{"id":8995,"date":"2015-12-17T12:39:32","date_gmt":"2015-12-17T11:39:32","guid":{"rendered":"https:\/\/xnet-x.net\/?p=8995"},"modified":"2021-07-01T12:21:05","modified_gmt":"2021-07-01T10:21:05","slug":"right-to-privacy-and-encryption","status":"publish","type":"post","link":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/","title":{"rendered":"Derecho a la Privacidad y a la Encriptaci\u00f3n"},"content":{"rendered":"<p>Los riesgos para los derechos fundamentales de privacidad y libertad de expresi\u00f3n de los ciudadanos que suponen las pr\u00e1cticas abusivas de vigilancia de empresas privadas y\/o gobiernos est\u00e1n actualmente siendo debatidos en la Uni\u00f3n Europea y a nivel internacional.<\/p>\n<p>Como ciudadanos, tenemos derecho a protegernos de pr\u00e1cticas como estas. Nuestros datos personales y nuestras comunicaciones son parte de nuestra vida privada, y como tal deben ser tratados.<\/p>\n<blockquote><p><strong style=\"font-style:normal\">Carta abierta a los gobiernos por un encriptado fuerte, unas comunicaciones seguras y en defensa de la privacidad:<\/p>\n<div style=\"font-size:90%\">https:\/\/securetheinternet.org\/?lang=es<\/strong><\/p>\n<p>Alentamos a los l\u00edderes mundiales a apoyar la seguridad de los usuarios, empresas y gobiernos mediante el fortalecimiento de la integridad de las comunicaciones y los sistemas. Para lograrlo, los gobiernos deber\u00edan rechazar leyes, pol\u00edticas y otros mandatos o pr\u00e1cticas, \u2013incluyendo acuerdos secretos con las empresas\u2013 que limiten el acceso o socaven el cifrado y otras tecnolog\u00edas y herramientas de comunicaci\u00f3n segura.<\/p>\n<ul>\n<li style=\"margin-bottom:15px\">&#8211; Los gobiernos no deber\u00edan prohibir ni limitar el acceso de los usuarios a las tecnolog\u00edas de cifrado; o prohibir el uso de cifrado por grados o tipos;<\/li>\n<li style=\"margin-bottom:15px\">&#8211; Los gobiernos no deber\u00edan exigir el dise\u00f1o o la implementaci\u00f3n de \u00abpuertas traseras\u00bb (backdoors) o vulnerabilidades en herramientas, tecnolog\u00edas o servicios;<\/li>\n<li style=\"margin-bottom:15px\">&#8211; Los gobiernos no deber\u00edan requerir que las herramientas, tecnolog\u00edas o servicios sean dise\u00f1ados o desarrollados para permitir el acceso de terceros a datos sin cifrar o a las claves de cifrado;<\/li>\n<li style=\"margin-bottom:15px\">&#8211; Los gobiernos no deber\u00edan tratar de debilitar o socavar los est\u00e1ndares de cifrado o influir intencio-nalmente en su desarrollo, a menos que sea para promover un mayor nivel de seguridad de la in-formaci\u00f3n.<\/li>\n<li style=\"margin-bottom:20px\">&#8211; Ning\u00fan gobierno deber\u00eda exigir algoritmos, est\u00e1ndares, herramientas o tecnolog\u00edas de cifrado in-seguros. Tampoco deber\u00eda, por acuerdo privado o p\u00fablico, obligar o presionar a entidades para que act\u00faen de manera incompatible con los principios anteriores.<\/li>\n<\/ul>\n<\/div>\n<\/blockquote>\n<p><strong>Documentos oficiales de la Uni\u00f3n Europea y de las Naciones unidas reconocen la encriptaci\u00f3n punto a punto como la \u00fanica opci\u00f3n en manos de la poblaci\u00f3n para defenderse contra la vigilancia masiva<\/strong>. As\u00ed mismo, los informes hacen hincapi\u00e9 en la necesidad de fomentar pol\u00edticas que proh\u00edban las pr\u00e1cticas que pretendan limitar el uso de o debilitar t\u00e9cnicamente la encriptaci\u00f3n.<\/p>\n<p>Hemos  resumido los contenidos de ambos documentos a continuaci\u00f3n (en ingl\u00e9s)  y  ponemos a disposici\u00f3n los documentos \u00edntegros enlazados, para que  puedan ser usados como herramienta y base para defender y exigir nuestro  derecho a la privacidad y a la encriptaci\u00f3n:<\/p>\n<div style=\"background:white; padding: 15px 5%\">\n<h3>European Parliament Science and Technology Options Assessment (STOA) on Mass Surveillance<\/h3>\n<p>Read the <a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2015\/527409\/EPRS_STU(2015)527409_REV1_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">full text<\/a><\/p>\n<p>The publication of the secret documents leaked by Edward Snowden disclosing controversial mass surveillance programmes by intelligence and national security agencies has evoked an international debate on the right of citizens to be protected from illegitimate or warrantless  collection and analysis of their data and meta-data.<\/p>\n<p>The agencies involved in mass surveillance practices justify these methods with the doctrine of pre-emptive prevention of crime and terrorism. While targeted lawful interception constitutes a necessary and legitimate instrument of intelligence and law enforcement agencies, mass surveillance is considered a threat to civil liberties such as the right to freedom of opinion and expression. These civil liberties are essential human rights in democratic societies and of particular importance for safeguarding independent journalism and political opposition.