{"id":25621,"date":"2021-12-13T09:49:01","date_gmt":"2021-12-13T15:49:01","guid":{"rendered":"https:\/\/otech.uaeh.edu.mx\/noti\/?p=25621"},"modified":"2021-12-13T09:50:56","modified_gmt":"2021-12-13T15:50:56","slug":"como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/","title":{"rendered":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">La IA est\u00e1 ejerciendo una influencia cada vez mayor en nuestras vidas, lo que genera una\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-US\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">preocupaci\u00f3n creciente\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">sobre\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-US\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">si podemos confiar en que actuar\u00e1 de forma justa y fiable.\u00a0<\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">E\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-US\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">hackers thical\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">, auditor\u00edas AI, y &#8220;bondades sesgo&#8221; podr\u00edan ayudar a mantener una tapa sobre los\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-US\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">da\u00f1os potenciales\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">, dicen los investigadores.<\/span><\/span><\/span><\/span><\/span><!--more--><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Cada vez hay m\u00e1s conciencia de los peligros que plantea nuestra dependencia de la IA. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Estos sistemas tienen una habilidad preocupante para recoger y replicar los sesgos ya presentes en nuestra sociedad, que pueden afianzar la marginaci\u00f3n de ciertos grupos.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">La naturaleza de\u00a0 <\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/12\/07\/how-deepminds-ai-helped-crack-two-mathematical-puzzles-that-stumped-humans-for-decades\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">gran cantidad de datos de los sistemas de aprendizaje profundo actuales<\/span><\/span><\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0tambi\u00e9n plantea preocupaciones sobre la privacidad, tanto por su fomento de una vigilancia generalizada como por la posibilidad de violaciones de datos. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Y la naturaleza de\u00a0 <\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/10\/25\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">caja negra<\/span><\/span><\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0de muchos sistemas de IA tambi\u00e9n dificulta evaluar si est\u00e1n funcionando correctamente, lo que puede tener serias implicaciones en ciertos dominios.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">El reconocimiento de estos problemas ha llevado a una\u00a0 <\/span><\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2019\/06\/11\/whats-behind-the-international-rush-to-write-an-ai-rulebook\/\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">colecci\u00f3n de principios \u00e9ticos de IA en<\/span><\/span><\/span><\/span><\/span><\/a><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0r\u00e1pida expansi\u00f3n\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">de empresas, gobiernos e\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">incluso organizaciones supranacionales dise\u00f1ados para guiar a los desarrolladores de tecnolog\u00eda de IA. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pero las propuestas concretas sobre c\u00f3mo asegurar de que todos est\u00e9n a la altura de estos ideales son mucho m\u00e1s raras.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Ahora, un nuevo\u00a0 <\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/www.science.org\/doi\/10.1126\/science.abi7176\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">art\u00edculo en\u00a0 <\/span><\/span><\/span><\/span><\/a><\/span><em><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Science<\/span><\/span><\/span><\/span><\/span><\/em><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0propone algunos pasos tangibles que la industria podr\u00eda tomar para aumentar la confianza en la tecnolog\u00eda de IA. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">No hacerlo podr\u00eda conducir a un &#8220;latigazo tecnol\u00f3gico&#8221; que obstaculice gravemente el progreso en el campo, dicen los investigadores.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">&#8220;Los\u00a0 <\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">gobiernos y el p\u00fablico deben poder distinguir f\u00e1cilmente entre los confiables, los vendedores de aceite de serpiente y los que no tienen ni idea&#8221;, dijo en un\u00a0 <\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/www.eurekalert.org\/news-releases\/936808\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">comunicado de prensa el<\/span><\/span><\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0autor principal, Shahar Avin, de la Universidad de Cambridge. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u201cUna vez que puede hacer eso, existe un incentivo real para ser confiable. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pero aunque no se pueden distinguir, hay mucha presi\u00f3n para tomar atajos &#8220;.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">El investigador\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">toma\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">prestadas algunas ideas probadas y comprobadas de la seguridad cibern\u00e9tica, que ha lidiado con el tema de lograr que las personas conf\u00eden en el software durante d\u00e9cadas. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Un enfoque popular es utilizar &#8220;equipos rojos&#8221; de piratas inform\u00e1ticos \u00e9ticos que intentan encontrar vulnerabilidades en los sistemas para que el dise\u00f1ador pueda corregirlos antes de que se publiquen.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Los equipos rojos de IA ya existen en los grandes laboratorios de la industria y el gobierno, se\u00f1alan los autores, pero sugiero que compartir experiencias entre organizaciones y dominios podr\u00edan hacer que este enfoque sea mucho m\u00e1s poderoso y accesible para m\u00e1s desarrolladores de IA.<\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Las compa\u00f1\u00edas de software tambi\u00e9n ofrecen con frecuencia &#8220;recompensas de errores&#8221;, que proporcionan una recompensa econ\u00f3mica si un pirata inform\u00e1tico encuentra fallas en sus sistemas y Diga\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">acerca de ello en privado para solucionarlo. <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Los autores sugirieron que los desarrolladores de IA adoptar pr\u00e1cticas similares, ofreciendo recompensas a las personas por descubrir si sus algoritmos est\u00e1n sesgados o tomar decisiones incorrectas.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Se\u00f1alan\u00a0 <\/span><\/span><\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/www.theverge.com\/2021\/8\/10\/22617972\/twitter-photo-cropping-algorithm-ai-bias-bug-bounty-results\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">una competencia reciente<\/span><\/span><\/span><\/span><\/span><\/a><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0celebrada en Twitter que ofreci\u00f3 recompensas a cualquiera que pudiera encontrar sesgos en su algoritmo de recorte de im\u00e1genes como un ejemplo temprano de c\u00f3mo podr\u00eda funcionar este enfoque.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">A medida que los ataques de ciberseguridad se vuelven m\u00e1s comunes, los gobiernos exigen cada vez m\u00e1s la notificaci\u00f3n de violaciones de datos y pirater\u00eda. <\/span><span style=\"vertical-align: inherit;\">Los autores sugirieron que se podr\u00edan aplicar ideas similares a incidentes en los que los sistemas de inteligencia artificial causan da\u00f1os. <\/span><span style=\"vertical-align: inherit;\">Si bien el intercambio voluntario y an\u00f3nimo, como el que permite\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><a style=\"color: #000000;\" href=\"https:\/\/incidentdatabase.ai\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">la base de datos de incidentes de IA<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0,\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">es un punto de partida \u00fatil, dicen que esto podr\u00eda convertirse en un requisito reglamentario.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">El mundo de las finanzas tambi\u00e9n tiene algunas herramientas poderosas para garantizar la confianza, sobre todo la idea de auditor\u00edas de terceros. <\/span><span style=\"vertical-align: inherit;\">Esto implica otorgar a un auditor acceso a informaci\u00f3n restringida para que pueda evaluar si los reclamos p\u00fablicos del propietario coinciden con sus registros privados. <\/span><span style=\"vertical-align: inherit;\">Este enfoque podr\u00eda ser \u00fatil para los desarrolladores de inteligencia artificial que generalmente desean mantener en secreto sus datos y algoritmos.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Sin embargo, las auditor\u00edas solo funcionan si se puede confiar en los auditores y si no se aprueban, hay consecuencias significativas, dicen los autores. <\/span><span style=\"vertical-align: inherit;\">Tambi\u00e9n son posibles solo si los desarrolladores siguen pr\u00e1cticas comunes para documentar su proceso de desarrollo y la estructura y actividades de su sistema.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">En la actualidad, faltan pautas sobre c\u00f3mo hacer esto en IA, pero el trabajo inicial sobre marcos \u00e9ticos, documentaci\u00f3n de modelos y monitoreo continuo de los sistemas de IA es un punto de partida \u00fatil.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">La industria de la inteligencia artificial tambi\u00e9n est\u00e1 trabajando en podr\u00edan aumentar la confianza en la tecnolog\u00eda. <\/span><span style=\"vertical-align: inherit;\">Los esfuerzos para mejorar la\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2019\/03\/19\/to-be-ethical-ai-must-become-explainable-how-do-we-get-there\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">explicabilidad y la interpretaci\u00f3n de los<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0modelos\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2019\/03\/19\/to-be-ethical-ai-must-become-explainable-how-do-we-get-there\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">de IA<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0ya est\u00e1n en marcha, pero los est\u00e1ndares y pruebas comunes que miden el cumplimiento de esos est\u00e1ndares son adiciones \u00fatiles a este campo.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">De manera similar, el aprendizaje autom\u00e1tico que preserva la privacidad, cuyo objetivo es proteger mejor los datos utilizados para entrenar modelos, es un \u00e1rea de investigaci\u00f3n en auge. <\/span><span style=\"vertical-align: inherit;\">Pero la industria a\u00fan rara vez las pone en pr\u00e1ctica, por lo que los autores recomiendan m\u00e1s apoyo a estos esfuerzos para impulsar la adopci\u00f3n.