<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Gorayii | Raicelys Gómez</title>
        <link>https://paragraph.com/@gorayii</link>
        <description>System Engineer | Content Creator | Web3 Builder | Lover of technology, videogames and photography | Apple fan | ⚡️gorayii@getalby.com</description>
        <lastBuildDate>Tue, 14 Apr 2026 18:13:07 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Gorayii | Raicelys Gómez</title>
            <url>https://storage.googleapis.com/papyrus_images/a4cfbafdb9e98ca2b2c6a0e860b4efe8.jpg</url>
            <link>https://paragraph.com/@gorayii</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[¿Por qué debo actualizarlo todo? | Seguridad Informática]]></title>
            <link>https://paragraph.com/@gorayii/updateandupgrade</link>
            <guid>jE6xRWZedmrgeJQ5lN9G</guid>
            <pubDate>Fri, 31 May 2024 11:29:55 GMT</pubDate>
            <description><![CDATA[Una recomendación que resuena con insistencia en el mundo de la ciberseguridad es la de mantener el software actualiz...]]></description>
            <content:encoded><![CDATA[<figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3d2a6249b9bfbab27a5031094c0f627d.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h1 id="h-por-que-debo-actualizarlo-todo"><strong>¿Por qué debo actualizarlo todo?</strong></h1></div><p style="text-align: justify">Una recomendación que resuena con insistencia en el mundo de la ciberseguridad es la de <strong>mantener el software actualizado</strong>. Pero, ¿alguna vez te has preguntado por qué es tan crucial?</p><p style="text-align: justify">Cuando escuchamos <strong>“actualizaciones”</strong>, nuestra mente a menudo vuela hacia la idea de un <strong><em>upgrade</em></strong> del sistema: una transformación completa que nos trae una versión más reciente del software, con una experiencia de usuario renovada, una interfaz gráfica que nos da la bienvenida con su nueva cara, y un abanico de funciones inéditas que prometen facilitarnos la vida.</p><p style="text-align: justify">No obstante, hay algo más profundo y vital en estas actualizaciones, especialmente desde la perspectiva de la seguridad informática. Aquí, la exhortación a actualizar no se refiere tanto a un <strong><em>upgrade</em></strong> profundo, sino más bien a un <strong><em>update,</em></strong> una actualización menor, pero no por ello menos importante. Estos <strong><em>updates</em></strong> son los héroes anónimos que pueden apuntar a mejorar el rendimiento y, lo que es más crucial, reparar esos fallos, errores y vulnerabilidades que han sido descubiertos acechando en las sombras.</p><p style="text-align: justify">Recientemente, les contaba sobre los <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/si-eres-usuario-ios-esto-te-interesa-y-si-eres-usuario-android-tambin-zeroclick-zeroday-"><strong><em>exploits zero-day</em></strong></a>: esos momentos de tensión en los que un atacante explota una brecha de seguridad aún desconocida para lanzar sus ataques. La contramedida de los fabricantes y desarrolladores ante estos asedios sorpresivos es, justamente, un parche o actualización. Estos parches, aunque ligeros y rápidos, son poderosos: su misión es sellar esas brechas de seguridad antes expuestas y proteger nuestro mundo digital. De ahí la importancia de mantener nuestros sistemas en constante vigilancia y actualizados.</p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-why-i-need-to-update-everything"><strong>Why I need to update everything?</strong></h3></div><p style="text-align: justify">A recommendation that echoes persistently in the world of cybersecurity is to <strong>keep software updated</strong>. But have you ever wondered why it’s so crucial?<br><br>When we hear <strong>“updates,”</strong> our minds often leap to the idea of a system <strong><em>upgrade</em></strong>: a complete transformation that brings us a newer version of the software, with a refreshed user experience, a graphical interface welcoming us with its new look, and a range of novel features that promise to make our lives easier.<br><br>However, there’s something deeper and more vital in these updates, especially from the perspective of computer security. Here, the call to update refers not so much to a profound <strong><em>upgrade</em></strong> but rather to an update—a minor <strong><em>update</em></strong>, but no less significant. These updates are the anonymous heroes that aim to improve performance and, more crucially, repair those flaws, errors, and vulnerabilities that have been lurking in the shadows.<br><br>I recently told you about <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/si-eres-usuario-ios-esto-te-interesa-y-si-eres-usuario-android-tambin-zeroclick-zeroday-"><strong><em>zero-day exploits</em></strong></a>: those tense moments when an attacker exploits an undetected security breach to launch their attacks. The countermeasure from software developers against these surprise sieges is precisely a patch or update. These patches, though light and quick, are powerful: their mission is to seal those previously exposed security gaps and protect our digital world. Hence the importance of keeping our systems under constant surveillance and updated.</p></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6f87634df5bde194ad8e308f4da59d50.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ae1827ac996e0d3b82ed625554f81d5b.jpg" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAIAAAD8GO2jAAAACXBIWXMAAAsTAAALEwEAmpwYAAALiklEQVR4nC2WeVDTZxrHHwRFzvySX+4bQki4AkIOlCBCBAIhEGgSCBKJgaRJDBSihBCTcJ+CXPGAiNBSsWJZW6201EJdV3usg3vVbnfd6e7sdreddq27sz20O9vsxN13vvPO+z4z7/t5n+d5//gCFFlBZgOZHcpaoaI9uvI4trqTrHaR1V1kTRdJ46ZoPeRaL1nno9T7aDofua6bVOum1YciWF03qdZL07jJ6i5SjYug6oyvOr5L6YhQtO8obQldW2QFkNl2KNrQmk6ypotc60W1HoLGTdC4KfU9+MZhUtMY3TgisE2IWie5TUMpljGOaTjJPJho6OEY+/iNXo7ehxiGyA19ZJ2PqPWg6i5U7SKpXfFVxyMUbVDcEgLwm4dNZ66bTl9vnFrjN49lPD9W6DzDMY3JFIdVkv3iKrvUda60e5FnGsLlKghJQmZRfYpljGcaOpybbxeLdHJVut7DaBxg6fvo+j7D1FrT5Jp2+FL1wDJe1QUgb+EZB1rm3/Ct3jHObWS2zZZ4Lwyv/7JI7/LlZd12qLo1KumxmcLuFxPE8r242BiICANILD2c1TrpN+nu9TWelwuV8vqy0VXt0LKoZfLYhZsdL27Zzm9Y59+k13lhV0V7ctOgaW6jaexlgaKRKmvIaTmZ17vS0nbinU7d7wPOeZ8j7/hpybFpPovbty+5JCkRAMicPVmO2Qsj7j9c6Lw3YPQedz03fc3kf73Et+S8ePvEK3daF95uCWzQ630QX9WR2DQqsQwDxDMAmAB4RgbPOt7gnfrbat+TawOr04Oiznlh6ziHxJooEpwsEFAgCkdg5zhmr85PPlkf+fvaUIN3SuI8m9syhggOFlYZXOev96/d7Vh6h9XQDRStJ895lpIk3Amg5iWcyOUnAiRXmsTexdsznW9Y5Sbvqeb5Df3kZQyZX4THTEp5mUTyrnC0bvxy/+La4+XOh0te7fhqVse5A3mF8iQGAHAE+Y7lW/bAOsfQD7kvzPS/+h6RnCLBYscKMyYLs6QoQttbaRhY+Pr+1p/Pe44OLx4Zv2yZv8HNLet53vTgJ8t1Gn1EOKr2+I3dZ367/vKj3/5c7xjl1TuN+8Vr+gIJiZSIJSu7zx+eeS3JOAj5x/yei1skMi8aoCuV1i3h0CEiU1Cg1Zg/+d3D4I/fLi9fKSqplRTWVKrqgk++vXZtHUWYBISGIszSUo3/3IXX1zclwiIsyjHvy7prU7wgSWHHYsuPn2qae4vbNAR800ixbymexGPTuGtue2dFcUw8MyqOEU/i8gT7RAUV3PQ8DDEpIopGYqbxhUUQRQPAhUXRIIwYR+TS2OmMpD0xaALspFLjCWdLs6oZBAAQa1u1M9f5TYMhAM88kpAk3ItnL5zw/fHeXcFeOXAKYE8lpJYDtwT4ZSBQgqASMhTVrb3m7mnYVwsZShA9FwqmlkN6OWSrgFdK4eW+0n18rrMNAHi5ysb5DX7zMPBbZsXVVj2FtFBTMKPI++TeB5n75MCXg6QWJGoQP1OuBvao5q5srG3eXXh14+qtD0MMYU2IkauBXDVItMCTZ0tk//zyryaNNjk8goyya/qWMmyngGGeSJOU+cuEH8y23x6xDHV5s6XlwCsFkRpyVCB5LnQ+qxJX2rTx/n3gHARE9NK1LZm5G9LKYZ8GsipDueZqIal4737F9es3qphkUyZHhMPKTZ6MVj+wjcOMFOlWr/HJ+uhfL7qzeakxxGTIUoYemH8I8htCEqpFhzqu3frQPjxnHjhz6a3bta7xZ6Wr4GpaqAozCFTAk/My8yRCaT2f05Of0S8TW4cXeJZTkNI0uJuU1iKXPtkYvexritqBQjgFcqpC6Usb0rXtloHTIKhy+y8Gg8G79z968852MBg8s7oBe9VCvfPu/Y/UbYMhmFANO2lRgC1M5vVJ+QOFkiL3AscwCMmNvZExjBFX59NN/zFtFQBuVww9lHUIUG8fPF1u9UGGwuNfCQaDjpOB5xyDzwBvYWSGzffuy5u6QrXK1YKgMnwnLQ7QjFTReb3yTuDUAWs/Xd8HjMwiXBxNodQFf/h248ZNAsIKi2E8660mPP8Q7KsLz28Afln32UvBYPDjT/+y/eBhMBhcfG0TkuWhMmYo/t/tPTUQSY+Ppdtsjmuvv7H50/forDRWmhSICAOPsEhkzsefPNx69308wgIgAFMEKSVhBXq6whwta4R83YFm7+jc6tTi1dMXr88sX6tzjsfKDPgyE1tliyzQQ05NmqBITE0gIcxqtb63b/SI0R4XRaESEwGHcviJKZHhxHPzSxsbtwAieUQyF4PbycwiK49maFubeqbNfWdqneOq1oHsQ86wouY4uZlR2ZrZ0JlxyMWutBGq7JlpeUM5PH+RuIbDSUjIkh5QcLlZeDSBQuJAdBR1rKlGKcqpP2ydnQ0wd+y+4dK92VUnyC1Fysx8tV3jGNZ2jNZ1jBvcUyXWfp7Gka5zptV1cNUOjrqdVmElKO1isWx76uj2aUevTELCJaSy+YXcZCyWRURZUHbg4A8fnJm1KNlc0Qs2x3R98fZA46/7DymrG6DgSFK1Pa7UhCmzIOVmTJmZUG5hVNnpVUcZShtdaWcobXxNGxwwNhyxfHHR/enSiVuDzzPIXEd2cqBMmMXPJiRLYO8+mceoFaWkk4lcEo3vrsj77uWOT/02bmoORKcANg2w6SHh0wEnAEIWEPcAVgCYDMCk/X+OTonliB4s+Z7+zN+vV+yKYpQksC1SUTJHgEPpgMqtEEnHIUwqMSEWyx63Gr4a0t2eOTExO38+sDg77R8fn56YmJ0Yn5mePN3dM+T1DU1P+icmZiYmZsZDQX8gsNg7PPWmv//7NZffaYlHEnFYNoLn4DB0Sk4p0CtbiSQOAWGQ8OyYSPKVy1c+21hemZ+z2DoCgcV/ffNNMBj88dkIBoMPHv7pf9/0f9tgMPjkydP5c+cNxtb1tasPby6/c3OLTkuh4BPJ+EQiyqIUNwNR1kRAWShCI6BMgHhvz/DCS6sLS5dIRA5AmFh0oEFvNQ/OHZSVX75x573ffHb313+5unmv+GCFaThwxO6V5hUBxKE41vLLq9NnF6f8FwDiyMREAsrCx9MJeVrASNQohoZDaHiEHgH4Wq1hctI/ceo0l5eTzEoqSEvdxRLxjN0HKxv+/PnXX/3jhy8eP/380TfVtWbmIQ9eXB2zC6VSOAwa7+TJmd7ekbb2rpKDKjqVi8PS0FgyMUcJsXIbnpmBiSHiEFrsblL2HqnV5jAcsdGZKb268tfcjZjkvLrR5bm37y2+/WFg/YPA+t3QYuNe/clVqkRJQChElIVHGFqN3mi0788vE+bsJ+HZSCwJJSYismaILbYgKCNuNxoXRUSiSSwqV5idl5Odh8HQTxqUTzenxAIJPl+7p206xTKSZh1Ksw6lWEYyj04kaTtQlEmiJFF5EgASJ1EgEh6IRxKjdqDE1HyUnorEkXbv10NkYTMirsbt1RCkdeR8HaOwnlmkZ8r0DFkDW3m0um2QrzCeCix//c23Xzx+/OXXj7989PjzR4+++/d/lleu4DBUFENG8Rxrrfb9seffHbMcMVqozDQCkY1HKHEQHc/LByhtgYqOWFUnpuYEUeuj1PfRG/qYhh6WsY9tHI6o9dX0XVi782Blc3tl8/7K1v2Vre2Vre3lm9tXfvYrjXMqMqcinicdcrk+Czi+v+T6xdV5aur+aEpadHJBeHpZWIERnrnroxHylt3lbUiFA63qIKicVHUnUeui6byshh6Wvhuj9aE6D67eQzjkweq8mFovovMgOjezsZdmGKDrfKB0sqqPF+jaudXtYRWOncpjUNEBZe0h0w6FlpDPLj4KpfYdirYIRdtupSO+sgNRORG1C9F0YTVuUq2HpvNS6kMO/pl6yDovudZL0LixmpCdRms6Y6ucUOEERfsORTvIn3n3QgsUWv4LM7EPMVKlrhwAAAAASUVORK5CYII=" nextheight="1024" nextwidth="1024" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/f49f45fde805ca75907f965b051b2b44.