{"id":4810,"date":"2017-03-15T13:25:13","date_gmt":"2017-03-15T19:25:13","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=4810"},"modified":"2017-03-15T13:43:37","modified_gmt":"2017-03-15T19:43:37","slug":"logran-hackear-smartphones-usando-ondas-de-sonido-3","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/","title":{"rendered":"Logran hackear smartphones usando ondas de sonido"},"content":{"rendered":"<p style=\"text-align: justify;\">Un equipo de investigadores de las universidades de Michigan y Carolina del Sur lograron hackear smartphones utilizando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio en dispositivos electr\u00f3nicos, y en el futuro coches.<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: justify;\">Kevin Fu, profesor de ingenier\u00eda el\u00e9ctrica y ciencias inform\u00e1ticas en la Universidad de Michigan, public\u00f3 junto con su equipo un estudio en el que explican c\u00f3mo crearon archivos maliciosos de audio para aprovechar fallos de seguridad en sistemas de aceler\u00f3metro de dispositivos electr\u00f3nicos modernos.<\/p>\n<div class=\"js_ad-dynamic\" style=\"text-align: justify;\">Utilizando un altavoz con un costo de apenas 5 d\u00f3lares lograron hackear smartphones y wearables para realizar diferentes tareas, mientras los controlaban de forma remota. En sus pruebas lograron tomar control de un Samsung Galaxy S5 y un par de brazaletes Fitbit.<\/div>\n<p style=\"text-align: justify;\">Para ello han dise\u00f1ado un sistema que puede confundir el aceler\u00f3metro de los dispositivos electr\u00f3nicos para hacerlos creer que estamos realizando acciones espec\u00edficas. Por ejemplo, si un m\u00f3vil cuenta con una aplicaci\u00f3n que cambie la canci\u00f3n que se reproduce al sacudirlo de cierta forma, o que encienda las bombillas inteligentes de una casa, pueden controlar estas funciones usando ataques de audio.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4814 aligncenter\" src=\"http:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido2.jpg\" alt=\"hacksonido2\" width=\"550\" height=\"309\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Los aceler\u00f3metros son sensores que incluyen pr\u00e1cticamente todos los dispositivos electr\u00f3nicos modernos (adem\u00e1s de coches) para detectar cuando el usuario se est\u00e1 moviendo y manipula el dispositivo de cierta forma. Estos sensores cuentan con una peque\u00f1a cantidad de masa suspendida y, al ser atacados mediante estas ondas de sonido, los investigadores pueden mover la masa del sensor para que este que el dispositivo est\u00e1 en movimiento.<\/p>\n<div class=\"ad-container js_ad-video row ad-wide ad-top js_ad-video-desktop\">\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\">Fu y su equipo aseguran que, utilizando la combinaci\u00f3n correcta de ondas de sonido y aprendiendo c\u00f3mo funcionan las aplicaciones que se basan en el aceler\u00f3metro, es posible hackear cualquier cosa que podamos imaginar.<\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\"><\/div>\n<\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\">\u201cSi una app utiliza el aceler\u00f3metro para encender el coche cuando sacudes el m\u00f3vil, un atacante podr\u00eda burlar el sensor para hacer que el m\u00f3vil crea que est\u00e1 siendo sacudido y as\u00ed encender el coche\u201d.<\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\"><\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\">Los investigadores se han puesto en contacto con los fabricantes de aceler\u00f3metros para notificarlos acerca de las vulnerabilidades de seguridad que han descubierto. Fu y su equipo aseguran que si los hackers aprendieran a aprovechar estos fallos de seguridad y crear archivos de audio de este tipo, en el futuro podr\u00edan existir ataques tan sofisticados como hacer que coches choquen en una autopista al reproducir una canci\u00f3n maliciosa en la radio.<\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\"><\/div>\n<div class=\"ad-instream--waypoint\" style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><strong>Fuente:<\/strong>\u00a0<a href=\"http:\/\/es.gizmodo.com\/logran-hackear-smartphones-usando-ondas-de-sonido-1793279716\" target=\"_blank\">Gizmodo<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Un equipo de investigadores de las universidades de Michigan y Carolina del Sur lograron hackear smartphones utilizando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio en dispositivos electr\u00f3nicos, y en el futuro coches.<\/p>\n","protected":false},"author":1,"featured_media":4808,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[56,3],"tags":[],"class_list":["post-4810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciencia","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Logran hackear smartphones usando ondas de sonido<\/title>\n<meta name=\"description\" content=\"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logran hackear smartphones usando ondas de sonido\" \/>\n<meta property=\"og:description\" content=\"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-15T19:25:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-15T19:43:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Logran hackear smartphones usando ondas de sonido\",\"datePublished\":\"2017-03-15T19:25:13+00:00\",\"dateModified\":\"2017-03-15T19:43:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\"},\"wordCount\":437,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png\",\"articleSection\":[\"Ciencia\",\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\",\"name\":\"Logran hackear smartphones usando ondas de sonido\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png\",\"datePublished\":\"2017-03-15T19:25:13+00:00\",\"dateModified\":\"2017-03-15T19:43:37+00:00\",\"description\":\"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png\",\"width\":500,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logran hackear smartphones usando ondas de sonido\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logran hackear smartphones usando ondas de sonido","description":"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/","og_locale":"en_US","og_type":"article","og_title":"Logran hackear smartphones usando ondas de sonido","og_description":"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2017-03-15T19:25:13+00:00","article_modified_time":"2017-03-15T19:43:37+00:00","og_image":[{"width":500,"height":300,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Logran hackear smartphones usando ondas de sonido","datePublished":"2017-03-15T19:25:13+00:00","dateModified":"2017-03-15T19:43:37+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/"},"wordCount":437,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png","articleSection":["Ciencia","Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/","name":"Logran hackear smartphones usando ondas de sonido","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png","datePublished":"2017-03-15T19:25:13+00:00","dateModified":"2017-03-15T19:43:37+00:00","description":"Logran hackear smartphones usando ondas de sonido, lo que podr\u00eda abrir las puertas a un sinf\u00edn de ataques maliciosos usando archivos de audio.","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/03\/hacksonido.png","width":500,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/logran-hackear-smartphones-usando-ondas-de-sonido-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Logran hackear smartphones usando ondas de sonido"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/4810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=4810"}],"version-history":[{"count":10,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/4810\/revisions"}],"predecessor-version":[{"id":4826,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/4810\/revisions\/4826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/4808"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=4810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=4810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=4810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}