\t\tFundaci\u00f3 Puntcat <a href=\"https:\/\/twitter.com\/puntcat\/status\/909525852446187521\">denounces<\/a> to ICANN the inordinate action of the courts assaulting its headquarters\n\t\t\t\t<\/dd><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a title=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" href='https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"256\" src=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png\" class=\"attachment-medium size-medium\" alt=\"Internet Society statement on Internet blocking measures in Catalonia, Spain\" aria-describedby=\"gallery-18-13065\" srcset=\"https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain-300x256.png 300w, https:\/\/xnet-x.net\/img\/Internet-Society-statement-on-Internet-blocking-measures-in-Catalonia-Spain.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt>\n\t\t\t\t<dd class='wp-caption-text gallery-caption' id='gallery-18-13065'>\n\t\t\t\tInternet Society <a href=\"https:\/\/twitter.com\/internetsociety\/status\/910995196405518336\">statement<\/a> on Internet blocking measures in Catalonia, Spain\n\t\t\t\t<\/dd><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>Finally, to protect your privacy and security (to avoid spam, spam, or other harassment), you should acquire your domain in registration services that offer strong legal security, eg <a href=\"https:\/\/njal.la\/ \"target=\"_blank\">Njalla<\/a>.<\/p>\n<p>Many domain registrars undertake not to publish the owner\u2019s data and to manage the requests they receive themselves, whether they are requests from buyers, individuals, or authorities and institutions. This type of service is known as private <em>whois<\/em>.<\/p>\n<p>The importance of this requirement can be understood by entering, for example, <a href=\"https:\/\/whois.icann.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/whois.icann.org\/<\/a> or <a href=\"https:\/\/www.nic.es\/sgnd\/domain\/publicInformationDominios.action\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nic.es\/sgnd\/dominio\/publicInformacionDominios.action<\/a> (for domains ending in .es) and looking for any web.<\/p>\n<p>A file will appear in which all data will be output. If the person who owns the website has not used a provider which had undertaken to protect their privacy, his or her information will be published,and anyone from anywhere can see it:<\/p>\n<div style=\"background:white; font-size:90%; padding:15px;margin-bottom:20px; max-width:600px\">\nREGISTRANT CONTACT (note that providing inaccurate or outdated information is punishable )<br \/>\nName: \u2026<br \/>\nOrganisation: \u2026<br \/>\nStreet: \u2026<br \/>\nCity: \u2026<br \/>\nState: \u2026<br \/>\nPostal Code: \u2026<br \/>\nPhone: \u2026<br \/>\nEmail: \u2026\n<\/div>\n<p>If the owner has taken the functional and customary measure that the requests are to be managed by the provider (has activated the private <em>whois<\/em> service), the data will be forwarded to the service provider. The provider will notify the owner if someone has searched or required it. It is important that the provider should assure you in the contract of the deadlines within which it provides you with the information. The more ethical providers which are  respectful of the rights of their users usually offer deadlines between the requirement and the communication of your data to those who require it if you have not answered.<\/p>\n<p>Not all domains agree because not all domains are managed in the same way. Generic domains, .com, .net, .biz, .org, etc\u2026 are managed by ICANN \u2013 the Internet Corporation for Assigned Names and Numbers, the leading Internet governance body, and this organization is the one which permits the use of domains that can have recourse to to Whois protection. The .es domains, on the other hand, are managed by Red.es and, these domains, do not allow hiding the data of the registry of users who want to acquire of a .es domain.<br \/>\nThe .cat domains, managed by the puntCAT Foundation, do not offer total privacy of the identity either.<\/p>\n<p><a id=\"Messaging-VOIP-email\"><\/a><\/p>\n<h2><a href=\"#Messaging-VOIP-email\">#<\/a> Messaging, VOIP, email and file sharing privately and securely<\/h2>\n<p>Massive surveillance of what we do and say on the Internet (and in all electronic communications) by governments has been clearly revealed thanks to Snowden\u2019s revelations. Below are some tips to help defend privacy against these practices using encryption tools.