{"id":244858,"date":"2017-08-29T22:26:46","date_gmt":"2017-08-29T22:26:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244858"},"modified":"2026-02-04T16:55:58","modified_gmt":"2026-02-04T16:55:58","slug":"deploy360","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/deploy360\/","title":{"rendered":"Tecnolog\u00edas de Internet"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-70afd3e2 uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop uag-hide-tab\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-1c88c709 animated fadeIn slow\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading\">Tecnolog\u00edas de Internet<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full uag-hide-desktop\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"660\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling.jpg\" alt=\"Una alumna posa para una selfie en el pasillo de la escuela.\" class=\"wp-image-197982\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling.jpg 1440w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-250x115.jpg 250w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Tecnolog\u00edas <br>de Internet<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-text-align-left has-green-color has-text-color has-link-color has-32-font-size wp-elements-60f22ac1fca851bb43fb1ddce2cedd38\"><strong>Las tecnolog\u00edas de Internet son fundamentales para que Internet siga creciendo, evolucionando y respondiendo a las expectativas cambiantes de los usuarios. Las tecnolog\u00edas habilitantes ayudan a mejorar la escalabilidad, la seguridad, la confianza y la disponibilidad de Internet.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size\" id=\"connectivity\">Tecnolog\u00edas que impulsan el crecimiento de Internet<\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-43f08d82 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f6a79489\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242380\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">IPv6<\/h3><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/deploy360\/ipv6\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/ipv6\/\">IPv6<\/a> es la versi\u00f3n m\u00e1s reciente del est\u00e1ndar de direcciones del Protocolo de Internet (IP), cuyo objetivo es eventualmente reemplazar a IPv4. Todos los dispositivos conectados a Internet necesitan una direcci\u00f3n IP num\u00e9rica para comunicarse con otros. El esquema original de direcciones IP, llamado IPv4, se est\u00e1 quedando sin n\u00fameros.<br><br>Internet Society Pulse monitorea <a href=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\">la adopci\u00f3n de IPv6<\/a> en diferentes pa\u00edses y redes a nivel mundial para fomentar una mayor adopci\u00f3n de esta tecnolog\u00eda. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c4ee090f\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242378\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-da1bcd41 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Est\u00e1ndar Abierto de Datos de Fibra \u00d3ptica (OFDS)<\/h3><\/div><p class=\"uagb-ifb-desc\">La disponibilidad de datos adecuados sobre la infraestructura de telecomunicaciones existente, en particular la infraestructura de fibra \u00f3ptica, puede respaldar la toma de decisiones para inversiones en infraestructura m\u00e1s espec\u00edficas y rentables, tanto del sector p\u00fablico y como del privado.<br><br><a href=\"https:\/\/www.internetsociety.org\/blog\/2025\/04\/the-open-fibre-data-standard\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2025\/04\/the-open-fibre-data-standard\/\">El Est\u00e1ndar Abierto de Datos de Fibra \u00d3ptica (OFDS)<\/a> aborda el desaf\u00edo de la falta de datos sobre la infraestructura de fibra \u00f3ptica al proponer una soluci\u00f3n orientada a establecer un est\u00e1ndar abierto global para estos datos. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<h3 class=\"wp-block-heading has-32-font-size\" id=\"security\">Tecnolog\u00edas que mejoran la seguridad en l\u00ednea<\/h3>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-07b48012 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e46d814c\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242379\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-2012b424 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Seguridad de la capa de transporte (TLS)<\/h3><\/div><p class=\"uagb-ifb-desc\">Muchas aplicaciones populares de Internet, como el correo electr\u00f3nico y los navegadores web, utilizan seguridad de la capa de <a href=\"https:\/\/www.internetsociety.org\/deploy360\/tls\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/tls\/\">transporte (TLS)<\/a> para proteger el tr\u00e1fico contra escuchas no autorizadas y la manipulaci\u00f3n de los datos durante la transmisi\u00f3n entre clientes y servidores. La gente suele reconocer al protocolo TLS por los \u00abhttps\u00bb y los iconos de candado que aparecen en los navegadores web. <br><br>La \u00faltima versi\u00f3n, <a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/08\/deploying-tls-1-3\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2018\/08\/deploying-tls-1-3\/\">TLS 1.3<\/a>, ofrece mayor seguridad y reduce las posibilidades de que los atacantes descubran nuevas vulnerabilidades. Tambi\u00e9n mejora el desempe\u00f1o, ya que las conexiones seguras se establecen m\u00e1s r\u00e1pidamente. <br><br>Internet Society Pulse monitorea la adopci\u00f3n global de <a href=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\">cada versi\u00f3n de TLS<\/a> para mostrar el avance de la seguridad de Internet. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-675e8465\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB.png\" alt=\"\" class=\"wp-image-125734\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB.png 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-450x450.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6d9929c1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Extensiones de seguridad para el DNS (DNSSEC)<\/h3><\/div><p class=\"uagb-ifb-desc\">El DNS es una pieza fundamental de la infraestructura de Internet que traduce nombres descriptivos (por ejemplo, internetsociety.org) en direcciones num\u00e9ricas (por ejemplo, 2001:41c8:20::b31a). <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/\">Las extensiones de seguridad para el sistema de nombres de dominio (DNSSEC)<\/a> est\u00e1n dise\u00f1adas para autenticar los datos de las respuestas del sistema de nombres de dominio (DNS). <br><br><a href=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\">Internet Society Pulse<\/a> presenta indicadores de la adopci\u00f3n de DNSSEC por parte de los registros de nombres de dominio de nivel superior de c\u00f3digo de pa\u00eds (ccTLD) y mide el uso de la validaci\u00f3n DNSSEC por parte de los hosts de Internet a nivel mundial. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-0e87a3a2 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-850aaad9\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB.png\" alt=\"a globe\" class=\"wp-image-189123\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB.png 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6873faaa uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">HTTP\/3<\/h3><\/div><p class=\"uagb-ifb-desc\">El protocolo de transferencia de hipertexto (HTTP) es una parte fundamental de la <a href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\" type=\"link\" id=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\">World Wide Web<\/a> y se utiliza para transferir datos entre los distintos dispositivos conectados a Internet. La \u00faltima versi\u00f3n, HTTP\/3, marca un cambio radical con respecto al pasado al adoptar un protocolo de transporte completamente nuevo (QUIC). <br><br>La capacidad de Internet para adoptar HTTP\/3 demuestra su capacidad para evolucionar y dar soporte a nuevas aplicaciones. Puede seguir su adopci\u00f3n a trav\u00e9s de <a href=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/es\/technologies\/\">Internet Society Pulse<\/a>. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-6b9307d9\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"144\" height=\"144\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/12\/Icon-Privacy-Dark-RGB.png\" alt=\"A padlock icon\" class=\"wp-image-218165\" style=\"aspect-ratio:1;object-fit:cover;width:80px\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-9045487f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Privacidad del sistema de nombres de dominio (DNS)<\/h3><\/div><p class=\"uagb-ifb-desc\">El <a href=\"https:\/\/www.internetsociety.org\/es\/tag\/sistema-de-nombres-de-dominio-dns\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/es\/tag\/sistema-de-nombres-de-dominio-dns\/\">sistema de nombres de dominio (DNS)<\/a> se desarroll\u00f3 originalmente sin tener en cuenta la privacidad del usuario y, por lo tanto, las consultas y respuestas del DNS pueden filtrar informaci\u00f3n que puede correlacionarse con actividades espec\u00edficas de la red. <br><br>Descubra <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dns-privacy\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/dns-privacy\/\">c\u00f3mo podemos mitigar las implicancias del DNS para la privacidad.<\/a> <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-3ae2be7a uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-0295a10d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB.png\" alt=\"a shield icon\" class=\"wp-image-125737\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB.png 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-450x450.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-66fa7b90 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Anti-spoofing<\/h3><\/div><p class=\"uagb-ifb-desc\">Los ataques de denegaci\u00f3n de servicio distribuido (DDoS) representan una amenaza creciente para la disponibilidad de Internet. Las tecnolog\u00edas anti-spoofing son mecanismos que los operadores de red pueden implementar para mitigar estos ataques.<br><br><a href=\"https:\/\/manrs.org\/about\/\" type=\"link\" id=\"https:\/\/manrs.org\/about\/\">La iniciativa MANRS<\/a> describe acciones concretas que las redes deber\u00edan adoptar para evitar el tr\u00e1fico con direcciones IP suplantadas. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e8ac1f5f\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242381\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6c48df4e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Protocolo de puerta de enlace de frontera (BGP)<\/h3><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\">El protocolo de puerta de enlace fronteriza (BGP)<\/a> es el lenguaje que utilizan los routers en Internet para decidir c\u00f3mo enviar los paquetes de un router a otro para llegar a su destino final. <br><br>El desaf\u00edo de BGP es que no incluye mecanismos de seguridad integrados y se basa principalmente en la confianza entre los operadores de red de que proteger\u00e1n sus sistemas adecuadamente y no enviar\u00e1n datos incorrectos. Sin embargo, podr\u00edan ocurrir errores y tambi\u00e9n podr\u00edan surgir problemas si atacantes maliciosos intentan manipular las tablas de enrutamiento que utiliza BGP.