{"id":106771,"date":"2019-10-22T14:59:46","date_gmt":"2019-10-22T14:59:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/10\/el-cifrado-en-tu-dia-a-dia\/"},"modified":"2025-11-27T21:12:17","modified_gmt":"2025-11-27T21:12:17","slug":"el-cifrado-en-tu-dia-a-dia","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2019\/10\/el-cifrado-en-tu-dia-a-dia\/","title":{"rendered":"El cifrado en tu d\u00eda a d\u00eda"},"content":{"rendered":"<h6>\u00bfCon qu\u00e9 frecuencia usas el cifrado? Parece cosa de pel\u00edculas de esp\u00edas, pero te sorprender\u00e1 descubrir su casi omnipresencia en tu vida cotidiana.<\/h6>\n\n\n<p>Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can use it for things like shopping online, using mobile banking, or using secure messaging apps. So while you may not be smuggling encrypted government secrets across borders, you do rely on it, along with your passwords and settings, to keep your data secure and private.<\/p>\n\n\n\n<p>Descubre todas las formas de uso cotidiano del cifrado.<br><br><\/p>\n\n\n<h5>07:21<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-phone-1.jpg\" alt=\"\" class=\"wp-image-106505\"\/><\/figure>\n<\/div>\n\n\n<p>Tu alarma vibra. Coges tu tel\u00e9fono, dispuesto a posponer la alarma antes de que te arrepientas. Tienes una presentaci\u00f3n importante en el trabajo y hoy no te va a sobrar ni un minuto. Tienes un mensaje de tu amigo australiano dese\u00e1ndote suerte. \u00a1Qu\u00e9 detallista! Y por si no bastase con el detalle, tu amigo utiliz\u00f3 una aplicaci\u00f3n de mensajer\u00eda con cifrado de extremo a extremo. Est\u00e1 claro que se ha ahorrado el precio de la llamada internacional, pero la seguridad adicional tambi\u00e9n est\u00e1 bien.<br><\/p>\n\n\n<h5>08:13<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-website-1.jpg\" alt=\"\" class=\"wp-image-106520\"\/><\/figure>\n<\/div>\n\n\n<p>You\u2019re ready to go, but before heading out, you check a news website for the traffic report. There\u2019s a lock icon on the search bar, telling you the site uses HTTPS security, which means it\u2019s harder for anyone to see which articles you\u2019re reading. There\u2019s been a minor accident on your usual route so you decide to take the train.<br><\/p>\n\n\n<h5>09:46<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-credit-card-1.jpg\" alt=\"\" class=\"wp-image-106487\"\/><\/figure>\n<\/div>\n\n\n<p>El tren est\u00e1 abarrotado, pero te las arreglas para sentarte. Le das un sorbo al caf\u00e9 que acabas de comprar en el kiosko del and\u00e9n. Al pagar con tu tarjeta de cr\u00e9dito has usado tres puntos de cifrado: en el chip de la tarjeta de cr\u00e9dito, en el dat\u00e1fono y mientras los datos de la tarjeta se enviaban para autorizar tu compra. Pero no piensas en ello. En lugar de ello, sacas tus auriculares bluetooth y suspiras aliviado de que nadie m\u00e1s puede escuchar lo que reproducen. Esto tiene una explicaci\u00f3n: \u00a1eres lo suficientemente bueno, eres lo suficientemente inteligente y, c\u00f3mo no, utilizas el cifrado!<br><\/p>\n\n\n<h5>11:24<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-videoconference-1.jpg\" alt=\"\" class=\"wp-image-106517\"\/><\/figure>\n<\/div>\n\n\n<p>Before you can even settle into your desk at work, you log in to your email account to check on one last thing you need for today&#8217;s important presentation. There\u2019s no news, so you hop onto a videoconference call with a colleagues across the country to try to get an update. The call is secured by end-to-end encryption, so it is a lot harder for anyone to listen to your conversation as the data travels from your computer to your colleagues&#8217;. <\/p>\n\n\n<h5>15:14<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-phone-pay-1.jpg\" alt=\"\" class=\"wp-image-106502\"\/><\/figure>\n<\/div>\n\n\n<p>You did it! The presentation went well and now you\u2019re ready for a break. You\u2019re about halfway through that double bacon chili cheeseburger when the pain starts. You use all of your drugstore rewards points to buy heartburn medicine, and make a mental note to eat better. Lucky for you, the store encrypts this information. Hackers can\u2019t easily access your purchase history, so your dietary choices can be your secret.