{"id":171447,"date":"2022-06-03T14:21:27","date_gmt":"2022-06-03T14:21:27","guid":{"rendered":"https:\/\/www.internetsociety.org\/ampliacion-del-cifrado\/"},"modified":"2025-09-24T10:41:18","modified_gmt":"2025-09-24T10:41:18","slug":"ampliacion-del-cifrado","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/action-plan\/encryption\/","title":{"rendered":"Ampliaci\u00f3n del cifrado"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Extendiendo <br>el cifrado<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-32-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\">El cifrado empodera a las personas y las mantiene seguras. Necesitamos cifrado para todas las personas, en todas partes.<\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">El cifrado es una herramienta fundamental para protegernos en una sociedad digital. Sin embargo, los gobiernos intentan cada vez m\u00e1s socavar esta valiosa herramienta, lo que nos pone a todos en peligro.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Todos los d\u00edas confiamos en el cifrado desde que nos levantamos hasta que nos acostamos. Protege la seguridad personal de miles de millones de personas en todo el mundo y la seguridad nacional de los pa\u00edses. As\u00ed se trate de nuestros mensajes privados, la banca online, el control del tr\u00e1fico a\u00e9reo, los datos m\u00e9dicos o el voto electr\u00f3nico, nuestra informaci\u00f3n en la red debe estar protegida contra las escuchas y las manipulaciones.<\/p>\n\n\n\n<p class=\"has-18-font-size\">We\u2019re working across the globe to protect encryption by helping policymakers understand proposals that could jeopardize our security online.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5.5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:89%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top is-image-fill-element\" style=\"grid-template-columns:auto 33%\"><div class=\"wp-block-media-text__content\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop uag-hide-tab\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d21b5f49 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">C\u00f3mo funciona el cifrado<\/h3><\/div><p class=\"uagb-ifb-desc\">El cifrado es el proceso de desordenar o cifrar informaci\u00f3n para que solo pueda ser entendida por alguien que tenga los medios para devolverla a su estado original. Protege la confidencialidad de los datos almacenados o transmitidos haci\u00e9ndolos ininteligibles: un tercero a\u00fan podr\u00eda obtener acceso a los datos, pero no ser\u00eda capaz de encontrarles sentido. Algunas formas de cifrado, como la navegaci\u00f3n web segura, s\u00f3lo protegen los datos mientras se transmiten: en el sitio web y en su navegador, la informaci\u00f3n no est\u00e1 cifrada. Otras formas de cifrado, como la mensajer\u00eda segura, contin\u00faan protegiendo los datos hasta que el destinatario abre el mensaje, incluso d\u00edas o semanas despu\u00e9s de que llega. <br><br>Cuando los mensajes est\u00e1n encriptados, a\u00fan cuando los manejan intermediarios (como un servidor de mensajer\u00eda), solo pueden leerlos el remitente y el receptor, nos referimos a eso como cifrado de \u00abextremo a extremo\u00bb. El cifrado de extremo a extremo protege los datos independientemente de los protocolos utilizados para transmitirlos, mientras que la navegaci\u00f3n web se basa en protocolos de comunicaciones seguras para su cifrado. <\/p><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-vertical is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-41619b2b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-green-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.internetsociety.org\/issues\/encryption\/what-is\/\"><strong>Descubre m\u00e1s sobre su funcionamiento<\/strong><\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"476\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium.jpg\" alt=\"Una mujer se sienta con dos ni\u00f1os mirando una tableta.\" class=\"wp-image-214341 size-large\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium.jpg 900w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-450x238.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-768x406.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-250x132.jpg 250w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Abordar la falta de confianza en Internet<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Para mantener la seguridad de Internet, trabajamos en lo siguiente:<\/p>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>Educar a los responsables pol\u00edticos sobre la importancia de proteger y promover el uso de un cifrado fuerte<\/li>\n\n\n\n<li>Trabajar con los defensores de todo el mundo para promover un cifrado fuerte<\/li>\n\n\n\n<li>Colaborando con nuestros socios para mitigar las amenazas al cifrado en todo el mundo.<\/li>\n\n\n\n<li>Continuar con el crecimiento de la Coalici\u00f3n Mundial de Cifrado para fortalecer los esfuerzos de los defensores de todo el mundo para promover y proteger un Internet m\u00e1s seguro y fiable<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Participe <\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-4 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-4\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/padlocks.jpeg\" alt=\"un mont\u00f3n de candados atados a una pared\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6e38d95b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/learning\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Haz nuestro curso gratuito de defensa del cifrado<\/h5><\/div><p class=\"uagb-ifb-desc\">Aprende qu\u00e9 es el cifrado, por qu\u00e9 es importante para todos y c\u00f3mo puedes protegerlo en este curso de aprendizaje online gratuito.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/GEC_background.jpg\" alt=\"cuadrados en diferentes colores\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-9c79d4e5 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/about\/members\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">S\u00famate a la Coalici\u00f3n Mundial de Cifrado<\/h5><\/div><p class=\"uagb-ifb-desc\">\u00danete a la potente red de defensa de organizaciones, empresas y expertos en ciberseguridad.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Encryption_video.png\" alt=\"ilustraci\u00f3n de cuatro personas en una videollamada\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-e9550508 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/about\/friends\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Hazte amigo de la Coalici\u00f3n Mundial de Cifrado<\/h5><\/div><p class=\"uagb-ifb-desc\">Suscr\u00edbete para recibir alertas de noticias y herramientas que te ayuden a defender el cifrado.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a0aa6064\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/ged-words.jpg\" alt=\"D\u00eda Mundial del Cifrado\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-5088b11f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_blank\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Participa en el D\u00eda Mundial del Cifrado de 2024<\/h5><\/div><p class=\"uagb-ifb-desc\">\u00a1M\u00e1s detalles pr\u00f3ximamente, no te los pierdas!