{"id":37,"date":"2021-09-07T12:37:32","date_gmt":"2021-09-07T12:37:32","guid":{"rendered":"https:\/\/protegetuinformacion.com\/?page_id=37"},"modified":"2021-10-19T15:15:46","modified_gmt":"2021-10-19T15:15:46","slug":"herramientas-utiles","status":"publish","type":"page","link":"https:\/\/protegetuinformacion.com\/index.php\/herramientas-utiles\/","title":{"rendered":"Herramientas \u00fatiles"},"content":{"rendered":"\n<div class=\"wp-container-2 wp-block-query\"><ul class=\"wp-container-1 is-flex-container columns-3 wp-block-post-template\"><li class=\"wp-block-post post-440 post type-post status-publish format-standard has-post-thumbnail hentry category-herramientas-utiles tag-ciberseguridad tag-internet tag-seguridad tag-tools entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/herramientas-de-privacidad-y-cifrado\/\" target=\"_self\" rel=\"\">Herramientas de privacidad y cifrado<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/herramientas-de-privacidad-y-cifrado\/\"><img width=\"626\" height=\"352\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cifrado.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Herramientas de privacidad y cifrado\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cifrado.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cifrado-300x169.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Si normalmente no mandamos una carta sin sobre, podemos entender las herramientas de privacidad y cifrado como los \u201csobres\u201d que podemos emplear para que nuestra informaci\u00f3n solamente la vea la &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/herramientas-de-privacidad-y-cifrado\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:06:11+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":2,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":80,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/37\/revisions\/80"}],"wp:attachment":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}