{"id":9460,"date":"2017-11-30T14:18:36","date_gmt":"2017-11-30T14:18:36","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news?p=9460"},"modified":"2017-12-01T16:09:38","modified_gmt":"2017-12-01T16:09:38","slug":"protocol-changes-to-improve-privacy-and-security","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/","title":{"rendered":"Protocol Changes to Improve Privacy and Security"},"content":{"rendered":"<p>In recent years, major advances have been introduced to the protocols that underpin the Internet. Many of these modifications were developed to guarantee information security and to increase privacy, two aspects that had not been addressed in the original protocol specifications.<\/p>\n<p>During the recent LACNIC meeting held in Montevideo, a session was organized where experts discussed the most important of these changes, particularly those involving DNS, BGP and IPv6.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/UMdH1zSx37c\" width=\"100%\" height=\"340\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><strong>IPv6 at Home. <\/strong>Expert Jordi Palet noted that the IPv6 standardization process has brought about notorious improvements in terms of security, adding that one of these improvements allows optimizing data center traffic. \u201cThis is new compared to IPv4, where there is no such flow label,\u201d said Palet.<\/p>\n<p>According to Palet, this improvement aimed at load balancing \u2014\u00a0which is not possible in IPv4\u00a0\u2014 will not necessarily lead to improved functionality but may lower datacenter costs.<\/p>\n<p>Another thing worth highlighting in recent years is the standardization of DNS servers: with IPv6 they can be configured without the need for a DHCP server, while with IPv4 they must be configured manually or using a DHCP server.<\/p>\n<p>Another aspect of IPv6 standards highlighted by Palet is that a lot of the work required for the Internet of Things (IoT) no longer makes sense in IPv4. As an example, he mentioned the Homenet protocol. \u201cOur home networks will become increasingly complex; in addition to a router, we will have more wi-fi networks, connected devices and so on. With IPv4, these require manual configuration, while with IPv6 these connections are automated,\u201d noted Palet. The Homenet protocol allows wi-fi networks to talk to each other for self-configuration purposes. \u201cInstead of having a single provider, Homenet also makes it possible to have a backup provider so your home will never be disconnected. It&#8217;s just like having two electrical power sources: you can automatically use one or the other,\u201d added Palet.<\/p>\n<p><strong>More privacy and robustness.<\/strong> In turn, LACNIC CTO Carlos Mart\u00ednez commented that the IETF is currently working on improvements to the DNS, one of the key components of the Internet. Mart\u00ednez said that this work on improving the DNS is seeking to increase its resistance to abuse and attacks, improve the security features of the DNS, and connect users with content networks located closer to them.<\/p>\n<p>Mart\u00ednez pointed out that they are working so that all the information contained in the DNS \u2014\u00a0which is public\u00a0\u2014 will be less exposed and more compartmentalized in order to mitigate the risk of having large servers with huge amounts of information.<\/p>\n<p>To protect this level of information, among other things, Mart\u00ednez noted that IETF RFC 7816 has been published, which minimizes the information that a user discloses to each level in the DNS tree. \u201cQuery each hierarchy level about what it can actually answer. You are revealing less information than before. The solution to this kind of issues cannot be found in a single place,\u201d stressed Mart\u00ednez.<\/p>\n<p>The next step is to work on secure transport for DNS, how to encrypt DNS. Mart\u00ednez observed that five systems are being analyzed. One of them consists of using the same encryption technology as https (the one with the lock icon), but this is an expensive solution. \u201cThis technology can be implemented at small scale,\u201d said Mart\u00ednez.<\/p>\n<p>Standardization work is also being done to improve access to content distribution. \u201cWhich cache server is closest to your location? Closest in terms of network distance, of latency. One way to detect this is through the user&#8217;s IP address. One of the proposals under discussion is to send the client&#8217;s information (all of the client&#8217;s data) when a DNS query is received, as this helps determine which is the closest cache server,\u201d said Mart\u00ednez.<\/p>\n<p><strong>Modernizing BGP.<\/strong> Guillermo Cicileo, responsible for LACNIC&#8217;s Internet Security and Stability Program, spoke about the improvements to BGP, the Internet routing system.<\/p>\n<p>BGP routing makes it possible to know how to reach a certain IP. \u201cIt&#8217;s like an Internet GPS,\u201d said Cicileo.<\/p>\n<p>Conceived in the 80s and 90s when the Internet was collaborative and used for research, BGP has security vulnerabilities that are now being addressed.<\/p>\n<p>The current challenges for BGP include dealing with attacks against the routing system (i.e. when an unauthorized person publishes false information on the BGP and redirects traffic), configuration errors or publishing routing information that should not be published.<\/p>\n<p>To solve the issue of these attacks, work is being done on RPKI.<\/p>\n<p>\u201cRPKI is used not only for validation, but also to authorize routing databases or the automatic construction of filters which can benefit Internet operators,\u201d said Cicileo.<\/p>\n<p>BGPsec, a protocol based on RPKI, has also been developed to improve BGP verification mechanisms, although for now it has not seen large-scale adoption.<\/p>\n<p>As for the prevention of information leaks, techniques are being developed to keep everything from being announced (e.g. RFC 8212) and to avoid leaks.