{"id":28094,"date":"2024-11-21T19:13:01","date_gmt":"2024-11-21T19:13:01","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28094"},"modified":"2024-11-21T19:25:58","modified_gmt":"2024-11-21T19:25:58","slug":"short-message-service-security-alternative-or-obsolete-technology","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/","title":{"rendered":"Short Message Service : Security Alternative or Obsolete Technology?"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/cesar-diaz\/\">C\u00e9sar D\u00edaz<\/a>, Head of Telecommunications Affairs at LACNIC<\/p>\n\n\n\n<p>In an increasingly digital world, security is no longer an option, but an essential responsibility. From our personal data to corporate and government information, the need to safeguard credentials and prevent unauthorized access is vital. In this landscape, a technology once considered obsolete, Short Message Service (SMS), has re-emerged as a basic component in digital security. Far from being just a messaging tool, SMS has established itself as an alternative for implementing two-factor authentication (2FA). Yet its use as a security measure inevitably raises the question: Is SMS truly reliable for 2FA?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>From basic messaging to essential security<\/strong><\/h2>\n\n\n\n<p>In its early days, SMS revolutionized mobile communications, allowing users to exchange text messages quickly and easily. During the 1990s and early 2000s, it dominated the communications landscape. However, with the advent of instant messaging and social media apps, SMS began to lose its prominence. What few anticipated was that, far from falling into oblivion, this technology would become an ally in digital security.<\/p>\n\n\n\n<p>Today, SMS is no longer merely a tool for personal communication \u2014 it has become a resource for authenticating and validating sensitive information. Companies and governments around the world have adopted SMS as a reliable channel that adds an extra layer of security to their platforms. From e-commerce to access credentials, SMS is now widely used to deliver verification codes, providing an additional barrier against cyberattacks. This function has positioned them as a critical resource in the fight against fraud and cyber threats.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28094\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/privacy-risks-of-blocking-internet-sites-via-url\/\">Privacy Risks of Blocking Internet Sites via URL<\/a><\/div><\/div><\/section>\n\n\n<h2 class=\"wp-block-heading\"><strong>Why does SMS remain relevant to security?<\/strong><\/h2>\n\n\n\n<p>Despite the development of more advanced technologies, there are several reasons why SMS remains an important tool in security:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Universal compatibility:<\/strong> SMS works on virtually all mobile phones, regardless of brand, operating system or age of the device. This makes it an accessible and universal option, as it caters to both users of the latest smartphones and those with more basic devices.<\/li>\n\n\n\n<li><strong>Ease of use:<\/strong> Unlike other authentication technologies, SMS does not require users to install additional applications or complex configurations. Anyone with a mobile phone can receive and use SMS to verify their identity, and this contributes to its widespread adoption, even in areas with low levels of digitalization.<\/li>\n\n\n\n<li><strong>Reliability in low-connectivity areas:<\/strong> SMS does not rely on the Internet, meaning it can operate in areas with limited or unstable connectivity. This makes it a particularly useful option in rural areas or during emergency situations.<\/li>\n\n\n\n<li><strong>Global accessibility:<\/strong> SMS knows no borders. SMS messages can be sent and received anywhere in the world, provided that there is interoperability between mobile messaging service providers, a topic we will expand on later.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The role of SMS in 2FA<\/strong><\/h2>\n\n\n\n<p>2FA is one of the most effective security mechanisms available today, and SMS plays a key role in this ecosystem. In SMS-based 2FA, users must complete two layers of verification before gaining access to an account or service. The first layer is typically a password, while the second is a temporary code or one-time password (OTP) sent via SMS to the user&#8217;s phone.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"870\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto-1024x870.png\" alt=\"\" class=\"wp-image-28078\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto-1024x870.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto-300x255.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto-388x330.png 388w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto-768x653.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-servicios-de-mensajes-seguro-u-obsoleto.png 1174w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This dual-layer verification drastically reduces the likelihood of an attacker accessing sensitive information, even if they manage to steal the user&#8217;s password. By relying on two different factors (something the user knows and something they possess) SMS adds an extra layer of protection against hacking, phishing, or unauthorized access attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Do SMS have 2FA vulnerabilities?