{"id":188770,"date":"2018-08-08T09:30:28","date_gmt":"2018-08-08T09:30:28","guid":{"rendered":"https:\/\/www.internetsociety.org\/encryption-resources\/"},"modified":"2025-09-24T10:40:52","modified_gmt":"2025-09-24T10:40:52","slug":"encryption-resources","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/issues\/encryption\/resources\/","title":{"rendered":"Recursos sobre el cifrado"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-bdbb497f uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-18532b2d\"><div class=\"uagb-column__overlay\"><\/div>\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading headline6 has-neutral-white-color has-text-color\"><a href=\"https:\/\/www.internetsociety.org\/es\/issues\/cifrado\/\">Cifrado<\/a> > Recursos<\/h6>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\"><strong>Recursos sobre cifrado<\/strong><\/h1>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>El cifrado es una caracter\u00edstica fundamental de una Internet segura y confiable. Mantiene la seguridad de la informaci\u00f3n personal y es esencial para la seguridad nacional, ya que protege a la sociedad de terroristas, delincuentes y gobiernos hostiles.&nbsp;<\/p>\n\n\n\n<p>Pero el cifrado est\u00e1 bajo amenaza. Algunas personas buscan introducir fallas en los sistemas de cifrado, lo que hace que el cifrado sea menos seguro para todos. Conozca c\u00f3mo promovemos y defendemos el cifrado en todo el mundo y descubra c\u00f3mo puede sumarse a su defensa en nuestra secci\u00f3n de recursos.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-neutral-putty-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<p class=\"has-depth-blue-color has-text-color has-26-font-size\">Internet Society forma parte de la Global Encryption Coalition.<br><a href=\"https:\/\/www.globalencryption.org\/\">Descubra c\u00f3mo puede participar<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"277\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01.png\" alt=\"Global Encryption Coalition logo\" class=\"wp-image-114433\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01.png 757w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01-450x165.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01-250x91.png 250w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Factsheets<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n    <section class=\"component component-table\">\n        <div class=\"content-wrapper\">\n            <ul class=\"table\"><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/como-comprender-el-cifrado-las-conexiones-con-la-seguridad-del-sobreviviente\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">C\u00f3mo comprender el cifrado: Las conexiones con la seguridad del sobreviviente<\/a><p class=\"small-text\">Estos son algunos ejemplos de c\u00f3mo el cifrado E2E y el cifrado de conocimiento cero pueden ayudar a mitigar...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/la-informatica-cuantica-pone-en-riesgo-nuestra-seguridad-digital\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Hoja informativa: F\u00edsica e inform\u00e1tica cu\u00e1nticas<\/a><p class=\"small-text\">Una computadora cu\u00e1ntica puede calcular m\u00faltiples valores al mismo tiempo, mientras que una computadora cl\u00e1sica no. Esto podr\u00eda socavar...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/fact-sheet-intermediaries-and-encryption\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Hoja informativa: Intermediarios y cifrado<\/a><p class=\"small-text\">Presionar a los intermediarios para que debiliten la seguridad no es la respuesta para evitar el contenido da\u00f1ino en...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/hoja-informativa-hackeo-gubernamental\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Hoja Informativa: Hackeo inform\u00e1tico gubernamental<\/a><p class=\"small-text\">El hackeo gubernamental es uno de los enfoques que utilizan las agencias de seguridad nacional y de aplicaci\u00f3n de...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/hoja-informativa-trabajar-desde-casa\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Trabajar desde casa<\/a><p class=\"small-text\">Publicado originalmente: 15 de abril de 2020Actualizado: 28 de septiembre de 2022 No importa en qu\u00e9 parte del mundo...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/fact-sheet-machine-in-the-middle-attacks\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Hoja informativa: Ataques de m\u00e1quina en medio<\/a><p class=\"small-text\">Publicado originalmente: 24 de marzo de 2020Actualizado: 28 de septiembre de 2022 Cuando usamos Internet, esperamos que nuestras comunicaciones...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/propuestas-fantasma\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Propuestas fantasma<\/a><p class=\"small-text\">\u00bfQu\u00e9 son las propuestas \u00abfantasma\u00bb y por qu\u00e9 deber\u00eda importarnos? Al menos un gobierno ha propuesto recientemente que para...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/hoja-informativa-escaneo-del-lado-del-cliente\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Hoja informativa: Escaneo del lado del cliente<\/a><p class=\"small-text\">Publicado originalmente: 24 de marzo de 2020Actualizado: 29 de septiembre de 2022 El cifrado es una tecnolog\u00eda dise\u00f1ada para...