<br><br>Nosotros apoyamos <a href=\"https:\/\/www.manrs.org\/\" type=\"link\" id=\"https:\/\/www.manrs.org\/\">la iniciativa MANRS<\/a>, que define acciones simples pero concretas para reducir las amenazas m\u00e1s comunes al enrutamiento, entre ellas el secuestro de BGP. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-18-font-size\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Explore noticias y recursos sobre las tecnolog\u00edas de Internet. Tambi\u00e9n puede visitar el <a href=\"https:\/\/pulse.internetsociety.org\/es\/blog\/?category=Technology\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/es\/blog\/?category=Technology\">blog de Internet Society Pulse<\/a> para acceder a m\u00e1s noticias y an\u00e1lisis basados en datos. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1997' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1997\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Buscar por palabra clave\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenido<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (52)<\/span><\/option><option value=\"events-type\" >Eventos<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"news-type\" >Noticias<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Comunicados de prensa<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"resources-type\" >Recurso<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"policy-briefs\" >&nbsp;&nbsp;&nbsp;Informes de pol\u00edticas p\u00fablicas<span class=\"cvp-count\"> (3)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">Regi\u00f3n<\/option><option value=\"africa\" >\u00c1frica<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"asia-y-el-pacifico\" >Asia y el Pacifico<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"europa\" >Europa<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"global\" >Global<span class=\"cvp-count\"> (49)<\/span><\/option><option value=\"america-latina-y-el-caribe\" >America Latina y el Caribe<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"oriente-medio\" >Oriente Medio<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"america-del-norte\" >America del Norte<span class=\"cvp-count\"> (0)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_post_tag\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_post_tag\"><option value=\"\">Tema<\/option><option value=\"estandar-abierto-de-datos-de-fibra-optica-ofds\" >Est\u00e1ndar Abierto de Datos de Fibra \u00d3ptica (OFDS)<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"extensiones-de-seguridad-del-sistema-de-nombres-de-dominio-dnssec\" >Extensiones de Seguridad del Sistema de Nombres de Dominio (DNSSEC)<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"ipv6\" >IPv6<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"protocolo-de-puerta-de-enlace-de-frontera-bgp\" >Protocolo de puerta de enlace de frontera (BGP)<span class=\"cvp-count\"> (17)<\/span><\/option><option value=\"seguridad-de-enrutamiento\" >Seguridad de enrutamiento<span class=\"cvp-count\"> (48)<\/span><\/option><option value=\"transport-layer-security-tls\" >Seguridad de la capa de transporte (TLS)<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"sistema-de-nombres-de-dominio-dns\" >Sistema de nombres de dominio (DNS)<span class=\"cvp-count\"> (7)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-3z0n3m62\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"234952\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/mejorar-la-resiliencia-de-la-infraestructura-de-internet-submarina\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Mejorar la resiliencia de la infraestructura de Internet submarina\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail cvp-substitute skip-lazy  cvplazy\" alt=\"A map of the world showing main submarine cables. Source: TeleGeography.\" title=\"\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/10\/undersea-fibre-optic-cables\u2014570-as-of-2025.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-13T19:13:09+00:00\">13 de noviembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/mejorar-la-resiliencia-de-la-infraestructura-de-internet-submarina\/\" class=\"_self\" target=\"_self\" aria-label=\"Mejorar la resiliencia de la infraestructura de Internet submarina\">Mejorar la resiliencia de la infraestructura de Internet submarina<\/a><\/h2><div class=\"pt-cv-content\">Resumen ejecutivo A medida que se intensifica la dependencia de los servicios digitales, la resiliencia y seguridad de los sistemas &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230519\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 de septiembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/perspectivas-sobre-el-bloqueo-de-contenido-en-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet\">Informe de pol\u00edticas: Perspectivas sobre el bloqueo de contenido en Internet<\/a><\/h2><div class=\"pt-cv-content\">Internet Society alienta a los formuladores de pol\u00edticas a priorizar soluciones que aborden el contenido da\u00f1ino en su origen, en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"203064\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/11\/la-iniciativa-manrs-alcanza-cotas-mas-altas\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"La iniciativa MANRS alcanza cotas m\u00e1s altas\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a mountain peak covered with snow seen through colorful prayer flags\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1.jpg 