{"id":8907,"date":"2016-03-18T08:39:13","date_gmt":"2016-03-18T14:39:13","guid":{"rendered":"http:\/\/la-uno.com\/blog\/?p=8907"},"modified":"2016-03-18T08:39:13","modified_gmt":"2016-03-18T14:39:13","slug":"los-ingenieros-de-apple-renunciarian-antes-de-hacer-backdoors-para-govtos","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2016\/03\/18\/los-ingenieros-de-apple-renunciarian-antes-de-hacer-backdoors-para-govtos\/","title":{"rendered":"Los ingenieros de Apple renunciar\u00edan antes de hacer backdoors para &#8216;GovtOS&#8217;"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full aligncenter\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/03\/GovtOS-Tim-Cook.jpg\" alt=\"\" \/><\/p>\n<p>Los ingenieros de Apple ser\u00edan la primera l\u00ednea de defensa si pierde el caso en contra del FBI y recibe la orden final de crear el &#8220;GovtOS&#8221;, una versi\u00f3n menos segura de iOS.<\/p>\n<p>De hecho algunos reportes dicen que si hay procedimientos legales en favor del gobierno y Apple est\u00e1 obligada a crear el software que las autoridades requieren, algunos empleados simplemente renunciaran para evitar tener que hacer lo que el CEO de Apple llama &#8220;El equivalente al cancer del Software&#8221;.<\/p>\n<p>El New York Times reporta que hay empleados de Apple discutiendo que suceder\u00eda si en la corte se pierde contra el FBI. Sus planes incluyen no hacer el trabajo, tomar tiempo de descanso por &#8220;enfermedad&#8221; o vacaciones, o, como ya se ha mencionado, renunciar.<\/p>\n<p>Considerando cu\u00e1ntas compa\u00f1\u00edas se han aliado con Apple, estamos seguros que cualquiera que escoja simplemente limpiar el escritorio e irse no le costar\u00e1 mucho encontrar un nuevo trabajo. Pero, no trabajaran en la gran nave espacial que Apple est\u00e1 construyendo \ud83d\ude09<\/p>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_8907\" class=\"pvc_stats all  \" data-element-id=\"8907\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Los ingenieros de Apple ser\u00edan la primera l\u00ednea de defensa si pierde el caso en contra del FBI y recibe la orden final de crear el &#8220;GovtOS&#8221;, una versi\u00f3n menos segura de iOS. De hecho algunos reportes dicen que si hay procedimientos legales en favor del gobierno y Apple est\u00e1 obligada a crear el software&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_8907\" class=\"pvc_stats all  \" data-element-id=\"8907\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":8909,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[50,37],"tags":[353,63,330],"class_list":["post-8907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple","category-seguridad","tag-ios","tag-iphone","tag-seguridad"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/03\/GovtOS-Tim-Cook.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-2jF","jetpack-related-posts":[{"id":8847,"url":"https:\/\/la-uno.com\/blog\/2016\/02\/18\/esta-es-la-razon-por-la-que-el-fbi-no-puede-desbloquear-el-iphone\/","url_meta":{"origin":8907,"position":0},"title":"Esta es la raz\u00f3n por la que el FBI no puede desbloquear el iPhone","author":"marco","date":"February 18, 2016","format":false,"excerpt":"Un juez de los estados unidos le ha ordenado a Apple ayudarle a entrar en un iPhone usado por uno de los asesinos en San Bernardino, California, y Apple se ha negado a obedecer. Pero la razon por la que el FBI no puede entrar en el iPhone sin la\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/img_4192-1.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":10762,"url":"https:\/\/la-uno.com\/blog\/2017\/11\/28\/grave-fallo-de-seguridad-en-macos-high-sierra-root-sin-pedir-contrasena-aqui-como-solucionarlo\/","url_meta":{"origin":8907,"position":1},"title":"Grave fallo de seguridad en macOS High Sierra, root sin pedir contrase\u00f1a!, aqui como solucionarlo","author":"marco","date":"November 28, 2017","format":false,"excerpt":"El sistema Operativo mas avanzado del mundo tiene un fallo de seguridad tan tonto que tumba por los suelos la afirmaci\u00f3n de ser el mas avanzado. macOS High Sierra tiene sus bases en UNIX, y como tal hace uso de los mecanimos de autenticaci\u00f3n