{"id":64655,"date":"2017-10-26T00:01:01","date_gmt":"2017-10-26T00:01:01","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2017\/10\/encryption-law-enforcement-can-work-together\/"},"modified":"2017-10-27T11:24:36","modified_gmt":"2017-10-27T11:24:36","slug":"encryption-law-enforcement-can-work-together","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2017\/10\/encryption-law-enforcement-can-work-together\/","title":{"rendered":"El cifrado y los organismos encargados de aplicar la ley pueden trabajar juntos"},"content":{"rendered":"<p><a href=\"https:\/\/www.internetsociety.org\/es\/events\/chatham-house-roundtable-encryption-lawful-access\/\">Internet Society junto a Chatham House organiza una mesa redonda<\/a>\u00a0de expertos esta semana\u00a0<a href=\"https:\/\/www.internetsociety.org\/blog\/2017\/04\/securing-our-digital-economy\/\"><strong>con un debate anal\u00edtico sobre el cifrado y el acceso de los organismos encargados de aplicar la ley.<\/strong><\/a><\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2017\/10\/encryption-law-enforcement-can-work-together\/\">Leer m\u00e1s en ingl\u00e9s<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet Society junto a Chatham House organiza una mesa redonda\u00a0de expertos esta semana\u00a0con un debate anal\u00edtico sobre el cifrado y el acceso de los organismos encargados de aplicar la ley. Leer m\u00e1s en ingl\u00e9s &nbsp;<\/p>\n","protected":false},"author":4090,"featured_media":64361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4898,1],"tags":[],"region_news_regions":[],"content_category":[6102],"ppma_author":[4090],"class_list":["post-64655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strong-internet","category-uncategorized","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",1280,855,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-768x513.jpg",768,513,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-1024x684.jpg",1024,684,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",1280,855,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",1280,855,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/10\/puzzle-hans-peter-gauster-252751.jpg",600,401,false]},"uagb_author_info":{"display_name":"","author_link":"https:\/\/www.internetsociety.org\/es\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Internet Society junto a Chatham House organiza una mesa redonda\u00a0de expertos esta semana\u00a0con un debate anal\u00edtico sobre el cifrado y el acceso de los organismos encargados de aplicar la ley. Leer m\u00e1s en ingl\u00e9s &nbsp;","authors":[{"term_id":4090,"user_id":393,"is_guest":0,"slug":"runnegar","display_name":"Christine Runnegar","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/ChristineRunnegar.jpeg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/ChristineRunnegar.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/64655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/4090"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=64655"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/64655\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/64361"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=64655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=64655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=64655"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=64655"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=64655"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=64655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}