<\/p>\n<p>For an end user it is practically impossible to detect whether data and meta-data generated is being analysed or used by third parties and even less, if a system is subject to a complex attack orchestrated by powerful opponents like government agencies.<\/p>\n<p>To protect citizens&#8217; rights of privacy and freedom of expression in front of mass surveillance the issue must be addressed technical and politically. <\/p>\n<p style=\"text-indent: 20px;\"><strong>Technical options available to citizens for counteracting mass surveillance, first and above all, encryption<\/strong>, a statement that is shared and confirmed by the security community and Edward Snowden, who says that <em>\u201cProperly implemented strong crypto  systems are one of the few things that you can rely on.\u201d<\/em><\/p>\n<p>Yet, policy makers must understand that the problem of mass surveillance cannot be solved on a technical terrain, but needs to be addressed on a political level.<\/p>\n<p>Security agencies will always have a competitive advantage in winning a race for technological supremacy in Internet security due to the resources at their command.<\/p>\n<p>An adequate balance between civil liberties and legitimate national security interests has to be found, based on a public discussion that empowers citizens to decide upon their civil rights affected and the societal values at stake.<\/p>\n<p style=\"text-indent: 20px;\"><strong>To reduce the risk of privacy intrusion by mass surveillance encryption must be promoted and defended<\/strong>. Policy options that are considered of help in reducing the risk of privacy intrusion.<\/p>\n<p>&nbsp;<br \/>\na) Promote and invest in resilient open source implementations of different encryption specifications that can be verified and validated for correctness<\/p>\n<p>b) The promotion of open source operating systems and applications that allow for constant inspection and scrutiny by a large community of experts and verification and validation bodies<\/p>\n<p>c) Investing in and stimulating the integration of user friendly, utility-like encryption software solutions<\/p>\n<p>d) Regulate Telecom Operators to apply security mechanisms in form of adequate encryption over their entire networks, avoiding backhauls<\/p>\n<p>e) Invest in user awareness creation (\u201cknow the digital traces you are leaving\u201d) about who, under which conditions, where and when can access private data and what is being done with it<\/p>\n<p>f) Regulations that require applications to adopt maximum privacy settings as default\n<\/p><\/div>\n<p>&nbsp;<\/p>\n<div style=\"background:white; padding: 15px 5%\">\n<h3>United Nations report on the promotion and protection of the right to freedom of opinion and expression<\/h3>\n<p>Read the <a href=\"http:\/\/www.ohchr.org\/EN\/HRBodies\/HRC\/RegularSessions\/Session29\/Documents\/A.HRC.29.32_AEV.doc\" target=\"_blank\" rel=\"noopener noreferrer\">full text<\/a><\/p>\n<p>Contemporary digital technologies offer Governments, corporations and criminals unprecedented capacity to interfere with the rights to freedom of opinion and expression, and to perform online censorship, mass and targeted surveillance and data collection, digital attacks on civil society and repression force individuals around the world.<\/p>\n<p>Encryption and anonymity, today\u2019s leading vehicles for online security, provide individuals with a means to protect their privacy, empowering them to browse, read, develop and share opinions and information without interference and enabling journalists, civil society organizations, members of ethnic or religious groups, those persecuted because of their  sexual orientation or gender identity, activists, scholars, artists and others to exercise the rights to freedom of opinion and expression. Such security may be essential for the exercise of rights, including economic rights, privacy, due process, freedom of peaceful assembly and association, and the right to life and bodily integrity. <\/p>\n<p>Because of their importance, restrictions on encryption and anonymity must be strictly limited. The United Nations rapporteur on the promotion and protection of the right to freedom of opinion and expression therefore recommends the following:<\/p>\n<ul>\n<li>States should adopt policies of non-restriction or comprehensive protection of encryption and anonymity, only adopt restrictions on a case-specific basis and that meet the requirements of legality, necessity, proportionality and legitimacy in objective, require court   orders for any specific limitation.