y niveles de seguridad propios de\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10057,"url":"https:\/\/la-uno.com\/blog\/2017\/03\/13\/un-exploit-antiguo-del-iphone-permite-hacer-jailbreak-en-la-nintendo-switch\/","url_meta":{"origin":8907,"position":2},"title":"Un exploit antiguo del iPhone permite hacer Jailbreak en la Nintendo Switch","author":"marco","date":"March 13, 2017","format":false,"excerpt":"Aunque no se ha hecho el Jailbreak definitivo, se esta probando con un m\u00e9todo que originalmente se us\u00f3 para realizar el jailbreak al iPhone, usando la herramienta \"Pangu\". De ser posible, abrir\u00eda la posibilidad de instalar aplicaciones de terceros al Nintendo Switch. Aunque el Nintendo Switch no tiene un navegador\u2026","rel":"","context":"In &quot;Gaming&quot;","block_context":{"text":"Gaming","link":"https:\/\/la-uno.com\/blog\/category\/gaming\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/Nintendo-Switch-2-1.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7599,"url":"https:\/\/la-uno.com\/blog\/2015\/04\/28\/7599\/","url_meta":{"origin":8907,"position":3},"title":"Una nueva falla de seguridad\u2026","author":"marco","date":"April 28, 2015","format":false,"excerpt":"Una nueva falla de seguridad se ha descubierto, es de tipo XSS,\u00a0y afecta a la ultima versi\u00f3n de WordPress que desde el pasado jueves est\u00e1 disponible, la versi\u00f3n 4.2. Debido a esta falla que tambi\u00e9n afecta a las versiones anteriores, el atacante puede inyectar un c\u00f3digo JavaScript malicioso en los\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5625,"url":"https:\/\/la-uno.com\/blog\/2014\/11\/04\/subdominios-abandonados-representan-un-riesgo-de-seguridad-para-las-empresas\/","url_meta":{"origin":8907,"position":4},"title":"Subdominios abandonados representan un riesgo de seguridad para las empresas","author":"marco","date":"November 4, 2014","format":false,"excerpt":"Cuando las empresas olvidan desactivar los subdominios que ya no est\u00e1n siendo usados en sus servicios, \u00e9stas crean un vaci\u00f3 legal a explotar por los atacantes. Y debido a que muchos proveedores de servicios no validan correctamente la propiedad de los subdominios se\u00f1alados en sus servidores, los atacantes pueden crear\u2026","rel":"","context":"In &quot;Certificados&quot;","block_context":{"text":"Certificados","link":"https:\/\/la-uno.com\/blog\/category\/certificados\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11082,"url":"https:\/\/la-uno.com\/blog\/2018\/04\/10\/steve-wozniak-dejara-de-usar-facebook-eres-el-producto\/","url_meta":{"origin":8907,"position":5},"title":"Steve Wozniak dejar\u00e1 de usar Facebook &#8220;Eres el producto&#8221;","author":"marco","date":"April 10, 2018","format":false,"excerpt":"No es muy dif\u00edcil de entender, si alguien no te cobra por un servicio o producto.. es porque tu eres el producto, o ustedes creen que les dan las muestras \"gratis\" en el super solo por compartir?, aunque hay que tomar las cosas con un poco de sal. \u201cLos usuarios\u2026","rel":"","context":"In &quot;Facebook&quot;","block_context":{"text":"Facebook","link":"https:\/\/la-uno.com\/blog\/category\/facebook\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/MW-GG976_woz_ZG_20180409054941.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/MW-GG976_woz_ZG_20180409054941.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/MW-GG976_woz_ZG_20180409054941.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/MW-GG976_woz_ZG_20180409054941.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/MW-GG976_woz_ZG_20180409054941.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=8907"}],"version-history":[{"count":2,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8907\/revisions"}],"predecessor-version":[{"id":8910,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8907\/revisions\/8910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/8909"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=8907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=8907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=8907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}