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-entonces-que-es-lo-que-debemos-mantener-al-dia"><strong>Entonces, ¿qué es lo que debemos mantener al día?</strong></h3></div><ul><li><p style="text-align: justify"><strong>El sistema operativo</strong> de nuestros computadores, teléfonos, tablets y demás dispositivos.</p></li><li><p style="text-align: justify"><strong>Las aplicaciones y programas</strong>, sobre todo aquellos que gestionan datos sensibles: desde apps bancarias hasta <em>exchanges</em>, pasando por plataformas de <em>streaming</em> y juegos, donde también confiamos nuestra información financiera (tarjetas de créditos, datos bancarios, etc.).</p></li><li><p style="text-align: justify"><strong>Los antivirus</strong>, cuyas bases de datos de virus deben estar siempre al día para detectar y repeler a los intrusos digitales.</p></li><li><p style="text-align: justify"><strong>Los navegadores web y sus extensiones</strong>, ya que estas últimas son, a menudo, el caballo de Troya preferido por los ciberdelincuentes para infiltrar <em>malwares</em> en nuestros dispositivos.</p></li></ul><p style="text-align: justify">Comprender esto es crucial: actualizar no implica necesariamente volcarnos a comprar un nuevo teléfono o computadora. Sin embargo, es verdad que llegará un momento en que un simple <em>update</em> ya no bastará y un <em>upgrade</em> será inevitable. Cuando las especificaciones de nuestro hardware ya no puedan soportar los nuevos cambios, será el momento de despedirnos de ese viejo y fiel compañero de batallas digitales y dar la bienvenida a un nuevo guerrero listo para enfrentar los desafíos del futuro.</p><p style="text-align: justify"><strong>Mantente actualizado, mantente seguro.</strong></p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-so-what-should-we-keep-up-to-date"><strong>So, what should we keep up to date?</strong></h3></div><p style="text-align: justify"><strong>The operating system</strong> of our computers, phones, tablets, and other devices.</p><ul><li><p><strong>Applications and programs</strong>, especially those that handle sensitive data: from banking apps to exchanges, including streaming platforms and games, where we also entrust our financial information (credit card details, bank data, etc.).</p></li><li><p><strong>Antivirus software</strong>, whose virus databases must always be up to date to detect and repel digital intruders.</p></li><li><p><strong>Web browsers and their extensions</strong>, as these are often the Trojan horse of choice for cybercriminals to sneak malware into our devices.<br><br>Understanding this is crucial: updating doesn’t necessarily mean rushing out to buy a new phone or computer. However, it is true that there will come a time when a simple update will no longer suffice and an upgrade will be inevitable. When our hardware specifications can no longer support the new changes, it will be time to bid farewell to that old and faithful digital battle companion and welcome a new warrior ready to face the challenges of the future.<br><br><strong>Stay updated, stay safe.</strong></p></li></ul></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/173a509f657ba0ae8b4d8e0133d63b9b.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><em>Si este contenido te interesa, te invito a consultar otras publicaciones asociadas al tema en mi </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/coleccion-de-contenido-relacionado-con-la-seguridad-de-la-informacion-or-ciberseguridad"><em>Colección de Ciberseguridad</em></a><em>.</em><br><em><br>If this content interests you, I invite you to consult other publications associated with the topic in my </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/coleccion-de-contenido-relacionado-con-la-seguridad-de-la-informacion-or-ciberseguridad"><em>Cybersecurity Collection</em></a><em>.</em></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/8a3531311ecd71adf33570112074a11e.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div data-type="subscribeButton" class="center-contents"><a class="email-subscribe-button" href="https://paragraph.xyz/@gorayii/memberships">Subscribe</a></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e24ab0a8f475c07b3cfc3d9e329e07d4.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAECAIAAABgJaqDAAAACXBIWXMAAA7EAAAOxAGVKw4bAAABfUlEQVR4nGNQ05Mq6LNLqLJIrrGwcFXg4uQVBgNpMBATExMQEODl5RUUFOTk5OTj45OQEJeSlpSRBckKCPDLyElJS0vx8fFJSUqqqirx84pZ+civOFp55NCJy5cvzZo9i0FdTzq9wcotVNPAUi4iz4iFhdXS0jI2Ntbf37+0tDQ3NzcqKiomJqawsFBSUpKPj09GQUxBVUJBRVJFQ15FQ17HSElFS0ZQUGDKlBl3n71xc/TM6bRZsnba5AnT/v79c/r0aQYDS8XAVD3nELWGxe46ZrIMDEw6OtruYODp5RkUFGRra2tpaRkaGiolBXaptJSSkqIqGOjo6Kgoq0hJS/Dx8nb19J04f9XJzi2pwejCzcP79x6ZNXvW5MmTGUTFhUIyjEqnOCZWWeiYyrKzcAmLCQiLCIhLiIpLiAoI8goK8YlLiErLSoqKifDz8cuDgaqqqry8vKampp6evry8gqysrImJkbGxvpyMqoWn7JF7U14+fbt02dL58+cDAMbzYxxIVsQZAAAAAElFTkSuQmCC" nextheight="160" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p></p>]]></content:encoded>
            <author>gorayii@newsletter.paragraph.com (Raicelys Gómez | Gorayii)</author>
            <category>cybersecurity</category>
            <category>update</category>
            <category>upgrade</category>
            <category>technology</category>
            <category>software</category>
            <category>tech</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/d65a2a6d091a0636ce0670d0cb06ae7d.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[¿Te atreverías a comprobar si tus credenciales de acceso se han filtrado?]]></title>
            <link>https://paragraph.com/@gorayii/credencialesfiltradas</link>
            <guid>1Y39UZtltQjiuPfDF9rT</guid>
            <pubDate>Fri, 03 May 2024 18:38:45 GMT</pubDate>
            <description><![CDATA[¿Por qué no repetir credenciales de acceso?La seguridad de nuestras credenciales de acceso es fundamental. A menudo insistimos en recomendar no repet...]]></description>
            <content:encoded><![CDATA[<figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/aad0ac11b734ba524ef08529a449c585.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h1 style="text-align: justify" id="h-por-que-no-repetir-credenciales-de-acceso"><strong>¿Por qué no repetir credenciales de acceso?</strong></h1></div><p style="text-align: justify">La seguridad de nuestras credenciales de acceso es fundamental. <strong>A menudo insistimos en recomendar no repetir o reutilizar contraseñas o correos electrónicos</strong>. Pero te has preguntado: <strong>¿Por qué?</strong> La razón es simple, pero crucial: si un servicio al que estamos suscritos o una aplicación que utilizamos sufre un ciberataque, nuestras credenciales podrían ser expuestas, divulgadas o comercializadas, lo que abriría una puerta de libre acceso a toda nuestra información personal.</p><p style="text-align: justify">No profundizaré en más razones, pues ya he abordado el tema a detalle en <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/gestores-de-contrasena-realmente-son-necesarios">publicaciones anteriores</a>. En cambio, en esta oportunidad te quiero instar o retar, si así lo quieres ver, a que descubras cuántas veces se han filtrado tus credenciales de acceso. Y con base en esos resultados, invitarte a tomar medidas oportunas, como cambiar contraseñas, emails, usar gestores de contraseñas y activar la autenticación de múltiples factores.</p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 id="h-why-not-repeat-login-credentials"><strong>Why not repeat login credentials?</strong></h3></div><p>The security of our access credentials is fundamental. <strong>We often insist on recommending not to repeat or reuse passwords or email addresses</strong>. But have you ever wondered <strong>why?