{"id":19686,"date":"2023-02-01T13:27:37","date_gmt":"2023-02-01T13:27:37","guid":{"rendered":"https:\/\/news.lacnic.net\/?p=19686"},"modified":"2023-02-01T13:38:35","modified_gmt":"2023-02-01T13:38:35","slug":"study-by-lacnic-on-anti-spoofing-in-the-region","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/","title":{"rendered":"Study by LACNIC on Anti-spoofing in the Region"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/news.lacnic.net\/autor\/graciela-martinez\">Graciela Mart\u00ednez<\/a>, Head of LACNIC CSIRT<\/p>\n\n\n\n<p>A <a href=\"https:\/\/imasd.lacnic.net\/en\/ciberseguridad\/estudio-anti-spoofing-en-la-region\" target=\"_blank\" rel=\"noreferrer noopener\">study<\/a> on anti-spoofing conducted by LACNIC has identified weaknesses that need to be corrected for the proper implementation of good practices to mitigate IP spoofing in the networks of Latin American and Caribbean organizations.<\/p>\n\n\n\n<p>IP spoofing refers to the creation of IP packets with a false source IP address for the purpose of impersonating another computer system. This technique allows launching various types of cyberattacks, which can cause great harm to Internet infrastructure.<\/p>\n\n\n\n<p>The goal of this study was to improve the cybersecurity levels of the IP resources managed by LACNIC and to minimize the possible use of IP spoofing techniques to launch attacks on both Internet infrastructure and the networks of LACNIC member organizations.<\/p>\n\n\n\n<p>One of the keys to dealing with IP spoofing is to raise awareness and increase the visibility of its potential negative consequences. This is why we at LACNIC offer these tools and studies so that the community can address the issue.<\/p>\n\n\n\n<p>The work by LACNIC was based on data obtained from <a href=\"https:\/\/closedresolver.korlabs.io\" target=\"_blank\" rel=\"noreferrer noopener\">external sources<\/a> and shows that the percentage of networks that are vulnerable to inbound IP spoofing (traffic entering a network) is less than 20%.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"540\" src=\"https:\/\/news.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1.png\" alt=\"\" class=\"wp-image-19681\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1-300x179.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1-768x459.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n\n\n\n<p>As the image shows, Brazil, Chile, French Guyana, Peru, Uruguay, and Suriname are the countries with the lowest percentage of networks vulnerable to inbound IP spoofing, while Guyana, Paraguay, and Venezuela are the ones with the highest percentage of networks vulnerable to inbound IP spoofing.<\/p>\n\n\n\n<p><strong>Recommendations.<\/strong> The team at LACNIC analyzed the data and then implemented a series of actions to allow organizations to detect and mitigate this problem. The study details these recommendations.<\/p>\n\n\n\n<p>As a preview, faced with IP spoofing, we propose assessing the status of inbound traffic filtering (traffic entering a network from the Internet) and outbound traffic filtering (traffic that leaves a network towards the Internet) using the spoofer tool of the <a href=\"https:\/\/www.caida.org\/projects\/spoofer\/\" target=\"_blank\" rel=\"noreferrer noopener\">CAIDA Spoofer<\/a> project.<\/p>\n\n\n\n<p>The networks we tested show promising results with the correct implementation of the best practices associated with IP spoofing mitigation. However, a significant portion of the universe that is not taking action with regard to this problem is yet to be analyzed. Consequently, we believe it is important to conduct the tests and apply the best recommended practices.<\/p>\n\n\n\n<p>The statistics have provided LACNIC CSIRT with information that will allow the team to work directly with member organizations and reduce the risk that the resources they have been assigned will be used for malicious purposes.<\/p>\n\n\n\n<p>We hope this study will be the first step towards a significant increase in the networks that implement anti-spoofing techniques, and will therefore contribute to Internet security, stability, and resilience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez, Head of LACNIC CSIRT A study on anti-spoofing conducted by LACNIC has identified weaknesses that need to be corrected for the proper implementation of good practices to mitigate IP spoofing in the networks of Latin American and Caribbean organizations. IP spoofing refers to the creation of IP packets with a false source [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":19678,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345],"taxonomy-authors":[1242],"tipo_autor":[],"class_list":["post-19686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","taxonomy-authors-graciela-martinez-en"],"acf":{"author":"","related_notes":[16720]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region\" \/>\n<meta property=\"og:description\" content=\"By Graciela Mart\u00ednez, Head of LACNIC CSIRT A study on anti-spoofing conducted by LACNIC has identified weaknesses that need to be corrected for the proper implementation of good practices to mitigate IP spoofing in the networks of Latin American and Caribbean organizations. IP spoofing refers to the creation of IP packets with a false source [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T13:27:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-01T13:38:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Study by LACNIC on Anti-spoofing in the Region\",\"datePublished\":\"2023-02-01T13:27:37+00:00\",\"dateModified\":\"2023-02-01T13:38:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\"},\"wordCount\":448,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\",\"name\":\"LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"datePublished\":\"2023-02-01T13:27:37+00:00\",\"dateModified\":\"2023-02-01T13:38:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Study by LACNIC on Anti-spoofing in the Region\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region","og_description":"By Graciela Mart\u00ednez, Head of LACNIC CSIRT A study on anti-spoofing conducted by LACNIC has identified weaknesses that need to be corrected for the proper implementation of good practices to mitigate IP spoofing in the networks of Latin American and Caribbean organizations. IP spoofing refers to the creation of IP packets with a false source [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-02-01T13:27:37+00:00","article_modified_time":"2023-02-01T13:38:35+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Study by LACNIC on Anti-spoofing in the Region","datePublished":"2023-02-01T13:27:37+00:00","dateModified":"2023-02-01T13:38:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/"},"wordCount":448,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/","url":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/","name":"LACNIC Blog | Study by LACNIC on Anti-spoofing in the Region","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","datePublished":"2023-02-01T13:27:37+00:00","dateModified":"2023-02-01T13:38:35+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Study by LACNIC on Anti-spoofing in the Region"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":19673,"post_title":"Estudio de LACNIC sobre anti-spoofing en la regi\u00f3n","slug":"estudio-de-lacnic-sobre-anti-spoofing-en-la-region","href":"https:\/\/blog.lacnic.net\/estudio-de-lacnic-sobre-anti-spoofing-en-la-region\/"},{"locale":"pt_BR","id":19693,"post_title":"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o","slug":"estudo-do-lacnic-sobre-anti-spoofing-na-regiao","href":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=19686"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19686\/revisions"}],"predecessor-version":[{"id":19690,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19686\/revisions\/19690"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/16720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/19678"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=19686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=19686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=19686"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=19686"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=19686"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=19686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}