<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">\u00daltimas noticias<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a8fd20a7     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"8\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/bernardi\/\" title=\"Entradas de Paula Bernardi\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Paula Bernardi<\/a>, <a href=\"https:\/\/www.internetsociety.org\/es\/author\/richardson\/\" title=\"Entradas de Celia Richardson\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Celia Richardson<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t2 de mayo de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">\u00bfQu\u00e9 es una puerta trasera de cifrado?<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/hall\/\" title=\"Entradas de Joseph Lorenzo Hall\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Joseph Lorenzo Hall<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t17 de abril de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/schonfeld\/\" title=\"Entradas de Sebasti\u00e1n Schonfeld\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Sebasti\u00e1n Schonfeld<\/a>, <a href=\"https:\/\/www.internetsociety.org\/es\/author\/ncampbell\/\" title=\"Entradas de Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t3 de mayo de 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/05\/el-cifrado-protege-a-los-menores-en-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">El cifrado protege a los menores en Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/jmorris\/\" title=\"Entradas de John Morris\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">John Morris<\/a>, <a href=\"https:\/\/www.internetsociety.org\/es\/author\/ncampbell\/\" title=\"Entradas de Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-11-22T21:48:45+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t22 de noviembre de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/11\/dos-cosas-que-ee-uu-debe-hacer-para-proteger-internet-y-la-seguridad-de-miles-de-millones-de-personas-en-la-red\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Dos cosas que EE.UU. debe hacer para proteger Internet y la seguridad de miles de millones de personas en la red<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/ncampbell\/\" title=\"Entradas de Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-02-08T15:20:52+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t8 de febrero de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/02\/una-internet-mas-segura-comienza-con-mas-encriptado\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Una Internet m\u00e1s segura comienza con m\u00e1s cifrado<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/voge\/\" title=\"Entradas de Callum Voge\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Callum Voge<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-01-19T21:38:48+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t19 de enero de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/01\/la-ley-sobre-seguridad-en-internet-del-reino-unido-debilitara-el-cifrado-y-pondra-en-riesgo-a-los-usuarios-de-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">La ley sobre seguridad en Internet del Reino Unido debilitar\u00e1 el cifrado y pondr\u00e1 en riesgo a los usuarios de Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/6\/\">6<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/7\/\">7<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/8\/\">8<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Recursos<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-950df4b8     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"6\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2024-09-24T13:00:25+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t24 de septiembre de 2024\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2024\/estudio-de-caso-la-ley-de-noticias-en-linea-de-canada-perjudica-al-periodismo-a-la-competencia-y-a-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2023-12-13T15:05:02+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t13 de diciembre de 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2023\/escaneo-del-lado-del-cliente\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Escaneo del lado del cliente<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2021-10-12T16:45:40+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t12 de \r\noctubre de 2021\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2021\/cifrado-como-puede-proteger-a-los-grupos-de-defensa-y-a-los-movimientos-de-cambio-social\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Cifrado: C\u00f3mo puede proteger a los grupos de defensa y a los movimientos de cambio social<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/6\/\">6<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-link-color has-12-font-size wp-elements-f11b83d8ce1bb76286c1f5876efc3262\">Cr\u00e9dito de la imagen:<br>\u00a9 <a href=\"https:\/\/unsplash.com\/photos\/a-close-up-of-a-padlock-on-a-door-KrPulSdUetk\">Unsplash<\/a>, \u00a9 <a href=\"https:\/\/www.pexels.com\/photo\/anonymous-asian-woman-with-grandchildren-watching-video-on-tablet-5693013\/\">Pexels<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El cifrado es necesario para un mundo seguro y funcional.<\/p>\n","protected":false},"author":46,"featured_media":214344,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4319,119,4910],"tags":[6158,5940],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-171447","page","type-page","status-publish","has-post-thumbnail","hentry","category-cifrado","category-quienes-somos","category-fortalecimiento-de-internet","tag-actionplan","tag-plan-de-accion"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-450x229.jpg",450,229,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-768x391.jpg",768,391,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-250x127.jpg",250,127,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-600x489.jpg",600,489,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",300,153,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",400,204,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",600,306,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/es\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"El cifrado es necesario para un mundo seguro y funcional.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=171447"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/214344"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=171447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=171447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=171447"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=171447"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=171447"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=171447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}