1440w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-11-02T15:00:00+00:00\">2 de noviembre de 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/11\/la-iniciativa-manrs-alcanza-cotas-mas-altas\/\" class=\"_self\" target=\"_self\" aria-label=\"La iniciativa MANRS alcanza cotas m\u00e1s altas\">La iniciativa MANRS alcanza cotas m\u00e1s altas<\/a><\/h2><div class=\"pt-cv-content\">En asociaci\u00f3n con la Global Cyber Alliance (GCA), creemos que la iniciativa MANRS seguir\u00e1 consolid\u00e1ndose como la referencia mundialmente reconocida &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"152526\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/10\/se-abre-el-plazo-de-presentacion-de-candidaturas-para-la-junta-directiva-de-la-iniciativa-manrs\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Se abre el plazo de presentaci\u00f3n de candidaturas para la junta directiva de la iniciativa MANRS\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Se abre el plazo de presentaci\u00f3n de candidaturas para la junta directiva de la iniciativa MANRS\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-10-07T11:00:00+00:00\">7 de \r\noctubre de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/10\/se-abre-el-plazo-de-presentacion-de-candidaturas-para-la-junta-directiva-de-la-iniciativa-manrs\/\" class=\"_self\" target=\"_self\" aria-label=\"Se abre el plazo de presentaci\u00f3n de candidaturas para la junta directiva de la iniciativa MANRS\">Se abre el plazo de presentaci\u00f3n de candidaturas para la junta directiva de la iniciativa MANRS<\/a><\/h2><div class=\"pt-cv-content\">La comunidad de la iniciativa MANRS est\u00e1 buscando voluntarios para formar parte de su nueva junta directiva y est\u00e1 aceptando &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"151970\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/09\/presentacion-del-nuevo-programa-de-proveedores-de-equipos-impulsado-por-la-iniciativa-manrs-para-mejorar-la-seguridad-del-enrutamiento-en-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Presentaci\u00f3n del nuevo programa de proveedores de equipos impulsado por la iniciativa MANRS para mejorar la seguridad del enrutamiento en Internet\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Presentaci\u00f3n del nuevo programa de proveedores de equipos impulsado por la iniciativa MANRS para mejorar la seguridad del enrutamiento en Internet\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-09-15T22:01:00+00:00\">15 de septiembre de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/09\/presentacion-del-nuevo-programa-de-proveedores-de-equipos-impulsado-por-la-iniciativa-manrs-para-mejorar-la-seguridad-del-enrutamiento-en-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Presentaci\u00f3n del nuevo programa de proveedores de equipos impulsado por la iniciativa MANRS para mejorar la seguridad del enrutamiento en Internet\">Presentaci\u00f3n del nuevo programa de proveedores de equipos impulsado por la iniciativa MANRS para mejorar la seguridad del enrutamiento en Internet<\/a><\/h2><div class=\"pt-cv-content\">La habilitaci\u00f3n de las funciones de seguridad de enrutamiento en los equipos de red (y la prestaci\u00f3n de asistencia y &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"149870\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/07\/nuevos-manuales-de-seguridad-de-enrutamiento-de-manrs-para-los-responsables-de-la-toma-de-decisiones\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Nuevos manuales de seguridad de enrutamiento de MANRS para los responsables de la toma de decisiones\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Nuevos manuales de seguridad de enrutamiento de MANRS para los responsables de la toma de decisiones\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-07-28T13:09:42+00:00\">28 de julio de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/07\/nuevos-manuales-de-seguridad-de-enrutamiento-de-manrs-para-los-responsables-de-la-toma-de-decisiones\/\" class=\"_self\" target=\"_self\" aria-label=\"Nuevos manuales de seguridad de enrutamiento de MANRS para los responsables de la toma de decisiones\">Nuevos manuales de seguridad de enrutamiento de MANRS para los responsables de la toma de decisiones<\/a><\/h2><div class=\"pt-cv-content\">Como responsable pol\u00edtico o ejecutivo, \u00bfte preocupa que te roben o intercepten tus datos? \u00bfO que tu sitio web sufra &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"139521\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/04\/se-necesitan-comentarios-redaccion-del-acta-constitutiva-de-la-comunidad-manrs\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Se necesitan comentarios: redacci\u00f3n del Acta Constitutiva de la Comunidad MANRS\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Se necesitan comentarios: redacci\u00f3n del Acta Constitutiva de la Comunidad MANRS\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-04-20T14:39:37+00:00\">20 de abril de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/04\/se-necesitan-comentarios-redaccion-del-acta-constitutiva-de-la-comunidad-manrs\/\" class=\"_self\" target=\"_self\" aria-label=\"Se necesitan comentarios: redacci\u00f3n del Acta Constitutiva de la Comunidad MANRS\">Se necesitan comentarios: redacci\u00f3n del Acta Constitutiva de la Comunidad MANRS<\/a><\/h2><div class=\"pt-cv-content\">Aunque MANRS ha ido viento en popa desde su puesta en marcha en 2014, ganando la atenci\u00f3n, el inter\u00e9s y &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"134829\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/03\/internet-society-se-une-a-los-principales-defensores-de-internet-para-pedir-a-los-proveedores-de-servicios-de-internet-que-se-comprometan-a-proteger-la-privacidad-de-los-usuarios\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Internet Society se une a los principales defensores de Internet para pedir a los Proveedores de Servicios de Internet que se comprometan a proteger la privacidad de los usuarios.