<\/strong><\/h2>\n\n\n\n<p>While SMS-based two-factor authentication (2FA) is effective, it comes with significant risks and vulnerabilities that we should not ignore. A clear example is <strong>SIM swapping<\/strong>, as demonstrated by the 2019 attack on Jack Dorsey, co-founder of Twitter. Attackers managed to transfer his phone number to a SIM card under their control, allowing them to access his personal account. This incident shows just how devastating this type of attack can be, as a simple SIM change can compromise the security of sensitive accounts.<\/p>\n\n\n\n<p>Another major risk is <strong>SMS interception on insecure networks<\/strong>. In 2017 and 2018, vulnerabilities were discovered in Signaling System No. 7 (SS7), a protocol used by mobile networks to exchange information between operators. This decades-old protocol is essential for managing SMS authentication, routing, and transmission. In one notorious case in the United Kingdom in 2019, cybercriminals managed to intercept verification codes sent by banks to their customers, which allowed them to gain access to bank accounts and fraudulently transfer money.<\/p>\n\n\n\n<p>Lastly, <strong>social engineering<\/strong> techniques are a significant threat to SMS-based 2F. A common example involves WhatsApp, where cybercriminals attempt to access the victim&#8217;s account by sending a login request. In response to this request, WhatsApp sends a verification code to the user&#8217;s number via SMS. The attacker, posing as a friend or contact, then sends a message to the victim saying something like this:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"533\" height=\"341\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-servicios-de-mensajes-seguro-u-obsoleto.jpg\" alt=\"\" class=\"wp-image-28081\" style=\"width:400px\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-servicios-de-mensajes-seguro-u-obsoleto.jpg 533w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-servicios-de-mensajes-seguro-u-obsoleto-300x192.jpg 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-servicios-de-mensajes-seguro-u-obsoleto-516x330.jpg 516w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><\/figure>\n\n\n\n<p>If the victim falls into the trap and forwards the code, the attacker can take control of their WhatsApp account. This highlights how easily human trust can be exploited to compromise security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>So, is it safe to use SMS for 2FA?<\/strong><\/h2>\n\n\n\n<p>While SMS-based 2FA is less secure than other methods such as authenticator apps or physical keys, <strong>it is still significantly more robust than relying solely on a password<\/strong>. The key is to not rely exclusively on SMS, but to <strong>incorporate it into a broader, more advanced security strategy<\/strong>.<strong><\/strong><\/p>\n\n\n\n<p>In environments where more advanced methods are not feasible, SMS remains a valuable option due to its accessibility and ease of use. As long as security best practices are in place, SMS-based 2FA can offer an additional layer of protection, and this is better than having no extra protection at all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why am I not receiving SMS as part of 2FA?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>In certain circumstances, SMS used for two-factor authentication (2FA) may not be delivered. One of the main reasons for this is poor network coverage. High-traffic periods such as end-of-year holidays or Black Friday weekend can also lead to delays. These issues are compounded if message filters are enabled in the user&#8217;s device or if their inboxes are full, as in both these cases the reception of verification codes will be blocked.<\/p>\n\n\n\n<p>Another relevant factor is network infrastructure and its configuration by their operators. Routing failures in provider networks can lead to authentication messages being incorrectly classified as spam, affecting their delivery.<\/p>\n\n\n\n<p>Likewise, errors in the configuration of the SMPP (Short Message Peer-to-Peer) protocol, or restrictions imposed by certain applications, may temporarily block message delivery if users request multiple codes within a short period of time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Don&#8217;t underestimate the power of SMS in your digital security<\/strong><\/h2>\n\n\n\n<p>Despite the inherent risks, underestimating the value of SMS in digital security would be a mistake. In a world where cyber threats evolve constantly, every additional layer of protection is essential. <strong>While authenticator apps and physical keys are more secure and should be our first choice<\/strong>, SMS remains a basic security tool when these options are not viable.