<\/p>\n<h3>Messaging<\/h3>\n<p><a href=\"https:\/\/wire.com\/en\/\"><img loading=\"lazy\" decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/wire-app.jpeg\" alt=\"Signal\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<p>To protect the privacy of your communications always use messaging applications that have end-to-end encryption by default. We recommend using <strong>Wire<\/strong> (download and install <a href=\"https:\/\/wire.com\/en\/download\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wire<\/a> for Android phones or iPhone; Linux, MacOS or Windows PCs; or in the web browser), end-to-end encrypted messaging app whose use is easy and intuitive. <strong>It is possible to create an account in Wire without having to associate it with the mobile <\/strong>. To do this, it is necessary to first create the Wire account from the PC, a process that does not require the mobile phone number, and then install the Wire app on the mobile device and log into that account. For this and other characteristics Wire tops this list of recommended applications. <\/p>\n<p>Another secure alternative is Signal (<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.securesms&#038;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> | <a href=\"https:\/\/itunes.apple.com\/en\/app\/signal-private-messenger\/id874139669?mt=8\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone<\/a>), an end-to-end encrypted messaging app and recommended by Snowden himself.<\/p>\n<p>Among other popular messaging applications, Whatsapp has also integrated end-to-end encryption in all communications by default (however, Facebook has already <a href=\"https:\/\/techcrunch.com\/2016\/08\/25\/whatsapp-to-share-user-data-with-facebook-for-ad-targeting-heres-how-to-opt-out\/\" target=\"_blank\" rel=\"noopener noreferrer\">shared user data<\/a> with WhatsApp and the social network, so Signal is still the best choice). Telegram, has encryption option but is not active by default.<\/p>\n<p>It is important to note that, even though they are encrypted end-to-end, except in the case of Wire if an account has been created from the PC as we explained, the above applications are associated with the user\u2019s mobile number. Hence, even if the communication is encrypted (a third person cannot see the content) it is not anonymous and the identity of the sender and receiver, as well as connection and geolocation times are known.<\/p>\n<h3>Video calls &#8211; VOIP<\/h3>\n<p>You can make encrypted calls and video calls over the Internet with Signal (and Whatsapp) to a contact. <a href=\"https:\/\/meet.jit.si\/\" target=\"_blank\" rel=\"noopener noreferrer\">MeetJitsi<\/a> allows you to make group video calls as well as Wire. Calls and video calls through Skype, Hangouts or others do not sufficiently protect the privacy of your communications.<\/p>\n<h3>Encrypted email<\/h3>\n<p>In the case of e-mail, it is important to know that all e-mail sent and received can be read (and is actually processed) by the mail service providers. Some of them, when required by the authorities, show little concern about the privacy and legal security of their customers\/users. We do not recommend the use of services like gmail, yahoo, hotmail, etc. In any case, it should be known that sending any email without encryption is almost the same as sending a letter  in an open envelope. One good alternative to this services is <a href=\"https:\/\/protonmail.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protonmail<\/a>, which automatically applies end-to-end encryption to all emails. As a result, the encrypted emails cannot be shared with third parties. The free version has 2Gb storage.<\/p>\n<p>Despite what email service you use it is always possible to protect the right to confidentiality of communication using encryption with <strong>PGP<\/strong>. This allows you to ensure the privacy of communications and files sent via email. This guide from Security in a Box explains how to use email with PGP with <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/linux\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">MacOS<\/a> | <a href=\"https:\/\/securityinabox.org\/en\/guide\/thunderbird\/windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows<\/a>.<\/p>\n<p>Again in this cases, the communication is encrypted in terms of content, but not anonymous.<br \/>\nWhat does this mean? It means that, even if we do not indicate our name, or we use an email account in which our identity does not appear, or a throw-away one, all electronic communication leaves a trail , the so-called IP address, which is a unique address assigned to each device on the network and indicating the point from which a communication has been made. In addition, the sender, recipient, and subject of the message as well as other \u201cmetadata\u201d of the mail are not encrypted and indicate who receives it, when, and other data. Therefore, the only real anonymity possible for transferring files and information can be achieved through the Tor network, because this communication is not made from point A to point B but the connection passes through several intermediate nodes within the Tor network, none of which knows the origin and destination at the same time. Obviously, accessing our regular account of gmail or any social network through the Tor network will reveal the identity even if the IP address is hidden.