</strong> The reason is simple, yet crucial: if a service we are subscribed to or an application we use suffers a cyberattack, our credentials could be exposed, disclosed, or commercialized, which would open a door of free access to all our personal information.<br><br>I won't delve into more reasons, as I have already addressed the topic in detail in <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/gestores-de-contrasena-realmente-son-necesarios">previous publications</a>. Instead, this time I want to urge or challenge you, if you so wish, to discover how many times your access credentials have been leaked. And based on those results, I invite you to take timely measures such as changing passwords, emails, using password managers, and activating multi-factor authentication.</p></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/062a1e971758c86c26b3b36af5926622.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h3 id="h-se-han-filtrado-mis-credenciales-de-acceso"><strong>¿Se han filtrado mis credenciales de acceso?</strong></h3></div><p style="text-align: justify">Empecemos con una herramienta ampliamente conocida: <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/"><strong>"Have I Been Pwned?"</strong></a>. Te advierto que los resultados suelen causar angustia y acelerar el ritmo cardíaco.</p><p style="text-align: justify">Bien, en esta web simplemente debemos ingresar el correo electrónico y presionar en el botón <strong>“pwned”</strong>. Si somos afortunados, un mensaje en fondo verde dirá: <strong>“Good news - no pwnage found!”</strong>. Por el contrario, si las credenciales han sido comprometidas, entonces el mensaje en fondo rojo será <strong>"Oh no - pwned!"</strong>, y junto a este, una lista de las plataformas o servicios en las que se vio el email se vio comprometido.</p><img src="https://storage.googleapis.com/papyrus_images/d802e700253445fba3023bdb4d97b8eb.png" blurdataurl="data:image/png;base64,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" nextheight="219" nextwidth="955" class="image-node embed"><p style="text-align: center">¡Enhorabuena!</p><img src="https://storage.googleapis.com/papyrus_images/9fba3f690dd963e0ffc003ce5dac324c.png" blurdataurl="data:image/png;base64,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" nextheight="220" nextwidth="956" class="image-node embed"><p style="text-align: center">¡Ups!</p><p style="text-align: justify">Una consulta similar podemos hacer también con las <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/Passwords"><strong>contraseñas</strong></a> para comprobar si se han filtrado. En este caso, si te atreves, hazlo con precaución, utilizando una VPN y navegación privada.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/80e3df77fb83d2933a1d445d97158179.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><hr><p></p><p style="text-align: justify">Otra herramienta de consulta la tenemos en la web <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://cybernews.com/personal-data-leak-check/"><strong>CyberNews</strong></a>, donde podemos comprobar tanto correos electrónicos como números de teléfono, recibiendo mensajes que van desde <strong>"You are safe for now"</strong>, en el mejor de los casos; hasta una urgente llamada a la acción: <strong>"Your data has been leaked"</strong>.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/84cebef7802f9abf65cb2493d43922bb.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: center">¡Ups...again!</p><hr><p style="text-align: justify">Por último, también podemos hacer uso de la herramienta <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://one.google.com/dwr/setup_profile?from=3&amp;g1_landing_page=1"><strong>Google One</strong></a>, que si bien es un servicio de pago, igual nos permite hacer una consulta básica para comprobar si nuestra dirección de correo electrónico se ha filtrado o no en la Dark Web. En este caso, debemos ir a las opciones de la cuenta de <strong>Google</strong>, y en el apartado de <strong>“Seguridad”</strong>, ejecutar un análisis con Google One. El análisis se enfocará en la cuenta de Google activa en el momento.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d2bbf7738f55c81d25ea519d13f22bd5.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><img src="https://storage.googleapis.com/papyrus_images/e74d2960c67c9fb677a237bd0065135e.png" blurdataurl="data:image/png;base64,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" nextheight="294" nextwidth="518" class="image-node embed"><hr><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 id="h-have-my-login-credentials-been-leaked"><strong>Have my login credentials been leaked?</strong></h3></div><p>Let's start with a widely known tool: <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/"><strong>"Have I Been Pwned?"</strong></a>. I warn you that the results often cause distress and accelerate the heartbeat.<br><br>Well, on this website we simply need to enter the email address and press the <strong>"pwned"</strong> button. If we are lucky, a message in green background will say: <strong>"Good news - no pwnage found!"</strong>. Conversely, if the credentials have been compromised, then the message in red background will be <strong>"Oh no - pwned!"</strong>, and alongside this, a list of the platforms or services where the email was compromised will be listed.<br><br>We can also make a similar inquiry with <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/Passwords"><strong>passwords</strong></a> to check if they have been leaked. In this case, if you dare, do it with caution, using a VPN and private browsing.<br><br>Another consulting tool we have is on the <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://cybernews.com/personal-data-leak-check/"><strong>CyberNews</strong></a> website, where we can check both email addresses and phone numbers, receiving messages ranging from <strong>"You are safe for now"</strong>, in the best-case scenario; to an urgent call to action: <strong>"Your data has been leaked"</strong>.<br><br>Finally, we can also use the <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://one.google.com/dwr/setup_profile?from=3&amp;g1_landing_page=1"><strong>Google One</strong></a> tool, which, although it is a paid service, still allows us to make a basic query to check if our email address has been leaked on the Dark Web or not. In this case, we must go to the <strong>Google</strong> account settings, and in the <strong>"Security"</strong> section, run an analysis with Google One. The analysis will focus on the active Google account at the moment.</p></div></div><img src="https://storage.googleapis.com/papyrus_images/ed43f2e4292c3c947709c8f50ca80564.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><p style="text-align: justify">Una vez que hayas verificado la seguridad de tus credenciales, no entres en pánico. No es preocuparse, sino ocuparse y tomar acción. Toma medidas con serenidad: cambia todas tus contraseñas, utiliza gestores de contraseñas y activa siempre la autenticación de doble factor. Este último punto será tema de una próxima publicación.</p><p style="text-align: justify">Recuerda, proteger tus cuentas es clave. Haz estos cambios con tranquilidad, sin prisas ni angustias. La seguridad informática es un proceso continuo, ¡así que mantente seguro y protegido en línea!</p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><p>Once you have verified the security of your credentials, do not panic. It's not about worrying, but about taking action. Take measures calmly: change all your passwords, use password managers, and always activate two-factor authentication. This last point will be the subject of a future publication.<br><br>Remember, protecting your accounts is key. Make these changes calmly, without haste or anxiety. Cybersecurity is a continuous process, so stay safe and protected online!</p></div></div><img src="https://storage.googleapis.com/papyrus_images/77cf56b0c02473fdcc30eb6a7b4aef72.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><p><em>Diseño de miniatura en </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://Canva.com"><em>Canva.com</em></a><em>.<br>Capturas de pantalla de las herramientas: </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/"><em>Have I Been Pwned?</em></a><em>, </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://cybernews.com/personal-data-leak-check/"><em>CyberNews</em></a><em> and </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://one.google.com/dwr/setup_profile?from=3&amp;g1_landing_page=1"><em>Google One</em></a><em>.<br></em></p><p style="text-align: justify"><em>Translation: ChatGPT.<br>Thumbnail design on </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://Canva.com"><em>Canva.com</em></a><em>.