<\/p>\n\n\n\n<p>Two-factor authentication is not a luxury, it is a necessity. And while SMS does present some challenges, it remains an option for protecting sensitive information. Ultimately, every layer of security matters, and SMS continues to play a key role in safeguarding modern digital security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By C\u00e9sar D\u00edaz, Head of Telecommunications Affairs at LACNIC In an increasingly digital world, security is no longer an option, but an essential responsibility. From our personal data to corporate and government information, the need to safeguard credentials and prevent unauthorized access is vital. In this landscape, a technology once considered obsolete, Short Message Service [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28100,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[502],"tags":[1286],"archivo":[1345,1451],"taxonomy-authors":[1336],"tipo_autor":[],"class_list":["post-28094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-policy","tag-public-policy","archivo-editions","archivo-highlights-2023","taxonomy-authors-cesar-diaz-en"],"acf":{"author":"C\u00e9sar D\u00edaz","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?\" \/>\n<meta property=\"og:description\" content=\"By C\u00e9sar D\u00edaz, Head of Telecommunications Affairs at LACNIC In an increasingly digital world, security is no longer an option, but an essential responsibility. From our personal data to corporate and government information, the need to safeguard credentials and prevent unauthorized access is vital. In this landscape, a technology once considered obsolete, Short Message Service [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T19:13:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T19:25:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Short Message Service : Security Alternative or Obsolete Technology?\",\"datePublished\":\"2024-11-21T19:13:01+00:00\",\"dateModified\":\"2024-11-21T19:25:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\"},\"wordCount\":1197,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png\",\"keywords\":[\"Public Policy\"],\"articleSection\":[\"Public Policy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\",\"name\":\"LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png\",\"datePublished\":\"2024-11-21T19:13:01+00:00\",\"dateModified\":\"2024-11-21T19:25:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Short Message Service : Security Alternative or Obsolete Technology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?","og_description":"By C\u00e9sar D\u00edaz, Head of Telecommunications Affairs at LACNIC In an increasingly digital world, security is no longer an option, but an essential responsibility. From our personal data to corporate and government information, the need to safeguard credentials and prevent unauthorized access is vital. In this landscape, a technology once considered obsolete, Short Message Service [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-11-21T19:13:01+00:00","article_modified_time":"2024-11-21T19:25:58+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Short Message Service : Security Alternative or Obsolete Technology?","datePublished":"2024-11-21T19:13:01+00:00","dateModified":"2024-11-21T19:25:58+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/"},"wordCount":1197,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","keywords":["Public Policy"],"articleSection":["Public Policy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/","url":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/","name":"LACNIC Blog | Short Message Service : Security Alternative or Obsolete Technology?","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","datePublished":"2024-11-21T19:13:01+00:00","dateModified":"2024-11-21T19:25:58+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/short-message-service-security-alternative-or-obsolete-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Short Message Service : Security Alternative or Obsolete Technology?"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/seguridad-digital-sms-autenticacion-2fa-fiabilidad-shutterstock.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28076,"post_title":"Servicios de Mensajes Cortos: \u00bfAlternativa de Seguridad o Tecnolog\u00eda Obsoleta?","slug":"servicios-de-mensajes-cortos-alternativa-de-seguridad-o-tecnologia-obsoleta","href":"https:\/\/blog.lacnic.net\/servicios-de-mensajes-cortos-alternativa-de-seguridad-o-tecnologia-obsoleta\/"},{"locale":"pt_BR","id":28105,"post_title":"Servi\u00e7o de Mensagem Curta: alternativa de seguran\u00e7a ou tecnologia obsoleta?","slug":"servico-de-mensagem-curta-alternativa-de-seguranca-ou-tecnologia-obsoleta","href":"https:\/\/blog.lacnic.net\/pt-br\/servico-de-mensagem-curta-alternativa-de-seguranca-ou-tecnologia-obsoleta\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28094"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28094\/revisions"}],"predecessor-version":[{"id":28104,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28094\/revisions\/28104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28100"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28094"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28094"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28094"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}