<\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">No est\u00e1 claro si realmente se puede instar a las empresas a tomar medidas concertadas sobre este problema. <\/span><span style=\"vertical-align: inherit;\">Sin reguladores respirando en el cuello\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">, muchos estar\u00e1n disponibles a asumir el nivel onerosa de atenci\u00f3n e inversi\u00f3n que estos enfoques son propensos a requerir. <\/span><span style=\"vertical-align: inherit;\">Pero los autores advierten que la industria debe reconocer la importancia de la confianza p\u00fablica y darle la debida importancia.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">&#8220;Las\u00a0 <\/span><\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">vidas y los medios de subsistencia dependen cada vez m\u00e1s de la IA que est\u00e1 cerrada al escrutinio, y esa es una receta para una crisis de confianza&#8221;, dijo el coautor Haydn Belfield, de la Universidad de Cambridge, en el comunicado de prensa . <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">&#8220;Es hora de que la industria vaya m\u00e1s all\u00e1 de los principios \u00e9ticos bien intencionados e implemente mecanismos del mundo real para abordar esto&#8221;.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Fuente:<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Gent, E. (2021e, 10 de diciembre). <\/span><\/span><i><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la IA<\/span><\/span><\/i><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . <\/span><span style=\"vertical-align: inherit;\">Centro de singularidad. <\/span><span style=\"vertical-align: inherit;\">Recuperado 13 de diciembre de 2021, de https:\/\/singularityhub.com\/2021\/12\/13\/how-ethical-hackers-could-help-us-build-trust-in-ai\/<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La IA est\u00e1 ejerciendo una influencia cada vez mayor en nuestras vidas, lo que genera una\u00a0 preocupaci\u00f3n creciente\u00a0 sobre\u00a0 si podemos confiar en que actuar\u00e1 de forma justa y fiable.\u00a0E\u00a0 hackers thical\u00a0 , auditor\u00edas AI, y &#8220;bondades sesgo&#8221; podr\u00edan ayudar a mantener una tapa sobre los\u00a0 da\u00f1os potenciales\u00a0 , dicen los investigadores.<\/p>\n","protected":false},"author":1,"featured_media":25622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[361],"tags":[],"class_list":["post-25621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"La IA est\u00e1 ejerciendo una influencia cada vez mayor en nuestras vidas, lo que genera una\u00a0 preocupaci\u00f3n creciente\u00a0 sobre\u00a0 si podemos confiar en que actuar\u00e1 de forma justa y fiable.\u00a0E\u00a0 hackers thical\u00a0 , auditor\u00edas AI, y &#8220;bondades sesgo&#8221; podr\u00edan ayudar a mantener una tapa sobre los\u00a0 da\u00f1os potenciales\u00a0 , dicen los investigadores.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T15:49:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-13T15:50:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1068\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial\",\"datePublished\":\"2021-12-13T15:49:01+00:00\",\"dateModified\":\"2021-12-13T15:50:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\"},\"wordCount\":1116,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg\",\"articleSection\":[\"Inteligencia Artificial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\",\"name\":\"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg\",\"datePublished\":\"2021-12-13T15:49:01+00:00\",\"dateModified\":\"2021-12-13T15:50:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg\",\"width\":1068,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/","og_locale":"en_US","og_type":"article","og_title":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"La IA est\u00e1 ejerciendo una influencia cada vez mayor en nuestras vidas, lo que genera una\u00a0 preocupaci\u00f3n creciente\u00a0 sobre\u00a0 si podemos confiar en que actuar\u00e1 de forma justa y fiable.\u00a0E\u00a0 hackers thical\u00a0 , auditor\u00edas AI, y &#8220;bondades sesgo&#8221; podr\u00edan ayudar a mantener una tapa sobre los\u00a0 da\u00f1os potenciales\u00a0 , dicen los investigadores.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2021-12-13T15:49:01+00:00","article_modified_time":"2021-12-13T15:50:56+00:00","og_image":[{"width":1068,"height":601,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial","datePublished":"2021-12-13T15:49:01+00:00","dateModified":"2021-12-13T15:50:56+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/"},"wordCount":1116,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg","articleSection":["Inteligencia Artificial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/","name":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg","datePublished":"2021-12-13T15:49:01+00:00","dateModified":"2021-12-13T15:50:56+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/12\/hackers-AI-computer-screen-code.jpg","width":1068,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/como-los-hackers-eticos-podrian-ayudarnos-a-generar-confianza-en-la-inteligencia-artificial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"C\u00f3mo los hackers \u00e9ticos podr\u00edan ayudarnos a generar confianza en la inteligencia artificial"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=25621"}],"version-history":[{"count":3,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25621\/revisions"}],"predecessor-version":[{"id":25625,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25621\/revisions\/25625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/25622"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=25621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=25621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=25621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}