{"id":1675,"date":"2014-09-20T12:44:28","date_gmt":"2014-09-20T18:44:28","guid":{"rendered":"http:\/\/la-uno.com\/blog\/?p=1675"},"modified":"2015-02-18T14:46:20","modified_gmt":"2015-02-18T20:46:20","slug":"android_l_activara_la_encriptacion_por_defecto","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2014\/09\/20\/android_l_activara_la_encriptacion_por_defecto\/","title":{"rendered":"Android L activar\u00e1 la encriptaci\u00f3n por defecto"},"content":{"rendered":"<p><a href=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/Android-security-631x439.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1676\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/Android-security-631x439.jpg\" alt=\"Android-security-631x439\" width=\"631\" height=\"439\" srcset=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/Android-security-631x439.jpg 631w, https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/Android-security-631x439-300x208.jpg 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/a><\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\">Android L, una vez que sea liberado, vendr\u00e1 con la encriptaci\u00f3n de datos activada por defecto. Esta informaci\u00f3n ha sido revelada por Niki Christoff, vocera de Google. Y haciendo esto, la compa\u00f1ia de Mountain View esta uniendose a Apple en la batalla por la privacidad y la seguridad.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\"><strong>La encriptaci\u00f3n de datos no es algo nuevo en Android<\/strong>. ha estado ah\u00ed desde 2011, pero con la siguiente versi\u00f3n de Android que se espera que sea el pr\u00f3ximo mes, Google va a agregar procedimientos para hacer que la encriptaci\u00f3n sea autom\u00e1tica. Esto significa que solo los usuarios que introduzcan correctamente la contrase\u00f1a del dispositivo van a poder escuchar m\u00fasica, ver videos o ver las fotos en el dispositivo cuando lo conecten a una computadora sea accedido de forma manual.<\/p>\n<blockquote>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\">Por m\u00e1s de tres a\u00f1os Android ha ofrecido encriptaci\u00f3n, y las llaves no se almacenan en el dispositivo as\u00ed que no pueden ser compartidas. Como parte de nuestra pr\u00f3xima liberaci\u00f3n de Android, la encriptaci\u00f3n estar\u00e1 activada por defecto, as\u00ed\u00a0que no tendr\u00e1n que preocuparse por encenderla.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\">-Vocera de Google Niki Christoff<\/p>\n<\/blockquote>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\">Este movimiento por parte de Google no deber\u00eda de sorprendernos, es una respuesta a las acciones de Apple, ya que iOS 8 ofrece protecci\u00f3n similar por defecto. Amabas compa\u00f1\u00edas han abrazado una forma de encriptaci\u00f3n que en muchos de los casos har\u00e1 m\u00e1s dif\u00edcil o imposible que las autoridades colecten informaci\u00f3n de los dispositivos.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; color: #222222; letter-spacing: 0px; font-style: normal; font-variant: normal; font-weight: normal; font-size: 12px; line-height: 19px; font-family: Verdana, Arial, sans-serif;\">A\u00fan falta ver como este tipo de encriptaci\u00f3n afectar\u00e1 el desarrollo de apps de Android. TWRP soporta dispositivos encriptados, as\u00ed que flashear un ZIP a\u00fan deber\u00eda ser posible. Esperemos que Google no cambie los m\u00e9todos de encriptaci\u00f3n y solo activen la opci\u00f3n por defecto.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1675\" class=\"pvc_stats all  \" data-element-id=\"1675\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Android L, una vez que sea liberado, vendr\u00e1 con la encriptaci\u00f3n de datos activada por defecto. Esta informaci\u00f3n ha sido revelada por Niki Christoff, vocera de Google. Y haciendo esto, la compa\u00f1ia de Mountain View esta uniendose a Apple en la batalla por la privacidad y la seguridad. La encriptaci\u00f3n de datos no es algo&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1675\" class=\"pvc_stats all  \" data-element-id=\"1675\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[45,46,37],"tags":[],"class_list":["post-1675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-google-2","category-seguridad"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/Android-security-631x439.