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2019\/encryption-factsheet-essential-for-lgbtq-community\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Cifrado: imprescindible para la comunidad LGTBI<\/a><p class=\"small-text\">Para algunas comunidades, como la LGTBI, el cifrado es particularmente indispensable para garantizar la seguridad de las personas tanto...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/policybriefs\/encryption\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Informe de la pol\u00edtica p\u00fablica: Cifrado<\/a><p class=\"small-text\">Las tecnolog\u00edas de cifrado permiten que los usuarios de Internet protejan la confidencialidad de sus datos y comunicaciones contra...<\/p>\n                <\/li>\n            <\/ul>\n        <\/div>\n    <\/section>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">Reports<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n    <section class=\"component component-table\">\n        <div class=\"content-wrapper\">\n            <ul class=\"table\"><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2021\/el-impacto-economico-de-las-leyes-que-debilitan-el-cifrado\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">El impacto econ\u00f3mico de las leyes que debilitan el cifrado<\/a><p class=\"small-text\">En 2018, el parlamento australiano aprob\u00f3 la Ley de Enmienda de Telecomunicaciones y Otras Legislaciones (Asistencia y Acceso) (TOLA)...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2020\/trazabilidad-y-ciberseguridad-ciclo-de-talleres-para-expertos-sobre-el-cifrado-en-la-india\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Trazabilidad y ciberseguridad<\/a><p class=\"small-text\">La trazabilidad, o la capacidad de rastrear al originador de un determinado contenido o mensaje, se sit\u00faa en el...<\/p>\n                <\/li>\n            <\/ul>\n        <\/div>\n    <\/section>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">Webcasts and Events<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-26-font-size\">Archive of past encryption-related events.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a7900ee2     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"1\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/events\/global-encryption-day\/2022\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">D\u00eda Mundial del Cifrado 2022<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<b>El cifrado fuerte nos mantiene seguros en l\u00ednea e incluso fuera de l\u00ednea.<\/b>\n<br>\n Este D\u00eda Mundial del Cifrado, personas de todo el mundo se unieron&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/events\/global-encryption-day\/2021\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">D\u00eda Mundial del Cifrado 2021<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<b>El cifrado fuerte mantiene seguras en l\u00ednea a las personas y las naciones.<\/b>\n<br>Vuelva a poner la seguridad y la privacidad en sus propias manos y&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/events\/chatham-house-roundtable-encryption-lawful-access\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Chatham House Roundtable: El cifrado y el acceso legal<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>El cifrado es una base t\u00e9cnica importante para la confianza en la econom\u00eda digital. Es crucial para asegurar la infraestructura, las comunicaciones y la informaci\u00f3n&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Open Letters, Statements and Submissions<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Open letters, statements and submissions that the Internet Society has authored or contributed to.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-2b073b25 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/03\/ISOC-EU-DMA-interoperability-encrypted-messaging-20220311.pdf\">Comments to EU on Digital Markets Act (DMA) and Interoperability of Encrypted Messaging<\/a>, 11 March 2022<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-db1c9ad4 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/ged.globalencryption.org\/statement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Global Encryption Day Statement<\/a>, 21 October 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-17f4b8ee uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><br><a href=\"https:\/\/www.globalencryption.org\/wp-content\/uploads\/2021\/06\/IWN-UK-open-letter-20210607-Final.pdf\">Open Letter to&nbsp;Members of&nbsp;UK&nbsp;Parliament:&nbsp;End-to-End&nbsp;Encryption&nbsp;Keeps&nbsp;Us&nbsp;Safe<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 15 June 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-cbd97872 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2021\/mauritius-igf-and-internet-society-response-to-mauritius-icta-consultation-paper\/\">Mauritius IGF and Internet Society Response to Mauritius ICTA Consultation Paper<\/a>, 21 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4dfb1cfa uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/news\/statements\/2021\/internet-society-uk-online-public-safety-bill-is-trying-to-legislate-the-impossible-a-safe-internet-without-strong-encryption\/\">UK Online Public Safety Bill is trying to legislate the impossible \u2013 a safe Internet without strong encryption<\/a>, 12 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-267ebb6a uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/ec.europa.eu\/info\/law\/better-regulation\/have-your-say\/initiatives\/12974-Media-Commission-recommendation-on-ensuring-safety-of-journalists-in-the-European-Union\/F2324536_en\">EU&nbsp;Commission&nbsp;Recommendation on&nbsp;Ensuring&nbsp;Safety of&nbsp;Journalists in the European Union<\/a>, 12 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-715e478d uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.globalencryption.org\/2020\/10\/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors\/\">CDT, GPD and Internet Society Reject Time-Worn Argument for Encryption Backdoors<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 30 October 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-0da39e4e uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/edri.org\/wp-content\/uploads\/2020\/10\/20201020-EDRi-Open-letter-CSAM-and-encryption-FINAL.pdf\">EDRi &#8211;&nbsp;Civil&nbsp;Society&nbsp;Views on&nbsp;Defending&nbsp;Privacy&nbsp;While&nbsp;Preventing&nbsp;Criminal&nbsp;Acts<\/a>, 20 October 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-51e8c543 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.globalencryption.org\/2020\/10\/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors\/\">Open Letter Against Lawful Access to Encrypted Data Act<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 7 July 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-dce30945 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/newamericadotorg.s3.amazonaws.com\/documents\/Coalition_letter_opposing_EARN_IT_3-6-20.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Open Letter Opposing EARN IT bill<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 6 March 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8cc91ba0 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/open-letters\/india-intermediary-guidelines\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concerns with Amendments to India\u2019s Information Technology (Intermediaries Guidelines) Rules under the Information Technology Act<\/a>, 9 January 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-b4ffedb0 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB.png\" alt=\"\" width=\"30\" height=\"29\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/cdt.org\/insights\/open-letter-facebooks-end-to-end-encryption-plans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Open Letter: Facebook\u2019s End-to-End Encryption Plans<\/a>, 4 October 2019<\/p><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-043b9216 uagb-faq-icon-row-reverse uagb-faq-layout-accordion uagb-faq-expand-first-false uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height     \" data-faqtoggle=\"true\" role=\"tablist\"><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-996d99de \" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<h3 class=\"uagb-question\">Read more <\/h3><\/div><div class=\"uagb-faq-content\"><p><a href=\"https:\/\/www.alai.lat\/por-el-derecho-a-la-privacidad\/\">LAC Technical Community Letter on Encryption<\/a>, 24 October 2019<br><br><a href=\"https:\/\/www.g7openletter.org\/\">A Joint Call to\u00a0G7\u00a0World Leaders for a Secure and Trusted Digital Economy,<\/a> 23 August 2019<a href=\"https:\/\/www.g7openletter.org\/\"><br><\/a><br><a href=\"https:\/\/www.internetsociety.org\/news\/statements\/2019\/internet-society-concerns-kazakhstan-encryption\">Statement on\u00a0Government Action in Kazakhstan Regarding Encrypted Internet Traffic<\/a>, 23 July 2019<br><br><a href=\"https:\/\/g20openletter.org\/\">Joint Call to G20 World Leaders for a Healthy Digital Society<\/a>, 30 November 2018<br><br><a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/07\/encryption-is-critical-for-the-australian-economy\/\">Call for Australian Government to Abandon Plans to Introduce Legislation That Undermines Strong Encryption<\/a>, 17 July 2018<br><br><a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2018\/internet-society-chatham-house-roundtable-on-encryption-and-lawful-access\/\">Internet Society-Chatham House Roundtable on Encryption and Lawful Access<\/a>, 19 April 2018<br><br><a href=\"https:\/\/securetheinternet.org\/\">Secure the Internet: An Open Letter to the Leaders of the World&#8217;s Governments<\/a>, 15 February 2016<br><br><a href=\"https:\/\/www.ohchr.org\/Documents\/Issues\/Opinion\/Communications\/InternetSociety.pdf\">Internet Society submission to the UN Special Rapporteur on the Protection and Promotion of the Right to Freedom of\u00a0Expression\u00a0and Opinion regarding the use of encryption and anonymity in digital communications<\/a>, 10 February 2015<\/p><\/div><\/div><\/div>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">In the Press<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Articles written by Internet Society staff.