<br>Screenshots of the tools: </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://haveibeenpwned.com/"><em>Have I Been Pwned?</em></a><em>, </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://cybernews.com/personal-data-leak-check/"><em>CyberNews</em></a><em> and </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://one.google.com/dwr/setup_profile?from=3&amp;g1_landing_page=1"><em>Google One</em></a><em>.</em></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/052d7e178718273dbaef805b4fe4e4a2.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><img src="https://storage.googleapis.com/papyrus_images/240b30ba2cdd4ce5830ccdfeb31ef8d8.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAECAIAAABgJaqDAAAACXBIWXMAAA7EAAAOxAGVKw4bAAABfUlEQVR4nGNQ05Mq6LNLqLJIrrGwcFXg4uQVBgNpMBATExMQEODl5RUUFOTk5OTj45OQEJeSlpSRBckKCPDLyElJS0vx8fFJSUqqqirx84pZ+civOFp55NCJy5cvzZo9i0FdTzq9wcotVNPAUi4iz4iFhdXS0jI2Ntbf37+0tDQ3NzcqKiomJqawsFBSUpKPj09GQUxBVUJBRVJFQ15FQ17HSElFS0ZQUGDKlBl3n71xc/TM6bRZsnba5AnT/v79c/r0aQYDS8XAVD3nELWGxe46ZrIMDEw6OtruYODp5RkUFGRra2tpaRkaGiolBXaptJSSkqIqGOjo6Kgoq0hJS/Dx8nb19J04f9XJzi2pwejCzcP79x6ZNXvW5MmTGUTFhUIyjEqnOCZWWeiYyrKzcAmLCQiLCIhLiIpLiAoI8goK8YlLiErLSoqKifDz8cuDgaqqqry8vKampp6evry8gqysrImJkbGxvpyMqoWn7JF7U14+fbt02dL58+cDAMbzYxxIVsQZAAAAAElFTkSuQmCC" nextheight="160" nextwidth="1280" class="image-node embed"><p style="text-align: justify"></p>]]></content:encoded>
            <author>gorayii@newsletter.paragraph.com (Raicelys Gómez | Gorayii)</author>
            <category>cybersecurity</category>
            <category>privacy</category>
            <category>security</category>
            <category>data</category>
            <category>passwords</category>
            <category>emails</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/41b8ee7a3cf4583a8d5427d35a4e5677.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Protege tu privacidad | Elimina tus datos de internet con JustDeleteMe]]></title>
            <link>https://paragraph.com/@gorayii/justdeleteme</link>
            <guid>fo6p7Zdbg6n6NNbInslX</guid>
            <pubDate>Mon, 29 Apr 2024 08:15:29 GMT</pubDate>
            <description><![CDATA[El activo más valioso en la era digital, es la información. Son los datos, los tuyos, los míos y los de todos. Hay una premisa que dicta que si algo ...]]></description>
            <content:encoded><![CDATA[<img src="https://storage.googleapis.com/papyrus_images/b07fa4b6c5113dc57d81ca696d898cc0.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><p style="text-align: justify"><strong>El activo más valioso en la era digital, es la información</strong>. Son los datos, los tuyos, los míos y los de todos. Hay una premisa que dicta que si algo es gratis, es porque el producto eres tú; es decir, el precio a pagar son los datos, la información, la exposición a la que nos sometemos... el libre acceso que damos a invadir nuestra privacidad. <strong>Nada es completamente gratis; al final, todo tiene un costo, y en este caso, ese costo es nuestra privacidad</strong>.</p><p style="text-align: justify">Soy escéptica respecto a la posibilidad de eliminar por completo nuestra huella digital. Los datos que compartimos han sido expuestos, vendidos y comercializados por las mismas empresas que alguna vez nos ofrecieron servicios "gratuitos". Sin embargo, aunque pueda parecer una tarea desalentadora, ignorarla solo agrava el problema. Algunas empresas, de acuerdo con la normativa de ciertos países, están obligadas a eliminar nuestros datos si así lo solicitamos. Aunque no confío en que sea 100% efectivo, creo que es un paso necesario, más perdemos al no intentarlo.</p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><p><strong>The most valuable asset in the digital era is information</strong>. They are the data, yours, mine, and everyone's. There is a premise that dictates that if something is free, it's because you are the product; that is, the price to pay is the data, the information, the exposure we subject ourselves to... the free access we give to invade our privacy. <strong>Nothing is completely free; in the end, everything has a cost, and in this case, that cost is our privacy.</strong><br><br>I am skeptical about the possibility of completely erasing our digital footprint. The data we share has been exposed, sold, and commercialized by the same companies that once offered us "free" services. However, even though it may seem like a daunting task, ignoring it only exacerbates the problem. Some companies, according to the regulations of certain countries, are obligated to delete our data if we request it. Although I don't trust that it's 100% effective, I believe it's a necessary step; we lose more by not trying.</p></div></div><img src="https://storage.googleapis.com/papyrus_images/fa5d9a02f51b2b21cde1ede84e54be72.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><div class="relative header-and-anchor"><h3 id="h-gestiona-tu-privacidad"><strong>Gestiona tu privacidad</strong></h3></div><p style="text-align: justify">Existen diversos mecanismos para intentar eliminar nuestros datos. Bien sea contratando empresas especializadas o haciéndolo manualmente a través de las opciones de privacidad que ofrecen las plataformas. En cualquier caso, debemos reconocer que <strong>somos responsables de nuestra privacidad</strong> en línea; y por tanto, debemos tomar medidas para protegerla.</p><p style="text-align: justify">Por citar un ejemplo, hablemos de nuestras cuentas en <strong>Google</strong>. Todos tenemos una, ¿verdad que sí?. Pues bien, Google nos permite <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://safety.google/intl/es/privacy/privacy-controls/">gestionar nuestros datos</a> accediendo a la sección "<a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://myactivity.google.com/"><strong>Mi Actividad</strong></a>" desde el apartado <strong><em>Datos y Privacidad</em></strong> de la cuenta. Desde allí, podemos revisar y eliminar nuestros datos históricos, así como también controlar el seguimiento de nuestra actividad en la web y en ciertas aplicaciones.</p><img src="https://storage.googleapis.com/papyrus_images/2c29a78cce8023ba85f1a1a913c0a8df.png" blurdataurl="data:image/png;base64,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" nextheight="644" nextwidth="692" class="image-node embed"><img src="https://storage.googleapis.com/papyrus_images/60973a91d8b7a06958d5cb056f273bb9.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAB0AAAAgCAIAAABhFeQrAAAACXBIWXMAAAsTAAALEwEAmpwYAAAHWElEQVR4nI1WXZPa5hWW3c2Occ2GFQgJIYQQEgIEK9AKrWCFVhJCAiHELgvsB7CYeLf2Jl7bcZLGTmM7sdNO3ZnmotPpTS/6B/o/2ptcd3rVu171P6QjKXW2tTv2zDPMeV90Hp3znuecV8A6CL+OSARa/ckVGEbiSDIWT8ThRDQGR2MwBCEpPEMQFIrhsTgKrIQjb3JfB2HgjaQQnBL69xGcgSCYKXB5liuyFYphFdV48fLbp89fnt//LIul77VNJI5E3oUXjME3rt9Amfqf//V9emsfhmKyYkhSsybJJU5od5xf//Z3//zH3w5ung2F2vd//47PZFdugCAYf3u86yD8fiSOMWIKJ2GUOJ0e/P7ROV3gUBQXxIY7nMzmC0UzKYphMfyN7v+XFwTjodBPAWB1JfT+wdH02988XwNhAHgvk6VFqQkA75U4ASO8SN/OG439iLUIRDHseDIdT2Z/+OOf/vLX7z68+OTs/OLiwad3Lh723P39yQyGEyAYv+wVjb3GuxaBrlwNrayGAwAAgBPZ4fjw8OjE7PR1ozscH0/ny/Fk2pDVuqxWeREAVq+FIleuhgLHK1dDALB6I/xDBkA0Bl8LRWpi4+mzF18++WqxvPX1i19988uXJ4sPbi5PNb196+z2z+6cf/nkq/PzuzWxsTscTybT2Xz57OsXXzx5dvfiwf0Hn3788PMP7957/MWTTUG6FopEY36810KRBIpvyztVXtwUJKnRtDoOVxF2VIMplJuKzgtbmt5uyDtbkixK21VerIn1rt2viY1tWd2W1ZpYr4kNTW+n8MyVqyEv3jicIKkczbAYkU3hmQSaouhC1Nd/EksTZC4wklg6gaZwIkuQNEZkMTyDE9kEmoIRLImlA8cEmqIZtrzBw0gSSOGZwe647+51bXe4P+m7e3135GPv4GDWcwb93WHLsE4WZ6bZG42PB7uT4Pm+u2d1nL476tqDrj1om/ZwfMhVhFyhHEeSXn0Gu2PT7PmZqn13T9fNtmlbHUfT2y3D2lENRTWsjtMyLFU3TbPXNm2poWh6u+cMNN3S9HZT0XZUY0c1tqQmzbAJNAWQVK5rD4IANb3dtd2eM2gZVsuwes6ga7tt07adQcd2DdPu2m7f3es5A92wura7O5wEWXZsV9Pbqm6SVA4nsnE44cVrdZyu7QYvDKi3ZbXeUFTdDKJuKnpT0VuG1TZt3c+gJm63jK5uWE1F1/0gCJKOxuCV1XAgNQBGkkyBLbJcsbiRyxWKLMdVhHy+RDNsnuWqvFhkK1xFKG/wbKlaZCslTuAqAlMoMwWWq9TYUpUplEucwJaq1H+KthaBgAxVMJ0D05k4w3nHPdIMx+Mq83mWK2/wm4LEVYQqL1Z5sbzB+wpr8P5mka3UxEaVF7mKwAuS4NtbkpzE0h5vHEZTJJvAcwk8hxFFCE6t+rkEWFlduxaKBAh2XrcvY2U1vBaBXvVxbB2MxcB4DIRisTiMeIM8DiNxGIER1BdpEkaSwXT394MHfhj2/qa3DCQMI0mv36IxWFXNdseVmnZd6SrGrqy7UrMra33dPtwQZIIggzNdi0A9ZzDcn7QMy+w4hl9DXz/DQIU0wwbF8HghCNkUpIas9dyx7Y4Ho/nuaObbo73JTVXv0EzBr1I5GoM3Bckw7dl8eXr7o4PpYlOQREmuiY2a2NgUpKBvmUIZghBPDziRrfLi6dmdk8Xy6Gg2my9OFsv5/IPl8lbLMCm6QNEFgqQTaCpNkEyBszp9q+O0TbveUOoNpano2/LOtqyqullkKySV8/QbhxOBJ0nlLiEfGATp/Qb/wkiSIOkqL47Gx+PJdLE8m82Xk8n05vL28XQxmy8Xy7MqL/7ISzMszbAUXQiMy8vglQFvAk2RVK68sTncPzyYLob7k+H+ZDQ+PjyaWx1nS5I1vV3ihCACr244QRPkW+B3J4oTWZLKB4qu8GKJE6r8Fi9IFMOm8EzKH3I4kfXqBsZgEIxGIuvrIHwjDK5FoECAgfEK/v0fBUEIBKFweP2/sRaNwa+0GIcTnn5DoZDmLHZPPqcoelvWamKj3lC4irApSPWGEjTYtqzm2SrFbuXKUpap5jmZKUs0W8uX6zlWzHNyEqde3ZBxGPXONxxer4itrZ0BhqW8jw/aU1VQqzzLBbphCuU0SREUS1BsimRIukxQLJ4tEBSbJoskXUYx4lW/BFEDSYyw7J5uWj13aNquabuW7fbcYavbl3daimYqmimrhqKZqj8JfQRGW9E8Q9HammHppq2bdrvjWLabxNIAhmdOTs+Pb55+9PHPP3v85N4njx4++sXjp89vnV84uyN3dBigPzr4H+Py0hlOnOGktzcZHszGxycYkfV0lqEKGSqP+XcUhmdQLI1i6TRJZajcOyLLsBTDkhRNUrksXfDOIRKB0rlarlDlha1imS9xwqZQT+GZ69cj4TD4Lrh+PQIjGN/obql7GZrDsLTH688zJAohCTSFIEnEn0mXv1zeBXE4kcSpFJFDMQL13f8N60n7LTjXUzkAAAAASUVORK5CYII=" nextheight="728" nextwidth="670" class="image-node embed"><hr><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-manage-your-privacy"><strong>Manage your privacy</strong></h3></div><p style="text-align: justify">There are various mechanisms to attempt to delete our data. Whether by hiring specialized companies or doing it manually through the privacy options offered by platforms. In any case, we must recognize that we are responsible for our online privacy; and therefore, we must take measures to protect it.