<\/p>\n<p><a href=\"https:\/\/onionshare.org\/\" rel=\"noopener noreferrer\" target=\"_blank\">OnionShare<\/a> is an open source tool that lets you securely and anonymously share a file of any size. It works creating a temporary URL that points to the file and that is only accessible via Tor. Learn how it works and how to use it on the <a href=\"https:\/\/github.com\/micahflee\/onionshare\/wiki\" target=\"_blank\" rel=\"noopener noreferrer\">wiki<\/a>.<\/p>\n<p>Another example of how to deliver information privately and securely is the <a href=\"https:\/\/xnet-x.net\/buzon-xnet\/\" target=\"_blank\" rel=\"noopener noreferrer\"> XnetLeaks<\/a> mailbox for reporting corruption, based on <a href=\"https:\/\/www.globaleaks.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Globaleaks<\/a> and accessible through Tor.<\/p>\n<p><a id=\"Blocking-Messaging\"><\/a><\/p>\n<h2><a href=\"#Blocking-Messaging\">#<\/a> Blocking of messaging applications<\/h2>\n<p>Alternatives to private and public communication in case Signal or Whatsapp messaging applications and social networks are blocked. As a preventive measure against possible blockades or other repressive practices it is always advisable to diversify and have several alternative applications.<\/p>\n<h3>FireChat: for Android and iPhone<\/h3>\n<p>FireChat is a messaging application that allows communication between devices and publishing in public forums between nearby devices through <em>mesh-networks<\/em>.<\/p>\n<ul>\n<li>Public rooms: like <em>#PublicRoom1<\/em>, are open chats in which all messages reach all participants in the chat. <strong>All messages are public and not encrypted<\/strong>. The creators of FireChat recommend that people should not use personal data and that they should be careful with personal information that is shared in the public chats.<\/li>\n<li>Private Messages: Private messages are encrypted and can only be viewed by the sender and the recipients, which can be one or several.<\/li>\n<\/ul>\n<p>This is the application used by demonstrators in the yellow umbrella revolution in <a href=\"https:\/\/www.theguardian.com\/world\/2014\/sep\/29\/firechat-messaging-app-powering-hong-kong-protests\" target=\"_blank\" rel=\"noopener noreferrer\">Hong Kong<\/a> when their communications were blocked.<\/p>\n<p>Download FireChat for Android or iPhone: <a href=\"https:\/\/www.opengarden.com\/firechat.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/firechat.html<\/a><\/p>\n<p>How to use FireChat: <a href=\"https:\/\/www.opengarden.com\/how-to.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.opengarden.com\/how-to.html<\/a><\/p>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 550px;\">\n<div class=\"youtube-player\" data-id=\"GogPPT3ePGQ\" style=\" position: relative; height: 0px;\"><\/div>\n<\/div>\n<p><a class=\"scroll\" id=\"Shutdown\"><\/a><\/p>\n<h2><a href=\"#Shutdown\">#<\/a> Internet shutdown<\/h2>\n<p>In the extreme case of a shutdown in which the Internet connection is completely cut off, as happens in situations of great repression, there are applications that allow communication between mobile devices, even without connection.<\/p>\n<h3>Briar: for Android<\/h3>\n<p><a href=\"https:\/\/briarproject.org\/index.html\"><img decoding=\"async\" style=\"float:left;margin: 0 15px 10px 0;\" src=\"https:\/\/xnet-x.net\/img\/briar_logo_large.jpg\" alt=\"Briar, Secure messaging, anywhere\"\/><\/a><\/p>\n<p>Briar is an open source messaging application designed for activists, journalists and anyone else who needs a secure, easy and robust way to communicate. Unlike traditional messaging tools such as email, Twitter or Telegram, Briar is not based on a central server: messages are synchronized directly via p2p between users&#8217; devices.<\/p>\n<p>If the Internet is down, Briar can synchronize messages via Bluetooth or Wi-Fi, and thus maintain the flow of information in case of crisis. The devices must be able to connect between them so the maximum distance in the case of Bluetooth is 70 meters approx. or a little more in the case of Wi-Fi depending on its scope. In the case of groups or forums, the larger the group the greater the reach of p2p synchronization.<\/p>\n<p>With Internet connection, Briar is synchronized through the Tor network, protecting users from surveillance.<\/p>\n<p>Download Briar: <a href=\"https:\/\/briarproject.org\/download.