<\/li>\n<li>Discussions of encryption and anonymity have all too often focused only on their potential use for criminal purposes in times of terrorism. But emergency situations do not relieve States of the obligation to ensure respect for international human rights law. General debate should highlight the protection that encryption and anonymity provide, especially to the groups most at risk of unlawful interferences. <\/li>\n<li>States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online and promote security and privacy online through public education. Legislation and regulations protecting human rights defenders and journalists should also include provisions enabling access and providing support to use the technologies to secure their communications.<\/li>\n<li>States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards. In addition, States should refrain from making the identification of users a condition for access to digital communications and online services and requiring SIM card registration for mobile users. Corporate actors should likewise consider their own policies that restrict encryption and anonymity (including through the use of pseudonyms). <\/li>\n<li>Court-ordered decryption may only be permissible when it results from transparent and publicly accessible laws applied solely on a targeted, case-by-case basis to individuals (i.e., not to a mass of people).<\/li>\n<li>States, international organizations, corporations and civil society groups should promote online security and access to encryption and anonymity without discrimination.<\/li>\n<li>Companies, like States, should refrain from blocking or limiting the transmission of encrypted communications and permit anonymous communication.<\/li>\n<li>Corporate actors that supply technology to undermine encryption and anonymity should be especially transparent as to their products and customers.<\/li>\n<li>The use of encryption and anonymity tools and better digital literacy should be encouraged. Since the value of encryption and anonymity tools depends on their widespread adoption; states, civil society organizations and corporations are encouraged to engage in a campaign to bring encryption by design and default to users around the world and, where necessary, to ensure that users at risk be provided the tools to exercise their right to freedom of opinion and expression securely.<\/li>\n<\/ul>\n<\/div>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>.@X_net_ informa c\u00f3mo defender nuestro derecho fundamental a la #privacidad y la #encriptaci\u00f3n frente a su vigilancia masiva.<\/p>\n","protected":false},"author":8,"featured_media":8996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-8995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","ejes-libertad-expresion-informacion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n<\/title>\n<meta name=\"description\" content=\"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\"},\"author\":{\"name\":\"Xnet\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\"},\"headline\":\"Derecho a la Privacidad y a la Encriptaci\u00f3n\",\"datePublished\":\"2015-12-17T11:39:32+00:00\",\"dateModified\":\"2021-07-01T10:21:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\"},\"wordCount\":4567,\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"articleSection\":[\"Blog - Nuestras acciones\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\",\"url\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\",\"name\":\"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"datePublished\":\"2015-12-17T11:39:32+00:00\",\"dateModified\":\"2021-07-01T10:21:05+00:00\",\"description\":\"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.\",\"breadcrumb\":{\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage\",\"url\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Derecho a la Privacidad y la Encriptaci\u00f3n frente a la vigilancia masiva\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/xnet-x.net\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Derecho a la Privacidad y a la Encriptaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xnet-x.net\/es\/#website\",\"url\":\"https:\/\/xnet-x.net\/es\/\",\"name\":\"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]\",\"description\":\"Xnet: Internet, informaci\u00f3n y cultura libres. Tecnopol\u00edtica. Datos, algoritmos y derechos digitales. Libertad de expresi\u00f3n. Democracia y anticorrupci\u00f3n\",\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xnet-x.net\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\",\"name\":\"Xnet - Internet, derechos y democracia en la era digital\",\"url\":\"https:\/\/xnet-x.net\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Xnet - Internet, derechos y democracia en la era digital\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/RedX.Net\/\",\"https:\/\/x.com\/x_net_\",\"https:\/\/es.wikipedia.org\/wiki\/Xnet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637\",\"name\":\"Xnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g\",\"caption\":\"Xnet\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n","description":"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/","twitter_misc":{"Escrito por":"Xnet","Tiempo de lectura":"23 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#article","isPartOf":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/"},"author":{"name":"Xnet","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637"},"headline":"Derecho a la Privacidad y a la Encriptaci\u00f3n","datePublished":"2015-12-17T11:39:32+00:00","dateModified":"2021-07-01T10:21:05+00:00","mainEntityOfPage":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/"},"wordCount":4567,"publisher":{"@id":"https:\/\/xnet-x.net\/es\/#organization"},"image":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","articleSection":["Blog - Nuestras acciones"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/","url":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/","name":"Sobre el Derecho a la Privacidad y a la Encriptaci\u00f3n","isPartOf":{"@id":"https:\/\/xnet-x.net\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage"},"image":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","datePublished":"2015-12-17T11:39:32+00:00","dateModified":"2021-07-01T10:21:05+00:00","description":"Defensa de nuestro derecho a la privacidad y encriptaci\u00f3n fuerte como herramienta para protegernos de la vigilancia masiva.","breadcrumb":{"@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/"]]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#primaryimage","url":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","contentUrl":"https:\/\/xnet-x.net\/img\/privacy-surveillance-encryption.jpg","width":1200,"height":800,"caption":"Derecho a la Privacidad y la Encriptaci\u00f3n frente a la vigilancia masiva"},{"@type":"BreadcrumbList","@id":"https:\/\/xnet-x.net\/es\/derecho-privacidad-encriptacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/xnet-x.net\/es\/"},{"@type":"ListItem","position":2,"name":"Derecho a la Privacidad y a la Encriptaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/xnet-x.net\/es\/#website","url":"https:\/\/xnet-x.net\/es\/","name":"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]","description":"Xnet: Internet, informaci\u00f3n y cultura libres. Tecnopol\u00edtica. Datos, algoritmos y derechos digitales. Libertad de expresi\u00f3n. Democracia y anticorrupci\u00f3n","publisher":{"@id":"https:\/\/xnet-x.net\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xnet-x.net\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/xnet-x.net\/es\/#organization","name":"Xnet - Internet, derechos y democracia en la era digital","url":"https:\/\/xnet-x.net\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/logo\/image\/","url":"https:\/\/xnet-x.net\/img\/xnet-logo.png","contentUrl":"https:\/\/xnet-x.net\/img\/xnet-logo.png","width":512,"height":512,"caption":"Xnet - Internet, derechos y democracia en la era digital"},"image":{"@id":"https:\/\/xnet-x.net\/es\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/RedX.Net\/","https:\/\/x.com\/x_net_","https:\/\/es.wikipedia.org\/wiki\/Xnet"]},{"@type":"Person","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/286e07d1c80ea3bcc60b6ef8b146e637","name":"Xnet","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76eee622ce1df16aa986c0f990545e62b4c87e399e6c2a5fcfe24a092d2ba829?s=96&d=mm&r=g","caption":"Xnet"}}]}},"_links":{"self":[{"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/posts\/8995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/comments?post=8995"}],"version-history":[{"count":17,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/posts\/8995\/revisions"}],"predecessor-version":[{"id":19306,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/posts\/8995\/revisions\/19306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/media\/8996"}],"wp:attachment":[{"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/media?parent=8995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/categories?post=8995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xnet-x.net\/es\/wp-json\/wp\/v2\/tags?post=8995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}