{"id":14070,"date":"2020-10-07T19:58:26","date_gmt":"2020-10-07T19:58:26","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=14070"},"modified":"2021-05-26T14:12:40","modified_gmt":"2021-05-26T14:12:40","slug":"the-overwhelming-challenge-of-safeguarding-internet-security-and-operation","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/","title":{"rendered":"The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation"},"content":{"rendered":"\n<p>Three key and inherently vulnerable systems underpin all activities on the Internet:&nbsp;the addressing, routing and domain name systems. Safeguarding their security and operation is essential and the future of the Internet depends on successfully overcoming this \u201coverwhelming challenge,\u201d Kimberly C. Claffy stressed in her keynote presentation at LACNIC 34 LACNOG 2020.<\/p>\n\n\n\n<p>Also known as KC Claffy, the founder and director of CAIDA (Center for Applied Internet Data Analysis) at the University of San Diego (USA) and Internet Hall of Fame inductee stressed the importance of Internet traffic measurements and estimates for meeting the challenge.<\/p>\n\n\n\n<p>KC Claffy understands that solving underlying vulnerabilities requires not only overcoming technical difficulties, but also non-technical barriers and the complexity and costs of a global Internet. These properties are not compatible with the pressures exerted by a competitive ecosystem or, in some cases, by governments that have other incentives to address infrastructure security issues.<\/p>\n\n\n\n<p>\u201cOur suggested approach does not consist of building more or focusing specifically on changes to existing protocols. Instead, our proposed solutions involve understanding current behaviors and using this data to inform practices that can later be enforced,\u201d the expert explained.<\/p>\n\n\n\n<p><strong>Best practices<\/strong>. Claffy commented that great efforts have been made to produce security standards and that these efforts are summarized in a set of best practices (MANRS) which are detailed in the code of conduct. \u201cWe help by complying with the code of conduct. What we&#8217;ve now found, however, is that those who claimed to be following our code of conduct weren&#8217;t actually doing so, and this turned out to be a problem,\u201d KC added.<\/p>\n\n\n\n<p>For this reason, CAIDA conducted a study via measurements to determine whether these best practices were being followed. \u201cWe developed a project that would create a cycle of continuous improvement. One-time measurements are important, but in order to characterize abnormal behaviors, detect suspicious behaviors and develop new rules \u2013&nbsp;because rules can also change over time&nbsp;\u2013 measurements must be continuous,\u201d she added.<\/p>\n\n\n\n<p>\u201cAt the core is the fact that we are trying to change the security landscape by moving from reactive to creative actions, as in the end we need to treat the Internet as social infrastructure.\u201d<\/p>\n\n\n\n<p><strong>Freedom vs censorship<\/strong>. According to Claffy, measuring the Internet may be the only way to monitor attempts to curb our rights and freedoms. \u201cOne of the challenges of Internet science is the existence of many false positives. There is a lot of noise on the Internet which is difficult to interpret properly without validating what is actually going on, especially in terms of the right to access to information.\u201d<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/EZaOJEJzQBE\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n\n\n\n<p><strong>Real world.<\/strong> Claffy concluded that the road to increased security does not involve proposals for making global changes to Internet protocols, but rather finding operational practices that the different regions can implement to improve their security profiles.<\/p>\n\n\n\n<p>She then proposed a way to develop and evolve these operational practices. \u201cOur approach requires leveraging existing data sources, including the data collected by the RIRs, to support scientifically reproducible data analyses that can identify ongoing security threats, assess proposed mitigations, and track improvements.\u201d<\/p>\n\n\n\n<p>She suggested the possibility of using this knowledge to cultivate an international community based on disciplines that include law and economics to develop and socialize operational practices that can prevent or mitigate vulnerabilities.<\/p>\n\n\n\n<p>To conclude, she noted that this process will create an open knowledge network that will integrate relevant data, software tools and experiences related to these Internet systems, and will relate the data to real world entities, risks and damages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three key and inherently vulnerable systems underpin all activities on the Internet:&nbsp;the addressing, routing and domain name systems. Safeguarding their security and operation is essential and the future of the Internet depends on successfully overcoming this \u201coverwhelming challenge,\u201d Kimberly C. Claffy stressed in her keynote presentation at LACNIC 34 LACNOG 2020. Also known as KC [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[501],"tags":[],"archivo":[960],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-14070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","archivo-september-2020-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation\" \/>\n<meta property=\"og:description\" content=\"Three key and inherently vulnerable systems underpin all activities on the Internet:&nbsp;the addressing, routing and domain name systems. Safeguarding their security and operation is essential and the future of the Internet depends on successfully overcoming this \u201coverwhelming challenge,\u201d Kimberly C. Claffy stressed in her keynote presentation at LACNIC 34 LACNOG 2020. Also known as KC [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-07T19:58:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-26T14:12:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation\",\"datePublished\":\"2020-10-07T19:58:26+00:00\",\"dateModified\":\"2021-05-26T14:12:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg\",\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\",\"name\":\"LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg\",\"datePublished\":\"2020-10-07T19:58:26+00:00\",\"dateModified\":\"2021-05-26T14:12:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation","og_description":"Three key and inherently vulnerable systems underpin all activities on the Internet:&nbsp;the addressing, routing and domain name systems. Safeguarding their security and operation is essential and the future of the Internet depends on successfully overcoming this \u201coverwhelming challenge,\u201d Kimberly C. Claffy stressed in her keynote presentation at LACNIC 34 LACNOG 2020. Also known as KC [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2020-10-07T19:58:26+00:00","article_modified_time":"2021-05-26T14:12:40+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","type":"image\/jpeg"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation","datePublished":"2020-10-07T19:58:26+00:00","dateModified":"2021-05-26T14:12:40+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/"},"wordCount":592,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","articleSection":["Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/","url":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/","name":"LACNIC Blog | The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","datePublished":"2020-10-07T19:58:26+00:00","dateModified":"2021-05-26T14:12:40+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/the-overwhelming-challenge-of-safeguarding-internet-security-and-operation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"The \u201cOverwhelming Challenge\u201d of Safeguarding Internet Security and Operation"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/10\/keynote-lacnic34.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":14072,"post_title":"El \u201cabrumador desaf\u00edo\u201d de salvaguardar la seguridad y funcionamiento de Internet","slug":"el-abrumador-desafio-de-salvaguardar-la-seguridad-y-funcionamiento-de-internet","href":"https:\/\/blog.lacnic.net\/el-abrumador-desafio-de-salvaguardar-la-seguridad-y-funcionamiento-de-internet\/"},{"locale":"pt_BR","id":14064,"post_title":"O \u201cexaustivo desafio\u201d de salvaguardar a seguran\u00e7a e o funcionamento da Internet","slug":"o-exaustivo-desafio-de-salvaguardar-a-seguranca-e-o-funcionamento-da-internet","href":"https:\/\/blog.lacnic.net\/pt-br\/o-exaustivo-desafio-de-salvaguardar-a-seguranca-e-o-funcionamento-da-internet\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/14070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=14070"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/14070\/revisions"}],"predecessor-version":[{"id":14071,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/14070\/revisions\/14071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/14066"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=14070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=14070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=14070"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=14070"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=14070"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=14070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}