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/news.trust.org\/item\/20211117102104-mp3t4\/\">From LGBT+ People to Journalists, Strong Encryption is Crucial for Making the Internet Safer for Everyone<\/a> &#8211; Thomson Reuters Foundation News, 17 November, 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.computerweekly.com\/opinion\/Encryption-protects-the-marginalised-and-its-under-threat\" target=\"_blank\" rel=\"noreferrer noopener\">Encryption Protects the Marginalised \u2013 and It\u2019s Under Threat<\/a> &#8211; <em>Computer Weekly<\/em>, 14 October, 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/10\/ed_FEATURE_SAY-SOMETHING_Sidebar.pdf\">If You See Something, Say Something<\/a> &#8211; <a href=\"http:\/\/www.maskmatters.org\">maskmatters.org<\/a>, September 2021 (originally published in subscription-only publication)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.euractiv.com\/section\/data-protection\/opinion\/i-confess-ive-got-things-to-hide\/\">I Confess I\u2019ve Got Things to Hide<\/a> &#8211; <em>EurActiv<\/em>, 19 August 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/beta.darkreading.com\/endpoint\/the-role-of-encryption-in-protecting-lgbtq-community-members\">The Role of Encryption in Protecting LGBTQ+ Community Members<\/a> &#8211; <em>Dark Reading<\/em>, 28 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.politicshome.com\/members\/article\/draft-online-safety-bill-undermines-duty-of-care-to-constituents\">The Online Safety Bill Puts the Security of All Citizens and Communities at Risk<\/a> &#8211; <em>The House<\/em>, 15 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.dqindia.com\/whatsapp-complying-traceability-provision-will-create-technical-vulnerabilities-can-exploited-internet-society\/\" rel=\"noreferrer noopener\" target=\"_blank\">WhatsApp Complying with Traceability Will Create Technical Vulnerabilities that Can be Exploited<\/a> &#8211; <em>DataQuest India<\/em>, 3 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ciol.com\/new-it-rules-undermine-end-to-end-encryption-neeti-biyani-internet-society\/\">The New IT Rules would undermine end-to-end encryption<\/a> &#8211; CIOL, 2 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/apolitical.co\/en\/solution_article\/what-public-servants-need-to-know-about-securing-their-communications\">What&nbsp;Public&nbsp;Servants&nbsp;Need to&nbsp;Know&nbsp;About&nbsp;Securing their&nbsp;Communications<\/a> &#8211; <em>Apolitical<\/em>, 6 May 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.wired.com\/story\/the-false-promise-of-lawful-access-to-private-data\/\">The False Promise of Lawful Access to Private Data<\/a> &#8211; <em>Wired<\/em>, 16 May 2019<\/li>\n\n\n\n<li><a href=\"https:\/\/www.lemonde.fr\/idees\/article\/2019\/05\/16\/laisser-les-etats-decrypter-et-filtrer-internet-peut-creer-un-prejudice-pour-les-citoyens-et-l-economie_5462763_3232.html\">Laisser les Etats d\u00e9crypter et filtrer Internet peut cr\u00e9er un pr\u00e9judice pour les citoyens et l\u2019\u00e9conomie<\/a> (<em>Allowing States to Decipher and Filter the Internet Can Harm Citizens and the Economy<\/em>) &#8211; <em>Le Monde<\/em>, 16 May 2019<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Blog Posts<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Our latest blog posts on encryption.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-c87405b6     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"8\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">\u00bfQu\u00e9 es una puerta trasera de cifrado?<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t2 de mayo de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t17 de abril de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/05\/el-cifrado-protege-a-los-menores-en-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">El cifrado protege a los menores en Internet<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t3 de mayo de 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/11\/dos-cosas-que-ee-uu-debe-hacer-para-proteger-internet-y-la-seguridad-de-miles-de-millones-de-personas-en-la-red\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Dos cosas que EE.UU. debe hacer para proteger Internet y la seguridad de miles de millones de personas en la red<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-11-22T21:48:45+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t22 de noviembre de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/02\/una-internet-mas-segura-comienza-con-mas-encriptado\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Una Internet m\u00e1s segura comienza con m\u00e1s cifrado<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-02-08T15:20:52+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t8 de febrero de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/01\/la-ley-sobre-seguridad-en-internet-del-reino-unido-debilitara-el-cifrado-y-pondra-en-riesgo-a-los-usuarios-de-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">La ley sobre seguridad en Internet del Reino Unido debilitar\u00e1 el cifrado y pondr\u00e1 en riesgo a los usuarios de Internet<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-01-19T21:38:48+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t19 de enero de 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/6\/\">6<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/7\/\">7<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/8\/\">8<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Technical Community Resources<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Technical community initiatives that the Internet Society has contributed to or supported.