<br><br>To give an example, let's talk about our Google accounts. We all have one, right? Well, Google allows us to <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://safety.google/intl/es/privacy/privacy-controls/">manage our data</a> by accessing the <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://myactivity.google.com/">"My Activity"</a> section from the <strong><em>Data and Privacy</em></strong> section of the account. From there, we can review and delete our historical data, as well as control the tracking of our activity on the web and certain applications.</p></div></div><img src="https://storage.googleapis.com/papyrus_images/59e1ad19c91770ff82e36b6bf7deb346.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-just-delete-me"><strong>Just Delete Me</strong></h3></div><p style="text-align: justify">Aunque una buena práctica siempre será consultar detenidamente y configurar apropiadamente el apartado de privacidad en los productos y servicios que contratemos o las aplicaciones a las que accedamos, existen recursos como <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a>, que nos facilitan la tarea. En el caso de <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a><strong>,</strong> nos proporciona una lista de plataformas, aplicaciones o servicios, con indicaciones sobre cómo eliminar nuestros datos de manera más eficiente, advirtiendo de antemano el nivel de dificultad de cada uno, el cual puede variar entre fácil, medio, difícil, imposible y de disponibilidad inmediata.</p><img src="https://storage.googleapis.com/papyrus_images/ddc045a317ce66ed65ffcfbb93c73100.png" blurdataurl="data:image/png;base64,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" nextheight="837" nextwidth="1022" class="image-node embed"><p style="text-align: center"><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://justdeleteme.xyz/"><em>https://justdeleteme.xyz/</em></a></p><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-como-hacerlo"><strong>¿Cómo hacerlo?</strong></h3></div><p style="text-align: justify">Basta con <strong>hacer clic en el icono de enlace</strong> de cada servicio o plataforma, y nos direcciona directamente al módulo desde el cual podemos gestionar nuestros datos. Igual, siempre podemos hacer clic en <em>"mostrar información"</em> para recibir instrucciones básicas del proceso.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ebfb146a3318277ce49839314563a731.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Los desarrolladores de <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a> también ofrecen <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justgetmydata.com/"><strong>JustGetMyData</strong></a>, que nos permite obtener nuestros datos de los servicios web que los utilizan, y <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justwhatsthedata.github.io/"><strong>JustWhatsTheData</strong></a>, que nos informa sobre la cantidad de datos que estos servicios recopilan de nosotros.</p><p style="text-align: justify"><strong>Nuestros datos son valiosos. Comprenderlo es el primer paso para tomar acción y proteger nuestra privacidad.</strong></p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-just-delete-me"><strong>Just Delete Me</strong></h3></div><p style="text-align: justify">Although a good practice will always be to carefully consult and properly configure the privacy section in the products and services we contract or the applications we access, there are resources like <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a> that make the task easier. In the case of <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a>, it provides us with a list of platforms, apps or services, with instructions on how to delete our data more efficiently, warning in advance the level of difficulty of each one, which can vary between easy, medium, difficult, impossible, and immediately available.</p><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-how-can-we-do-it"><strong>How can we do it?</strong></h3></div><p style="text-align: justify">Just <strong>click on the link icon</strong> of each service or platform, and it will directly direct us to the module from which we can manage our data. Likewise, we can always click on <em>"show information"</em> to receive basic instructions on the process.<br><br>The developers of <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><strong>JustDeleteMe</strong></a> also offer <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justgetmydata.com/"><strong>JustGetMyData</strong></a>, which allows us to obtain our data from the web services that use them, and <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justwhatsthedata.github.io/"><strong>JustWhatsTheData</strong></a>, which informs us about the amount of data these services collect from us.<br><br><strong>Our data is valuable. Understanding this is the first step to taking action and protecting our privacy.</strong></p></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/209599cb852d40e69cd5e4f111b002d4.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify"><em>Diseño de miniatura en </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://Canva.com"><em>Canva.com</em></a><em>.<br>Capturas de pantalla del apartado de </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://safety.google/intl/es/privacy/privacy-controls/"><em>Privacidad de Google</em></a><em> y de la Web </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><em>JustDeleteMe</em></a><em>.<br></em></p><p style="text-align: justify"><em>Translation: ChatGPT.<br>Thumbnail design on </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://Canva.com"><em>Canva.com</em></a><em>.<br>Screenshots from </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://safety.google/intl/es/privacy/privacy-controls/"><em>Google's privacy</em></a><em> section and the </em><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://justdeleteme.xyz/"><em>JustDeleteMe</em></a><em> website.</em></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/cffc2e6e3c7668821aee4aadbb050349.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><img src="https://storage.googleapis.com/papyrus_images/fee998a9531a5ba1008606e346645b2f.png" blurdataurl="data:image/png;base64,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" nextheight="160" nextwidth="1280" class="image-node embed"><p style="text-align: justify"></p>]]></content:encoded>
            <author>gorayii@newsletter.paragraph.com (Raicelys Gómez | Gorayii)</author>
            <category>technology</category>
            <category>cybersecurity</category>
            <category>privacy</category>
            <category>data</category>
            <category>justdeleteme</category>
            <category>information</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/22fed66fc4c7723e056f6744f5ce7ca2.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Exploit Zero-Day & Ataque Zero-Click]]></title>
            <link>https://paragraph.com/@gorayii/zero-dayandzero-click</link>
            <guid>KYgj7XUiswa5buGI4WmH</guid>
            <pubDate>Wed, 24 Apr 2024 15:34:32 GMT</pubDate>
            <description><![CDATA[Hace algunos días, mientras leía las noticias, me topé con una advertencia de seguridad desde la cuenta de Trust Wallet en la cual alertaban a los us...]]></description>
            <content:encoded><![CDATA[<figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1263c582339a2ff38d41c6043277420d.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Hace algunos días, mientras leía las noticias, me topé con una advertencia de seguridad desde la cuenta de <strong>Trust Wallet</strong> en la cual alertaban a los usuarios de <strong>iOS</strong> acerca de un <strong>exploit zero-day</strong> de alto riesgo. Como usuaria de Apple, este tipo de alertas hacen eco en mí.</p><div data-type="twitter" tweetid="1779961167537979775"> 
