{"id":16404,"date":"2019-06-13T08:52:13","date_gmt":"2019-06-13T14:52:13","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=16404"},"modified":"2019-06-13T08:53:54","modified_gmt":"2019-06-13T14:53:54","slug":"blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/","title":{"rendered":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM"},"content":{"rendered":"<p>Continuamos con la cobertura a prop\u00f3sito del Blockchain Cruise 2019, pasamos a un siguiente tema y es como sobrevivir a un ataque de intercambio SIM, esta conferencia estuvo presidida por Brad Yasar, es empresario e inversor, y co- fundador del consorcio de Inversores Blockchain (BIC) con m\u00e1s de 5 mil millones de d\u00f3lares asignados a proyectos de blockchain y criptomoneda.<!--more--><\/p>\n<p>Durante su ponencia, coment\u00f3 que realizar este ataque y ser v\u00edctima de \u00e9l es bastante sencillo, ya que consiste en conseguir un duplicado de la tarjeta SIM de la v\u00edctima, a trav\u00e9s del propio operador que presta los servicios de telefon\u00eda m\u00f3vil, para interceptar SMS y as\u00ed poder saltarse los sistemas de seguridad de autenticaci\u00f3n en dos pasos.<\/p>\n<p>Alert\u00f3 sobre la vulnerabilidad que hay detr\u00e1s de esto, e incluso de la informaci\u00f3n que hay en su tel\u00e9fono celular, como el correo electr\u00f3nico y lo f\u00e1cil que puede ser hackear mediante este ataque las contrase\u00f1as, y no solo del mail sino de las dem\u00e1s aplicaciones que usted pueda estar usando.<\/p>\n<p>Esto es generado debido a que\u00a0 una vez que reciben el n\u00famero de tel\u00e9fono, los hackers pueden usarlo para restablecer las contrase\u00f1as de las v\u00edctimas y entrar en sus cuentas, incluidas las cuentas en los intercambios de criptomonedas.<span>\u00a0<\/span><strong>El Speaker asegura que \u201clas cuentas en criptomonedas son objetivos comunes\u00bb<\/strong>.<\/p>\n<p>Expresa que las t\u00e1cticas empleadas por los criminales para realizar tales ataques pueden variar. A veces, enga\u00f1an a los representantes de los clientes para que crean que ellos son los objetivos y les hacen entregar sus datos. Sin embargo, seg\u00fan Yasar, los estafadores a menudo utilizan los llamados \u00abplugs\u00bb: personas dentro de las compa\u00f1\u00edas de telecomunicaciones a las que se les paga por hacer intercambios ilegales.<\/p>\n<blockquote class=\"wp-block-quote\"><p>\u00abEn crypto, si los hackers obtienen acceso a tus claves privadas, autom\u00e1ticamente son due\u00f1os de tu dinero\u00bb, expres\u00f3 Yasar.<\/p><\/blockquote>\n<p>En este sentido, Brad se\u00f1ala que los ataques de intercambio SIM pueden evitarse en gran medida al estar atentos sobre qui\u00e9n tiene su n\u00famero de tel\u00e9fono m\u00f3vil. Recomienda usar redes y aplicaciones de autenticaci\u00f3n alternativas como autenticaci\u00f3n de Google, evitar publicar su n\u00famero de tel\u00e9fono en l\u00ednea, no alardear sobre sus ganancias de criptomonedas y sobretodo que no almacene su criptomoneda en ning\u00fan intercambio durante un largo per\u00edodo de tiempo.<\/p>\n<p>Brad enfatiz\u00f3 que esto no es algo novedoso, ya que es un problema presente desde hace mucho tiempo. Sin embargo en los \u00faltimos tiempos ha habido un repunte relacionado con este problema.<\/p>\n<p>Agreg\u00f3 que las personas deben ser responsables con esto ya que se trata de la seguridad de dinero y de informaci\u00f3n que es confidencial de cada persona, por lo que es importarte proteger inversiones en cifrado guardando su n\u00famero de tel\u00e9fono y otros c\u00f3digos de seguridad, para que los piratas inform\u00e1ticos no sean los due\u00f1os de sus billeteras y de toda su informaci\u00f3n personal.<\/p>\n<p><strong>Fuente: Criptotendencia<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuamos con la cobertura a prop\u00f3sito del Blockchain Cruise 2019, pasamos a un siguiente tema y es como sobrevivir a un ataque de intercambio SIM, esta conferencia estuvo presidida por Brad Yasar, es empresario e inversor, y co- fundador del consorcio de Inversores Blockchain (BIC) con m\u00e1s de 5 mil millones de d\u00f3lares asignados a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16405,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[381],"tags":[],"class_list":["post-16404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-block-chain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Continuamos con la cobertura a prop\u00f3sito del Blockchain Cruise 2019, pasamos a un siguiente tema y es como sobrevivir a un ataque de intercambio SIM, esta conferencia estuvo presidida por Brad Yasar, es empresario e inversor, y co- fundador del consorcio de Inversores Blockchain (BIC) con m\u00e1s de 5 mil millones de d\u00f3lares asignados a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T14:52:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-13T14:53:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM\",\"datePublished\":\"2019-06-13T14:52:13+00:00\",\"dateModified\":\"2019-06-13T14:53:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\"},\"wordCount\":523,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\",\"name\":\"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png\",\"datePublished\":\"2019-06-13T14:52:13+00:00\",\"dateModified\":\"2019-06-13T14:53:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Continuamos con la cobertura a prop\u00f3sito del Blockchain Cruise 2019, pasamos a un siguiente tema y es como sobrevivir a un ataque de intercambio SIM, esta conferencia estuvo presidida por Brad Yasar, es empresario e inversor, y co- fundador del consorcio de Inversores Blockchain (BIC) con m\u00e1s de 5 mil millones de d\u00f3lares asignados a [&hellip;]","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-06-13T14:52:13+00:00","article_modified_time":"2019-06-13T14:53:54+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM","datePublished":"2019-06-13T14:52:13+00:00","dateModified":"2019-06-13T14:53:54+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/"},"wordCount":523,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png","articleSection":["Blockchain"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/","name":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png","datePublished":"2019-06-13T14:52:13+00:00","dateModified":"2019-06-13T14:53:54+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/06\/Notic.7-3.png","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/block-chain\/blockchain-cruise-2019-sobrevivir-a-un-ataque-de-intercambio-sim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Blockchain Cruise 2019: Sobrevivir a un ataque de intercambio SIM"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/16404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=16404"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/16404\/revisions"}],"predecessor-version":[{"id":16406,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/16404\/revisions\/16406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/16405"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=16404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=16404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=16404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}