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.internetsociety.org\/blog\/2015\/10\/internet-society-supports-the-lets-encrypt-initiative-to-increase-end-to-end-encryption\/\">Let&#8217;s Encrypt<\/a>:&nbsp;The Internet Society supports the&nbsp;Let\u2019s Encrypt Initiative, which provides free certificates to websites for Transport Layer Security (TLS) and automates the process, making it easier and cheaper for websites to use TLS.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.iab.org\/documents\/correspondence-reports-documents\/2019-2\/avoiding-unintended-harm-to-internet-infrastructure\/\">IAB Statement: Avoiding Unintended Harm to Internet Infrastructure<\/a>, 4 September 2019<\/li>\n\n\n\n<li><a href=\"https:\/\/www.w3.org\/2001\/tag\/doc\/web-https\">W3C: Securing the Web<\/a>, 22 January 2015<\/li>\n\n\n\n<li><a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/97690\/MIT-CSAIL-TR-2015-026.pdf?sequence=8\">Computer Science and Artificial Intelligence Laboratory&nbsp;Technical Report: Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications<\/a>, 6 July 2015<\/li>\n\n\n\n<li><a href=\"https:\/\/tools.ietf.org\/html\/rfc7258\">IETF 2528:&nbsp; Pervasive Monitoring Is an Attack<\/a>, May 2014<\/li>\n\n\n\n<li><a href=\"https:\/\/www.iab.org\/2014\/11\/14\/iab-statement-on-internet-confidentiality\/\">IAB Statement on Internet Confidentiality<\/a>, 14 November 2014<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Community Highlights<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Activities and initiatives on encryption from our chapters, special interest groups (SIGs) and members around the world.<\/h3>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-5291f06f uagb-columns__columns-4 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-4\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-0c1f500c background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.globalencryption.org\/2021\/06\/brazilian-code-of-criminal-procedure-reform-must-not-undermine-encryption\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Brazilian Code of Criminal Procedure reform must not undermine encryption<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">28 June 2021<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Four Internet Society chapters sign Global Encryption Coalition open letter urging&nbsp;Brazilian Code of Criminal Procedure reform not to undermine encryption<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-a0896f33 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.isoc.org.br\/noticia\/factsheet-criptografia-essencial-para-a-comunidade-lgbtqia\"><span style=\"color:#eff2ec\" class=\"tadv-color\">The Internet Society Brazil Chapter created a fact sheet explaining why encryption is essential for the LGBTQIA+ community<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">16 June 2021<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-153e3834 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-28-font-size\"><a href=\"https:\/\/isoc.pt\/open-letter\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Open Letter to the Portuguese Presidency of the European Union on the Freedom of Use of Encryption<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">14 April 2021<\/p>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Signed by 12 European chapters of the Internet Society<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-ceec6eb8 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/04\/no-perforeis-nuestro-escudo-de-seguridad-digital\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Don\u2019t Poke Holes in Our Digital Security Shield<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">13 April 2021<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Lennart Schulze urged people to tell the EU that their narrative that &#8216;encryption harms kids&#8217; isn&#8217;t correct. Encryption is foundational to security &#8211; and is key to keeping children and youth safe online.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Encryption in the News<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Media coverage on encryption.