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/TrustWallet">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/21bab5c11cc802fa1d7d5e78edf94e4f.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/TrustWallet" class="twitter-displayname">Trust Wallet</a>
              <p><a target="_blank" href="https://twitter.com/TrustWallet" class="twitter-username">@TrustWallet</a></p>
    
            </div>
            <a href="https://twitter.com/TrustWallet/status/1779961167537979775" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.xyz/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      1/2: <img class="twitter-emoji" draggable="false" alt="⚠️" src="https://twemoji.maxcdn.com/v/14.0.2/72x72/26a0.png"> Alert for iOS users: We have credible intel regarding a high-risk zero-day exploit targeting iMessage on the Dark Web.<br><br>This can infiltrate your iPhone without clicking any link. High-value targets are likely. Each use raises detection risk. <a class="twitter-content-link" href="https://twitter.com/hashtag/CyberSecurity" target="_blank">#CyberSecurity</a>
      
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/TrustWallet/status/1779961167537979775" style="margin-right:16px; display:flex;">
            <img alt="Like Icon" class="twitter-heart" src="https://paragraph.xyz/editor/twitter/heart.png">
            6,535
          </a>
          <a target="_blank" href="https://twitter.com/TrustWallet/status/1779961167537979775"><p>21:53 • 15 abr 2024</p></a>
        </div>
    
  </div> 
  </div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d1f5b286ae1c28caf778ee66708aab73.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAAAsTAAALEwEAmpwYAAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h2 id="h-exploit-zero-day-and-ataque-zero-click"><strong>Exploit zero-day &amp; ataque zero-click</strong></h2></div><p style="text-align: justify">Bien, lo primero que debemos entender es: <strong>¿Qué es un exploit zero-day?</strong> Básicamente, se trata de explotar o aprovecharse de una vulnerabilidad de seguridad antes de que los desarrolladores, en este caso Apple, lancen un parche o actualización para corregirlo. En pocas palabras, es sacar ventaja de una vulnerabilidad nueva sobre la cual no se tiene conocimiento previo, y por tanto, no existe en el momento "la cura" para ese mal. Entiéndase que no existe, para el momento de su detección, un software que corrija el fallo de seguridad.</p><p style="text-align: justify">Ahora bien, volviendo a la advertencia de la noticia, <strong>¿De qué se trataba ese exploit y por qué era considerado de alto riesgo?</strong> Bueno, se trataba de una vulnerabilidad que aparentemente estaba vinculada con <strong>iMessage</strong> (la mensajería del ecosistema de Apple) y que permitía que se pudiesen ejecutar archivos maliciosos para el robo de información sin la necesidad de la intervención del usuario.</p><p style="text-align: justify"><strong>¿Esto qué quiere decir?</strong> Bueno, que podría tratarse de <strong>ataque zero-click o clic cero</strong> que, como su nombre lo indica, no requiere nuestra intervención para que pueda filtrarse e infectar el equipo; es decir, es un ataque sin clics, aunque no pinchemos ningún enlace, igual el malware se ejecutará.</p><p style="text-align: justify">Si ahora mismo estás pensando: <em>“o sea que aunque sea sumamente cuidadoso de no dar clics en enlaces sospechosos o desconocidos, ¿igual puedo ser víctima de ataque?</em> Lamentablemente, la respuesta es sí.</p><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-zero-day-exploit-and-zero-click-attack"><strong>Zero-day exploit and zero-click attack</strong></h3></div><p style="text-align: justify">This morning, while reading the news, I came across a security warning from the TrustWallet account alerting iOS users about a high-risk zero-day exploit. As many know, I'm an Apple user, so these kinds of alerts resonate with me.<br><br>Alright, the first thing we need to understand is: <strong>What is a zero-day exploit?</strong> Essentially, it's exploiting or taking advantage of a security vulnerability before developers, in this case Apple, release a patch or update to fix it. In simple terms, it's leveraging a new vulnerability that is not previously known, and therefore, there's no existing "cure" for it at the time of detection. It's important to note that, at the time of its detection, there's no software available to fix the security vulnerability.<br><br>Now, getting back to the news warning, <strong>what is this exploit about and why is it high-risk?</strong> Well, it's a vulnerability apparently associated with <strong>iMessage</strong> (Apple's messaging system) that allows malicious files to be executed for information theft without the need for user intervention.<br><br><strong>What does this mean?</strong> Well, it's a <strong>zero-click attack</strong>, as the name suggests, it doesn't require our intervention to infiltrate and infect the device; in other words, it is an attack without clicks, even if we don't click on any links, the malware will still execute.<br><br>If you're currently thinking: <em>"So, even if I'm extremely careful not to click on suspicious or unknown links, I can still be a victim of an attack?"</em> Unfortunately, the answer is yes.</p></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9553da2cfed60747854699a53e7b9be9.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-que-hacer-en-estos-caso"><strong>¿Qué hacer en estos caso?</strong></h3></div><p style="text-align: justify">En el caso concreto del exploit en <strong>iMessage</strong>, la recomendación inmediata sugerida era <strong>desactivar iMessage</strong> hasta tanto Apple anunciase alguna actualización o parche para cerrar esa puerta trasera y corregir dicha vulnerabilidad.</p><p style="text-align: justify"><em>Ajustes - mensajes - iMessage - off</em></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/8f9ef8e8c3b16c5e59c4114e787498d3.png" blurdataurl="data:image/png;base64,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" nextheight="404" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Ahora, una recomendación general para mitigar riesgos de cero clic o ataques sin clics, y esto aplica más allá de ese exploit puntual, es <strong>desactivar en las aplicaciones de mensajería (Telegram, WhatsApp) la descarga automática de archivos</strong>. De manera que nada de lo que nos envíen se descargue automáticamente en nuestros dispositivos sino que tengamos la opción, según confiemos o no en el remitente o la fuente, de descargarlo o no.</p><p style="text-align: justify">Recuerden, un <strong>ataque zero-click</strong> se hace efectivo con tan solo recibir el archivo infectado y que este se descargue en el dispositivo, sin que para ello hayamos cliqueado nada. De allí que sea tan peligroso, y de allí que se le considere de alto riesgo.</p><div class="relative header-and-anchor"><h3 id="h-como-lo-hago"><strong>¿Cómo lo hago?</strong></h3></div><p style="text-align: justify">En <strong>WhatsApp</strong>, ve a <em>Configuración - Almacenamiento y datos</em>, y en <em>"descarga automática de archivos"</em>, configúralas todas en <strong>"nunca"</strong>. Hazlo tanto para las fotos, los vídeos, los audios y los documentos.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b203e32bff7c42729551e390f47429ce.png" blurdataurl="data:image/png;base64,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" nextheight="943" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">En el caso de <strong>Telegram</strong>, la configuración es similar. Entra en <em>Ajustes - Datos y almacenamiento - Autodescarga de multimedia</em>, y desactiva la descarga automática tanto para datos móviles como para Wi-Fi. Estas y otras configuraciones de seguridad para <strong>Telegram</strong> las puedes ampliar en esta <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://inleo.io/@gorayii/una-armadura-para-telegram-seguridad-y-privacidad-">publicación.</a></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/aa062f06707c077791401d91513cae9e.png" blurdataurl="data:image/png;base64,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" nextheight="674" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Recuerda siempre mantener actualizados tus dispositivos: sistema operativo, aplicaciones, extensiones, etc. Te invito a consultar otras publicaciones asociadas al tema en la <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/coleccion-de-contenido-relacionado-con-la-seguridad-de-la-informacion-or-ciberseguridad">Colección de Ciberseguridad</a>.</p><div class="relative header-and-anchor"><h3 id="h-mantengamonos-alertas-y-seguros"><strong>Mantengámonos alertas y seguros.