\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"425\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Internet Society se une a los principales defensores de Internet para pedir a los Proveedores de Servicios de Internet que se comprometan a proteger la privacidad de los usuarios.\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy-768x425.jpeg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy-768x425.jpeg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy-450x249.jpeg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy-1024x567.jpeg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy-250x138.jpeg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/open-letter-dns-privacy.jpeg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-03-10T14:00:00+00:00\">10 de marzo de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/03\/internet-society-se-une-a-los-principales-defensores-de-internet-para-pedir-a-los-proveedores-de-servicios-de-internet-que-se-comprometan-a-proteger-la-privacidad-de-los-usuarios\/\" class=\"_self\" target=\"_self\" aria-label=\"Internet Society se une a los principales defensores de Internet para pedir a los Proveedores de Servicios de Internet que se comprometan a proteger la privacidad de los usuarios.\">Internet Society se une a los principales defensores de Internet para pedir a los Proveedores de Servicios de Internet que se comprometan a proteger la privacidad de los usuarios.<\/a><\/h2><div class=\"pt-cv-content\">Mozilla, Electronic Frontier Foundation e Internet Society les han pedido AT&amp;T, T-Mobile y Verizon que se comprometan a limitar la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"134416\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/03\/se-abre-el-plazo-de-solicitud-de-las-becas-manrs-2021\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Se abre el plazo de solicitud de las becas MANRS 2021\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Se abre el plazo de solicitud de las becas MANRS 2021\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-03-03T13:00:00+00:00\">3 de marzo de 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2021\/03\/se-abre-el-plazo-de-solicitud-de-las-becas-manrs-2021\/\" class=\"_self\" target=\"_self\" aria-label=\"Se abre el plazo de solicitud de las becas MANRS 2021\">Se abre el plazo de solicitud de las becas MANRS 2021<\/a><\/h2><div class=\"pt-cv-content\">El programa de becas de la iniciativa MANRS (Normas Mutuamente Acordadas para la Seguridad del Enrutamiento) est\u00e1 empezando a aceptar &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"8\" data-currentpage=\"1\" data-sid=\"3z0n3m62\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">&hellip;<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858\/?_page=8\">8<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Cargando...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-3z0n3m62 {text-align: left}\n#pt-cv-view-3z0n3m62 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-3z0n3m62 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields {  }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper {  }#pt-cv-view-3z0n3m62[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-3z0n3m62:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail {  }#pt-cv-view-3z0n3m62 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-3z0n3m62 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-rmwrap {  }#pt-cv-view-3z0n3m62 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm {  }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-3z0n3m62 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Derechos de autor de la imagen principal:<br>\u00a9 Nyani Quarmyne<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acceda a recursos f\u00e1ciles de entender sobre tecnolog\u00edas de Internet como IPv6, TLS, DNSSEC, HTTP\/3, privacidad de DNS, anti-spoofing, seguridad de BGP y m\u00e1s.<\/p>\n","protected":false},"author":46,"featured_media":133277,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188],"tags":[],"region_news_regions":[6030],"content_category":[6106],"ppma_author":[4057],"class_list":["post-244858","page","type-page","status-publish","has-post-thumbnail","hentry","category-como-funciona-internet","region_news_regions-global","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/es\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Acceda a recursos f\u00e1ciles de entender sobre tecnolog\u00edas de Internet como IPv6, TLS, DNSSEC, HTTP\/3, privacidad de DNS, anti-spoofing, seguridad de BGP y m\u00e1s.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=244858"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244858\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/133277"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=244858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=244858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=244858"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=244858"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=244858"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=244858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}