{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/en\/","title":"LACNIC Blog | Legislative Landscape of Cryptography in the Southern Cone","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"awgnb7Akn3\"><a href=\"https:\/\/blog.lacnic.net\/en\/legislative-landscape-of-cryptography-in-the-southern-cone\/\">Legislative Landscape of Cryptography in the Southern Cone<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/en\/legislative-landscape-of-cryptography-in-the-southern-cone\/embed\/#?secret=awgnb7Akn3\" width=\"600\" height=\"338\" title=\"&#8220;Legislative Landscape of Cryptography in the Southern Cone&#8221; &#8212; LACNIC Blog\" data-secret=\"awgnb7Akn3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/evolucion-cifrado-y-seguridad-digital.png","thumbnail_width":680,"thumbnail_height":330,"description":"By Thobias Prado Moura With the advancement of technology, cryptography has significantly evolved to become a pillar of information security and an important tool in guaranteeing the privacy of communications, as well as in securing financial transactions and authenticating digital documents. Due to its relevance, cryptography has become the focus of regulatory debates, particularly concerning [&hellip;]"}