</strong></h3></div><div data-type="details" class="details"><p data-type="detailsSummary" class="detailsSummary"><span style="margin-right: 8px">▼</span><strong>ENGLISH VERSION</strong></p><div data-type="detailsContent" class="detailsContent"><div class="relative header-and-anchor"><h3 style="text-align: justify" id="h-what-to-do-in-this-case"><strong>What to do in this case?</strong></h3></div><p style="text-align: justify">In the specific case of the <strong>iMessage</strong> exploit, the immediate suggested recommendation is to <strong>disable iMessage</strong> until Apple announces an update or patch that can close that backdoor and fix the vulnerability. <em>Settings - messages - iMessage - off</em>.<br><br>Now, a general recommendation to mitigate zero-click risks or clickless attacks, and this applies beyond this specific exploit, is to <strong>disable automatic file downloads in messaging applications (Telegram, WhatsApp)</strong>. This means that nothing sent to us will be automatically downloaded to our devices, and we'll have the option, depending on whether we trust the sender or the source, to download it or not.<br><br>Remember, a <strong>zero-click attack</strong> is effective simply by receiving the infected file and having it downloaded to the device, without us having clicked anything. Hence, it's so dangerous, and why it's considered high-risk.</p><div class="relative header-and-anchor"><h4 style="text-align: justify" id="h-how-do-i-do-it"><strong>How do I do it?</strong></h4></div><p style="text-align: justify">In <strong>WhatsApp</strong>, go to <em>Settings - Storage and data</em>, and under <em>"Automatic download of media,"</em> set them all to <strong>"never."</strong> Do this for photos, videos, audios, and documents.<br><br>In the case of <strong>Telegram</strong>, the configuration is similar. Go to <em>Settings - Data and storage - Autodownload of media</em>, and disable automatic download for both mobile data and Wi-Fi. You can find these and other security settings for Telegram in this <a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://inleo.io/@gorayii/una-armadura-para-telegram-seguridad-y-privacidad-">post.</a><br><br>Always remember to keep your devices updated: operating system, applications, extensions, etc. I invite you to consult other publications related to this topic in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://peakd.com/hive-106817/@gorayii/coleccion-de-contenido-relacionado-con-la-seguridad-de-la-informacion-or-ciberseguridad">Cybersecurity Collection.</a><br><br>Let's stay alert and safe.</p></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/f47198aee9127a3876c016644f776eba.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAABCAIAAAAw6DswAAAACXBIWXMAABcRAAAXEQHKJvM/AAAADklEQVR4nGP4f8GKpggAcEVBIa5NGc0AAAAASUVORK5CYII=" nextheight="10" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify"><code>Diseño de miniatura en Canva.com.<br>Capturas de pantalla de las apps Telegram y Whatsapp para iOS.</code></p><div data-type="subscribeButton" class="center-contents"><a class="email-subscribe-button" href="https://paragraph.xyz/@gorayii/memberships">Subscribe</a></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/2963a8255d9fd66b9035b24cdc6fe1b9.png" blurdataurl="data:image/png;base64,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" nextheight="128" nextwidth="1024" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p></p>]]></content:encoded>
            <author>gorayii@newsletter.paragraph.com (Raicelys Gómez | Gorayii)</author>
            <category>cybersecurity</category>
            <category>zero-day</category>
            <category>zero-click</category>
            <category>technology</category>
            <category>android</category>
            <category>ios</category>
            <category>exploit</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/9fb31756631a33157dfbffe02b461b8a.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Metaverso...de la ficción a la realidad]]></title>
            <link>https://paragraph.com/@gorayii/metaverso</link>
            <guid>Xdmmhwb8PXZiXyIyCq0d</guid>
            <pubDate>Wed, 24 Apr 2024 14:19:01 GMT</pubDate>
            <description><![CDATA[MetaversoDécadas atrás, soñaba con mundos más allá de lo real, mundos paralelos que solo existían en mi imaginación, alimentados en gran medida por l...]]></description>
            <content:encoded><![CDATA[<figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/329ca7f8ad4fa0c97388eb85ef3bcbd2.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h1 id="h-metaverso">Metaverso</h1></div><p style="text-align: justify">Décadas atrás, soñaba con mundos más allá de lo real, mundos paralelos que solo existían en mi imaginación, alimentados en gran medida por los cómics de superhéroes. Para entonces, eran solo sueños. Hablar de realidad aumentada, realidad virtual o inteligencia artificial era impensable o, al menos, solo producto de la ciencia ficción. Hoy, esos sueños de infancia son una realidad, y todos esos conceptos convergen en un universo virtual tridimensional en forma de <strong>metaversos</strong>. Trascendimos a espacios virtuales donde la creatividad y la tecnología se entrelazan para crear mundos digitales de infinitas posibilidades.</p><p style="text-align: justify">Lo que antes solo existía en nuestra imaginación, hoy está en boca de todos. Los metaversos son la tendencia. Hablamos de mundos que, aunque no existen físicamente, vivimos en tiempo real. Son completamente inmersivos, al punto que nos permiten interactuar, jugar, socializar y colaborar en proyectos comunes, tal y como lo haríamos en la vida real. Digamos que son una extensión del mundo real en un entorno virtualizado en el que se cruzan los límites del espacio y el tiempo.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/329ca7f8ad4fa0c97388eb85ef3bcbd2.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/0e1461b01d0eec6e0d3f9f39f8f90447.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/2f1b2d29029e16e0e992d70e5b328cde.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Para mí, los metaversos son como los multiversos de Marvel, pero en lugar de existir en historietas, películas o series, estos existen en el vasto reino digital. Visto así, un metaverso es como una especie de universo paralelo, que tiene sus propias reglas y sus propias realidades, en las que como usuarios podemos sumergirnos en esa aventura para vivir y descubrir nuevas experiencias en un espacio totalmente virtualizado. Cuando entramos en un metaverso, cruzamos un portal entre lo real y lo virtual, pasamos a un mundo en el que podemos explorar, construir o simplemente socializar en un café, en un evento, una actividad, o una fiesta.</p><p style="text-align: justify">Así como nuestras historietas favoritas nos inspiraron a creer en lo imposible, los metaversos nos invitan a atrevernos, a explorar, crear y conectar en formas que antes solo podíamos soñar. Así que aquí estamos, en un maravilloso momento siendo testigos y protagonistas de la transición entre el pasado y el futuro, entre la niñez y la nueva realidad.</p><p style="text-align: justify">Suena fascinante, ¿verdad? Lo es, realmente lo es. ¿Te atreves a sumergirte en esta aventura? Pues bien, podrías comenzar con alguno de los mencionados en el siguiente listado:</p><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://somniumspace.com/parcel/citycenter"><strong>Somnium Space</strong></a></p></li></ul><div data-type="embedly" src="https://somniumspace.com/parcel/" data="{&quot;provider_url&quot;:&quot;https://somniumspace.com&quot;,&quot;description&quot;:&quot;Explore the Somnium Space Metaverse right in your web browser - visit this link to explore in 3D or VR.&quot;,&quot;title&quot;:&quot;Somnium Space WEB&quot;,&quot;thumbnail_width&quot;:577,&quot;url&quot;:&quot;https://somniumspace.com/parcel/&quot;,&quot;thumbnail_url&quot;:&quot;https://somniumspace.com/somweb/Logo_black.png&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Somniumspace&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:191}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://somniumspace.com/parcel/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://somniumspace.com/somweb/Logo_black.png" class="false"><div class="twitter-summary-card-text"><span>https://somniumspace.com</span><h2>Somnium Space WEB</h2><p>Explore the Somnium Space Metaverse right in your web browser - visit this link to explore in 3D or VR.