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-r1","jetpack-related-posts":[{"id":8193,"url":"https:\/\/la-uno.com\/blog\/2015\/07\/30\/windows-10-tiene-serios-problemas-de-seguridad-con-microsoft\/","url_meta":{"origin":1675,"position":0},"title":"Windows 10 tiene serios problemas de seguridad&#8230; con Microsoft","author":"marco","date":"July 30, 2015","format":false,"excerpt":"Microsoft Windows 10, la versi\u00f3n mas reciente del sistema operativo para escritorio ha llegado\u00a0y con ello el escrutinio por parte de los usuarios t\u00e9cnicos y no t\u00e9cnicos, sobre todo de los \"legales\". La cosa esta as\u00ed: Microsoft Windows 10 viene con una licencia de uso como cualquier otro sistema operativo\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/la-uno.com\/blog\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":8815,"url":"https:\/\/la-uno.com\/blog\/2016\/01\/22\/whatsapp-comenzara-a-compartir-tu-informacion-con-facebook\/","url_meta":{"origin":1675,"position":1},"title":"WhatsApp comenzar\u00e1 a compartir tu informaci\u00f3n con Facebook","author":"marco","date":"January 22, 2016","format":false,"excerpt":"WhatsApp hizo a millones de usuarios felices al anunciar que eliminar\u00e1 el pago de suscripci\u00f3n anual, pero su siguiente movida tal vez no sea tan popular. De acuerdo a una opci\u00f3n oculta en la \u00faltima versi\u00f3n beta de WhatsApp para Android, el servicio planea compartir tus datos de usuario con\u2026","rel":"","context":"In &quot;Android&quot;","block_context":{"text":"Android","link":"https:\/\/la-uno.com\/blog\/category\/mobile\/android\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/01\/WhatsApp-Facebook-data-sharing-and-encryption-840x413.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/01\/WhatsApp-Facebook-data-sharing-and-encryption-840x413.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/01\/WhatsApp-Facebook-data-sharing-and-encryption-840x413.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/01\/WhatsApp-Facebook-data-sharing-and-encryption-840x413.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":9045,"url":"https:\/\/la-uno.com\/blog\/2016\/06\/11\/imessage-pronto-estara-disponible-para-android\/","url_meta":{"origin":1675,"position":2},"title":"iMessage pronto estar\u00e1 disponible para Android","author":"marco","date":"June 11, 2016","format":false,"excerpt":"\u00a0 La plataforma de mensajer\u00eda de Apple pronto estar\u00e1 disponible en otros productos que nosean de Apple. iMessage har\u00e1 su aparici\u00f3n como app para Android de acuerdo a una fuente familiar de la empresa. Si esto es verdad, WhatsApp la nueva aplicaci\u00f3n de mensajer\u00eda de Google\u00a0\"Allo\" deber\u00edan estar pensando en\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/06\/samsung_messages.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6141,"url":"https:\/\/la-uno.com\/blog\/2015\/02\/20\/pcs-de-lenovo-incluyen-adware-que-permite-ataques-man-in-the-middle\/","url_meta":{"origin":1675,"position":3},"title":"PCs de Lenovo incluyen adware que permite ataques &#8220;Man in the middle&#8221;","author":"marco","date":"February 20, 2015","format":false,"excerpt":"Lenovo est\u00e1 vendiendo computadoras que vienen con un adware pre-instalado que piratea la sesiones web encriptadas y que hace que los usuarios sean vulnerables a ataques \"Man in the middle\". La parte critica es que Lenovo distribuye sus equipos con este adware de la compa\u00f1\u00eda \"Superfish\". Este adware inyecta publicidad\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"man-in-the-middle-640x316","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/man-in-the-middle-640x316.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/man-in-the-middle-640x316.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/man-in-the-middle-640x316.png?resize=525%2C300 1.5x"},"classes":[]},{"id":8847,"url":"https:\/\/la-uno.com\/blog\/2016\/02\/18\/esta-es-la-razon-por-la-que-el-fbi-no-puede-desbloquear-el-iphone\/","url_meta":{"origin":1675,"position":4},"title":"Esta es la raz\u00f3n por la que el FBI no puede desbloquear el iPhone","author":"marco","date":"February 18, 2016","format":false,"excerpt":"Un juez de los estados unidos le ha ordenado a Apple ayudarle a entrar en un iPhone usado por uno de los asesinos en San Bernardino, California, y Apple se ha negado a obedecer. Pero la razon por la que el FBI no puede entrar en el iPhone sin la\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3058,"url":"https:\/\/la-uno.com\/blog\/2014\/09\/25\/fallo-de-seguridad-en-bash-deja-a-linux-unix-os-x-y-otros-vulnerables\/","url_meta":{"origin":1675,"position":5},"title":"Fallo de seguridad en BASH deja a Linux, Unix, OS X y otros vulnerables","author":"marco","date":"September 25, 2014","format":false,"excerpt":"\u00a0 Ayer se anunci\u00f3 un problema de seguridad que tiene BASH\u00a0una terminal en Unix y sistemas operativos compatibles con\u00a0POSIX\u00a0y que es la terminal por defecto de muchas distribuciones de Linux e incluso cuando no est\u00e1 por defecto viene instalada. Y es que BASH es la terminal mas popular en Unix.\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/1675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=1675"}],"version-history":[{"count":1,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/1675\/revisions"}],"predecessor-version":[{"id":1697,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/1675\/revisions\/1697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/1676"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=1675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=1675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=1675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}