<\/p>\n\n\n<h5>16:39<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-fitness-tracker-1.jpg\" alt=\"\" class=\"wp-image-106496\"\/><\/figure>\n<\/div>\n\n\n<p>At the end of your work day you glance down at your fitness tracker and see that you&#8217;ve walked 8,000 steps. Good job! It almost makes that lunch worth it. Because there\u2019s secure communication between your tracker and its app, you know your health information will stay secure from anyone hacking the free public WiFi you use in the train station. Now you touch your secure pre-paid pass to the gate at the train station to head home. You were annoyed a few months before when the transit authority updated their pass system, but the new system uses cryptography to help ensure that someone cannot pass their card off as your own \u2013 and charge your account. <\/p>\n\n\n<h5>17:44<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-digital-assistant-1.jpg\" alt=\"\" class=\"wp-image-106490\"\/><\/figure>\n<\/div>\n\n\n<p>You stop at the grocery store to pick up dinner. Since you\u2019re out of cash, you use an app on your smart phone to pay. Each time you make a payment this way, the transaction data is secured using encryption. You spent the exact cost of a deep-dish Buffalo-wing pizza, but your future cardiologist doesn\u2019t need to know that. (It comes with celery sticks. You\u2019re already making healthy choices!)<\/p>\n\n\n\n<p>As soon as you\u2019re home, you beckon your personal digital assistant to turn on the lights. You settle into the couch with dinner and turn on your smart TV to watch your favorite Hallmark movie. You have a weak spot for stories about successful women who return home for the holidays only to fall in love with their childhood sweethearts. Because your WiFi is encrypted, your film snob neighbor never has to know.<\/p>\n\n\n<h6>Ahora que ya sabes todas las formas de cifrado para garantizar la seguridad de tus datos, tu misi\u00f3n es, si as\u00ed lo decides, ayudar a protegerlo.<\/h6>\n<p><a href=\"https:\/\/www.internetsociety.org\/es\/issues\/encryption\/protect-encryption-protect-yourself\/\">Toma estas seis medidas para proteger el cifrado y protegerte a ti mismo<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfCon qu\u00e9 frecuencia usas el cifrado? Parece cosa de pel\u00edculas de esp\u00edas, pero te sorprender\u00e1 descubrir su casi omnipresencia en tu vida cotidiana. Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can use it for things like shopping online, using mobile banking, [&hellip;]<\/p>\n","protected":false},"author":1029,"featured_media":106344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4319,186,4910,4777],"tags":[],"region_news_regions":[],"content_category":[6102],"ppma_author":[4063,4040],"class_list":["post-106771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cifrado","category-confianza","category-fortalecimiento-de-internet","category-seguridad-es","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ryan Polk","author_link":"https:\/\/www.internetsociety.org\/es\/author\/polk\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00bfCon qu\u00e9 frecuencia usas el cifrado? Parece cosa de pel\u00edculas de esp\u00edas, pero te sorprender\u00e1 descubrir su casi omnipresencia en tu vida cotidiana. Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can use it for things like shopping online, using mobile banking,&hellip;","authors":[{"term_id":4063,"user_id":1029,"is_guest":0,"slug":"polk","display_name":"Ryan Polk","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4040,"user_id":15,"is_guest":0,"slug":"froncek","display_name":"April Froncek","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/106771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1029"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=106771"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/106771\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/106344"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=106771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=106771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=106771"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=106771"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=106771"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=106771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}