<\/h3>\n\n\n\n    <section class=\"component-theme- component-row row-text-black\">\n    \t<div class=\"component-row-inner pure-g component-alignment-top component-row-standard\">\n            <div class=\"column pure-u-lg-1-1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default\">\n                <section class=\"component component-feed \" data-component-name=\"Feed\">\n                    <div class=\"content-wrapper align-center\">\n                        <div class=\"feed masonryFeed loadable\" data-author=\"\" data-cat-exclude=\"\" data-tag=\"\" data-order=\"DESC\" data-orderby=\"date\" data-meta=\"\" data-post-count=\"3\" data-taxonomy=\"news_type\" data-region=\"1925\" data-post-parent=\"\" data-event-time=\"past\"data-category=\"40\" data-post-type=\"news\">\n                            <div class=\"grid-sizer\"><\/div>\n                            <div class=\"gutter-sizer\"><\/div><div class=\"feed-item load-item\" data-max-pages=\"3\" data-post-id=\"176304\"><a class=\"feed-link\" href=\"https:\/\/espanol.news\/los-peligros-de-la-guerra-ilogica-del-reino-unido-contra-el-cifrado\/\" target=\"_blank\">Espanol News<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/03\/Espanol-News-logo.jpg\" alt=\"Espanol News\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">Seguridad<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">8 agosto 2022<\/span>\n                                        <h3 class=\"headline5\">Los peligros de la guerra il\u00f3gica del Reino Unido contra el cifrado<\/h3><span class=\"eyebrow eyebrow-regular\">Espanol News<\/span><\/div>\n                                <\/div><div class=\"feed-item load-item\" data-max-pages=\"3\" data-post-id=\"163131\"><a class=\"feed-link\" href=\"https:\/\/www.eleconomista.es\/tecnologia\/noticias\/11570727\/01\/22\/El-plan-de-Boris-Johnson-para-romper-la-privacidad-de-WhatsApp-empieza-con-una-campana-publicitaria.html\" target=\"_blank\">elEconomista<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/01\/elEconomista-logo-250x50.png\" alt=\"elEconomista\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">Seguridad<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">18 enero 2022<\/span>\n                                        <h3 class=\"headline5\">El plan de Boris Johnson para romper la privacidad de WhatsApp empieza con una campa\u00f1a publicitaria<\/h3><span class=\"eyebrow eyebrow-regular\">elEconomista<\/span><\/div>\n                                <\/div><div class=\"feed-item load-item\" data-max-pages=\"3\" data-post-id=\"131862\"><a class=\"feed-link\" href=\"https:\/\/www.eluniversal.com.mx\/techbit\/por-que-dejar-whatsapp-no-garantiza-tu-privacidad-unam\" target=\"_blank\">El Universal<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/newspaper-el-universal-logo-250x75.jpg\" alt=\"El Universal\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">Seguridad<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">22 enero 2021<\/span>\n                                        <h3 class=\"headline5\">Por qu\u00e9 dejar WhatsApp no garantiza tu privacidad: UNAM<\/h3><span class=\"eyebrow eyebrow-regular\">El Universal<\/span><\/div>\n                                <\/div><\/div>\n                                <div class=\"align-center\"><span class=\"button component loadMore\" data-component-name=\"LoadMore\" id=\"loadMore\">Mostrar m\u00e1s<\/span><\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n    \t\t\t<\/div>\n    \t\t<\/section><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cifrado > Recursos Recursos sobre cifrado El cifrado es una caracter\u00edstica fundamental de una Internet segura y confiable. Mantiene la seguridad de la informaci\u00f3n personal y es esencial para la seguridad nacional, ya que protege a la sociedad de terroristas, delincuentes y gobiernos hostiles.&nbsp; Pero el cifrado est\u00e1 bajo amenaza. Algunas personas buscan introducir fallas [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":142916,"parent":171447,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4319],"tags":[],"region_news_regions":[6030],"content_category":[6106],"ppma_author":[4057],"class_list":["post-188770","page","type-page","status-publish","has-post-thumbnail","hentry","category-cifrado","region_news_regions-global","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-450x277.jpg",450,277,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-768x473.jpg",768,473,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-1024x631.jpg",1024,631,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-250x154.jpg",250,154,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",300,185,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",400,247,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",600,370,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/es\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Cifrado > Recursos Recursos sobre cifrado El cifrado es una caracter\u00edstica fundamental de una Internet segura y confiable. Mantiene la seguridad de la informaci\u00f3n personal y es esencial para la seguridad nacional, ya que protege a la sociedad de terroristas, delincuentes y gobiernos hostiles.&nbsp; Pero el cifrado est\u00e1 bajo amenaza. Algunas personas buscan introducir fallas&hellip;","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=188770"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/188770\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/171447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/142916"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=188770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=188770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=188770"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=188770"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=188770"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=188770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}