<\/p>\n<p>Cicileo observed that \u201cwhat BGP learned about a peer, it announced to other neighbors. Now (with RFC 8212) an explicit policy must be defined for such data to be published, as publishing occurs only when instructed. This avoids configuration errors.\u201d<\/p>\n<p>This mechanism will help reduce configuration errors as well as routing information, thus attacking another problem which is route hijacking.<\/p>\n<p>Finally, Cicileo commented that BGP is being used in mass or large-scale datacenters (hundreds of thousands of servers), as it has several advantages such as the possibility of being the only routing protocol in the datacenter, plus lower complexity, increased stability and greater control over routing information (see RFC7938).<\/p>\n<p>\u201cBGP can carry hundreds of thousands of routes and has proven efficiency on the Internet,\u201d concluded Cicileo.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, major advances have been introduced to the protocols that underpin the Internet. Many of these modifications were developed to guarantee information security and to increase privacy, two aspects that had not been addressed in the original protocol specifications. During the recent LACNIC meeting held in Montevideo, a session was organized where experts [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9565,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[531],"tags":[416,1304],"archivo":[1345,798],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-9460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6","tag-dns-en","tag-ipv6","archivo-editions","archivo-november-2017-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Protocol Changes to Improve Privacy and Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Protocol Changes to Improve Privacy and Security\" \/>\n<meta property=\"og:description\" content=\"In recent years, major advances have been introduced to the protocols that underpin the Internet. Many of these modifications were developed to guarantee information security and to increase privacy, two aspects that had not been addressed in the original protocol specifications. During the recent LACNIC meeting held in Montevideo, a session was organized where experts [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-30T14:18:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-12-01T16:09:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Protocol Changes to Improve Privacy and Security\",\"datePublished\":\"2017-11-30T14:18:36+00:00\",\"dateModified\":\"2017-12-01T16:09:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\"},\"wordCount\":946,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png\",\"keywords\":[\"DNS\",\"IPv6\"],\"articleSection\":[\"IPv6\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\",\"name\":\"LACNIC Blog | Protocol Changes to Improve Privacy and Security\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png\",\"datePublished\":\"2017-11-30T14:18:36+00:00\",\"dateModified\":\"2017-12-01T16:09:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protocol Changes to Improve Privacy and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Protocol Changes to Improve Privacy and Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Protocol Changes to Improve Privacy and Security","og_description":"In recent years, major advances have been introduced to the protocols that underpin the Internet. Many of these modifications were developed to guarantee information security and to increase privacy, two aspects that had not been addressed in the original protocol specifications. During the recent LACNIC meeting held in Montevideo, a session was organized where experts [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2017-11-30T14:18:36+00:00","article_modified_time":"2017-12-01T16:09:38+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Protocol Changes to Improve Privacy and Security","datePublished":"2017-11-30T14:18:36+00:00","dateModified":"2017-12-01T16:09:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/"},"wordCount":946,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","keywords":["DNS","IPv6"],"articleSection":["IPv6"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/","url":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/","name":"LACNIC Blog | Protocol Changes to Improve Privacy and Security","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","datePublished":"2017-11-30T14:18:36+00:00","dateModified":"2017-12-01T16:09:38+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/protocol-changes-to-improve-privacy-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Protocol Changes to Improve Privacy and Security"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2017\/11\/lacnic28.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":9456,"post_title":"Cambios en los protocolos para mejorar privacidad y seguridad","slug":"cambios-en-los-protocolos-para-mejorar-privacidad-y-seguridad","href":"https:\/\/blog.lacnic.net\/cambios-en-los-protocolos-para-mejorar-privacidad-y-seguridad\/"},{"locale":"pt_BR","id":9463,"post_title":"Mudan\u00e7as nos protocolos para melhorar privacidade e seguran\u00e7a","slug":"mudancas-nos-protocolos-para-melhorar-privacidade-e-seguranca","href":"https:\/\/blog.lacnic.net\/pt-br\/mudancas-nos-protocolos-para-melhorar-privacidade-e-seguranca\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/9460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=9460"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/9460\/revisions"}],"predecessor-version":[{"id":9616,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/9460\/revisions\/9616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/9565"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=9460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=9460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=9460"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=9460"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=9460"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=9460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}