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/download.html<\/a><\/p>\n<p>Howt to use Briar: <a href=\"https:\/\/briarproject.org\/manual\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/briarproject.org\/manual\/<\/a><\/p>\n<p><a id=\"More\"><\/a><\/p>\n<h2><a href=\"#More\">#<\/a> More<\/h2>\n<p>This guide contains a series of basic guidelines for preserving your rights on the Internet. For greater security and privacy on the Internet, visit Security in a Box: <a href=\"https:\/\/securityinabox.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/securityinabox.org\/<\/a>.<\/p>\n<p>The manual &#8220;Zen and the art of making tech work for you&#8221; to read more about creating and managing online identities as well as about building and maintaining secure spaces online and in physical life: <a href=\"https:\/\/ttc.io\/zen\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ttc.io\/zen<\/a><\/p>\n<p>MyShadow to read and learn about tools and methodologies to understand and change your digital shade: <a href=\"https:\/\/myshadow.org\/en\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/myshadow. org\/en<\/a><\/p>\n<p>Finally in terms of basic logistics, it is recommended that you should always leave home with your devices charged and, if possible, with external batteries for greater autonomy.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Front page from Accessnow&#8217;s campaign <a href=\"https:\/\/www.accessnow.org\/keepiton-spanish\/\" target=\"_blank\" rel=\"noopener noreferrer\">KeepItOn<\/a>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Sources for update: https:\/\/www.localizationlab.org\/blog\/2022\/2\/27\/digital-security-assessment-amp-list-of-localized-tools-in-ukrainian https:\/\/ssd.eff.org\/en\/module\/attending-protest &nbsp; Everything explained in this guide is to protect the inviolability of our communications, our right to privacy and freedom of political opinion, expression and access to information, all of them fundamental rights that have been legally recognized for centuries. It is important that legal doctrines that blame the tools [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":13353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-12978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","ejes-neutralidad-de-la-red","servicios-recomendaciones-de-politicas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gu\u00eda de indicaciones para preservar los derechos en Internet<\/title>\n<meta name=\"description\" content=\"Gu\u00eda para proteger nuestro derecho a la privacidad y la libertad de opini\u00f3n pol\u00edtica, de expresi\u00f3n y de acceso a la informaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/\"},\"author\":{\"name\":\"Xnet\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\"},\"headline\":\"Basic how-to guide for preserving fundamental rights on the Internet\",\"datePublished\":\"2017-09-21T13:03:02+00:00\",\"dateModified\":\"2025-01-23T16:28:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/\"},\"wordCount\":10011,\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg\",\"articleSection\":[\"Blog - Our recent actions\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/\",\"url\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/\",\"name\":\"Gu\u00eda de indicaciones para preservar los derechos en Internet\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg\",\"datePublished\":\"2017-09-21T13:03:02+00:00\",\"dateModified\":\"2025-01-23T16:28:24+00:00\",\"description\":\"Gu\u00eda para proteger nuestro derecho a la privacidad y la libertad de opini\u00f3n pol\u00edtica, de expresi\u00f3n y de acceso a la informaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage\",\"url\":\"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg\",\"width\":1000,\"height\":500,\"caption\":\"Gu\u00eda de indicaciones para preservar los derechos fundamentales en Internet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/xnet-x.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gu\u00eda de indicaciones para preservar los derechos fundamentales en Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xnet-x.net\/en\/#website\",\"url\":\"https:\/\/xnet-x.net\/en\/\",\"name\":\"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]\",\"description\":\"Information and Culture Freedoms. Technopolitics. Data privacy, algorithms and digital rights. Free Speech, Net Neutrality, whistleblowers, anticorruption\",\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xnet-x.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xnet-x.net\/en\/#organization\",\"name\":\"Xnet - Internet freedoms & digital rights\",\"url\":\"https:\/\/xnet-x.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/xnet-x.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Xnet - Internet freedoms & digital rights\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/RedX.Net\/\",\"https:\/\/x.com\/x_net_\",\"https:\/\/es.wikipedia.org\/wiki\/Xnet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\",\"name\":\"Xnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/xnet-x.net\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"caption\":\"Xnet\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gu\u00eda de indicaciones para preservar los derechos en Internet","description":"Gu\u00eda para proteger nuestro derecho a la privacidad y la libertad de opini\u00f3n pol\u00edtica, de expresi\u00f3n y de acceso a la informaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/","twitter_misc":{"Written by":"Xnet","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#article","isPartOf":{"@id":"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/"},"author":{"name":"Xnet","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637"},"headline":"Basic how-to guide for preserving fundamental rights on the Internet","datePublished":"2017-09-21T13:03:02+00:00","dateModified":"2025-01-23T16:28:24+00:00","mainEntityOfPage":{"@id":"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/"},"wordCount":10011,"publisher":{"@id":"https:\/\/xnet-x.net\/es\/#organization"},"image":{"@id":"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg","articleSection":["Blog - Our recent actions"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/","url":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/","name":"Gu\u00eda de indicaciones para preservar los derechos en Internet","isPartOf":{"@id":"https:\/\/xnet-x.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage"},"image":{"@id":"https:\/\/xnet-x.net\/es\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg","datePublished":"2017-09-21T13:03:02+00:00","dateModified":"2025-01-23T16:28:24+00:00","description":"Gu\u00eda para proteger nuestro derecho a la privacidad y la libertad de opini\u00f3n pol\u00edtica, de expresi\u00f3n y de acceso a la informaci\u00f3n.","breadcrumb":{"@id":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/"]]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#primaryimage","url":"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg","contentUrl":"https:\/\/xnet-x.net\/img\/Internet-Freedom-Becomes-A-Mere-Illusion.jpg","width":1000,"height":500,"caption":"Gu\u00eda de indicaciones para preservar los derechos fundamentales en Internet"},{"@type":"BreadcrumbList","@id":"https:\/\/xnet-x.net\/en\/manual-tecnico-derechos-fundamentales-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/xnet-x.net\/en\/"},{"@type":"ListItem","position":2,"name":"Gu\u00eda de indicaciones para preservar los derechos fundamentales en Internet"}]},{"@type":"WebSite","@id":"https:\/\/xnet-x.net\/en\/#website","url":"https:\/\/xnet-x.net\/en\/","name":"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]","description":"Information and Culture Freedoms. Technopolitics. Data privacy, algorithms and digital rights. Free Speech, Net Neutrality, whistleblowers, anticorruption","publisher":{"@id":"https:\/\/xnet-x.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xnet-x.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/xnet-x.net\/en\/#organization","name":"Xnet - Internet freedoms & digital rights","url":"https:\/\/xnet-x.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/xnet-x.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xnet-x.net\/img\/xnet-logo.png","contentUrl":"https:\/\/xnet-x.net\/img\/xnet-logo.png","width":512,"height":512,"caption":"Xnet - Internet freedoms & digital rights"},"image":{"@id":"https:\/\/xnet-x.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/RedX.Net\/","https:\/\/x.com\/x_net_","https:\/\/es.wikipedia.org\/wiki\/Xnet"]},{"@type":"Person","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637","name":"Xnet","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/xnet-x.net\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","caption":"Xnet"}}]}},"_links":{"self":[{"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/posts\/12978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/comments?post=12978"}],"version-history":[{"count":21,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/posts\/12978\/revisions"}],"predecessor-version":[{"id":22332,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/posts\/12978\/revisions\/22332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/media\/13353"}],"wp:attachment":[{"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/media?parent=12978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/categories?post=12978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xnet-x.net\/en\/wp-json\/wp\/v2\/tags?post=12978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}