</p></div></div></a></div></div><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://www.sandbox.game/en/"><strong>The Sandbox</strong></a></p></li></ul><div data-type="embedly" src="https://www.sandbox.game/en/" data="{&quot;provider_url&quot;:&quot;https://www.sandbox.game&quot;,&quot;description&quot;:&quot;Welcome to The Sandbox Metaverse, an online gaming platform that offers a unique and immersive gaming experience. Monetize your NFTs in the blockchain. Create &amp; Play!&quot;,&quot;title&quot;:&quot;The Sandbox Game - Own The Future. Play, Create, Earn&quot;,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://www.sandbox.game/en/&quot;,&quot;thumbnail_url&quot;:&quot;https://www.sandbox.game/img/00_General/seo/home.png&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;The Sandbox&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:630}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://www.sandbox.game/en/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://www.sandbox.game/img/00_General/seo/home.png" class="false"><div class="twitter-summary-card-text"><span>https://www.sandbox.game</span><h2>The Sandbox Game - Own The Future. Play, Create, Earn</h2><p>Welcome to The Sandbox Metaverse, an online gaming platform that offers a unique and immersive gaming experience. Monetize your NFTs in the blockchain. Create &amp; Play!</p></div></div></a></div></div><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://staratlas.com/"><strong>Star Atlas</strong></a></p></li></ul><div data-type="embedly" src="https://staratlas.com/" data="{&quot;provider_url&quot;:&quot;https://staratlas.com&quot;,&quot;description&quot;:&quot;A grand strategy game of space exploration, territorial conquest, political domination, and living among the stars.&quot;,&quot;title&quot;:&quot;StarAtlas.com | Home&quot;,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://staratlas.com/&quot;,&quot;thumbnail_url&quot;:&quot;https://staratlas.com/assets/images/star_atlas_social_share.png&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Staratlas&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:628}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://staratlas.com/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://staratlas.com/assets/images/star_atlas_social_share.png" class="false"><div class="twitter-summary-card-text"><span>https://staratlas.com</span><h2>StarAtlas.com | Home</h2><p>A grand strategy game of space exploration, territorial conquest, political domination, and living among the stars.</p></div></div></a></div></div><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://decentraland.org/"><strong>Decentraland</strong></a></p></li></ul><div data-type="embedly" src="https://decentraland.org/" data="{&quot;provider_url&quot;:&quot;https://decentraland.org&quot;,&quot;description&quot;:&quot;Explore the first decentralized metaverse that is built, governed, and owned by its users. Discover different districts, meet people, party at events, and more!&quot;,&quot;title&quot;:&quot;Welcome to Decentraland&quot;,&quot;thumbnail_width&quot;:1920,&quot;url&quot;:&quot;https://decentraland.org/&quot;,&quot;thumbnail_url&quot;:&quot;https://images.ctfassets.net/ea2ybdmmn1kv/1fkel3KZDoWgKlvAcSJ9Ao/23fcd4740065129f7d93f2dc0d66da4a/hero-banner.webp&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Decentraland&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:650}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://decentraland.org/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://images.ctfassets.net/ea2ybdmmn1kv/1fkel3KZDoWgKlvAcSJ9Ao/23fcd4740065129f7d93f2dc0d66da4a/hero-banner.webp" class="false"><div class="twitter-summary-card-text"><span>https://decentraland.org</span><h2>Welcome to Decentraland</h2><p>Explore the first decentralized metaverse that is built, governed, and owned by its users. Discover different districts, meet people, party at events, and more!</p></div></div></a></div></div><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://www.spatial.io/"><strong>Spatial</strong></a></p></li></ul><div data-type="embedly" src="https://www.spatial.io/" data="{&quot;provider_url&quot;:&quot;https://www.spatial.io&quot;,&quot;description&quot;:&quot;Spatial has the most fun collection of free online games. No download required. Play our beautifully crafted 3D games with friends on web, mobile, and VR.&quot;,&quot;title&quot;:&quot;Spatial - Free Online Games 🚀 Play now!&quot;,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://www.spatial.io/&quot;,&quot;thumbnail_url&quot;:&quot;https://dd2cgqlmnwvp5.cloudfront.net/spatial.io/og-image.jpg&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Spatial&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:630}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://www.spatial.io/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://dd2cgqlmnwvp5.cloudfront.net/spatial.io/og-image.jpg" class="false"><div class="twitter-summary-card-text"><span>https://www.spatial.io</span><h2>Spatial - Free Online Games 🚀 Play now!</h2><p>Spatial has the most fun collection of free online games. No download required. Play our beautifully crafted 3D games with friends on web, mobile, and VR.</p></div></div></a></div></div><ul><li><p><a target="_blank" rel="nofollow noopener" class="dont-break-out" href="https://secondlife.com/"><strong>SecondLife</strong></a></p></li></ul><div data-type="embedly" src="https://secondlife.com/" data="{&quot;provider_url&quot;:&quot;https://secondlife.com&quot;,&quot;description&quot;:&quot;Second Life's official website. Second Life is a free 3D virtual world and original metaverse where users can create, connect, and chat with others from around the world using voice and text.&quot;,&quot;title&quot;:&quot;Official Site | Second Life - Virtual Worlds, Virtual Reality, VR, Avatars, and Free 3D Chat&quot;,&quot;url&quot;:&quot;https://secondlife.com/&quot;,&quot;thumbnail_width&quot;:1709,&quot;thumbnail_url&quot;:&quot;https://assets-global.website-files.com/60a83025d932b623a6a61ff8/62bf14da5f2a450d40be7c01_Pride-2019.jpg&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Secondlife&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:969}" format="small"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="twitter-card-link" href="https://secondlife.com/" target="_blank" rel="noreferrer"><div class="twitter-summary"><img src="https://assets-global.website-files.com/60a83025d932b623a6a61ff8/62bf14da5f2a450d40be7c01_Pride-2019.jpg" class="false"><div class="twitter-summary-card-text"><span>https://secondlife.com</span><h2>Official Site | Second Life - Virtual Worlds, Virtual Reality, VR, Avatars, and Free 3D Chat</h2><p>Second Life's official website. Second Life is a free 3D virtual world and original metaverse where users can create, connect, and chat with others from around the world using voice and text.</p></div></div></a></div></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/05cb98ab8ab819d85777da8947bb50cf.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div class="relative header-and-anchor"><h3 id="h-decentraland">Decentraland</h3></div><p style="text-align: justify">Obviamente, estos no son los únicos metaversos que existen actualmente, como tampoco significa que uno sea mejor que otro, pues cada uno contempla su propio concepto. Hablemos, por ejemplo, de <strong>Decentraland</strong>, uno de los favoritos entre la comunidad cripto. ¿Por qué? Pues, Decentraland es descentralizado, construido sobre tecnología blockchain, lo que significa que no está controlado por una sola entidad. De manera que, tanto la propiedad de las tierras, que es su principal atractivo, y la de los demás activos digitales dentro del mundo, son propiedad de los usuarios. Hablamos entonces, de libertad y propiedad.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/2a5cc2feb68c64c9228c5534a64b80fb.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAVCAIAAACor3u9AAAACXBIWXMAAAsTAAALEwEAmpwYAAABtUlEQVR4nGPgpjFgIKiCh4eHj4eHlw8d8PDwUMECHh5udnZ2BmZmJmZmBjBgYmKCMJiZmSm1gIeHh5mN3URJera/e2BAoIurq4uLi7e3t5+fn5eXl729PeUWcLOys2vJSZXa2zg6OgYEBvr5+np7e4eCgYODAwcHx+AOIgjg4eHh5eHh5eLi5ebm5YaQIESdSAYBLi5uPj5OGTkuKWkQKS0DQuKSIHEqWMDDw8POziUlyx+VxBsYweUTxO0fyh8Rz+Huw83JSSUL2Ng4lVVlajvEC8q1l26Sb+mTKmsQTsmhngWsrGwa2qpTFyp1T/X5+9941wml7qnSFU3Us4CFhUXXQHvpBvMjV0L+/3d//19n+TaFtglUtICZxdDUaNsx6/P3Av7/d3vzz3TfaZVJc6llAS83MzOzibnF8WvmRy55fPxvd/Ol+ZGrGvNXUckCPj6QBcbmnt/+e/367/EFhPz//zfadoSHjRWUD6mSD3gEBISSs9RnL9NZvkV76Qbl3umsto48bGxUsoAbZAcvAwMPAwM3EwM3IyMviMFEjOlEW8ANDis44ucHkcQBoi3gJhMMfQsANp2mCEgszjsAAAAASUVORK5CYII=" nextheight="495" nextwidth="762" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Para entender más o menos de qué va Decentraland, imaginemos un lugar virtual en el que podemos construir nuestra propia casa, abrir una tienda, un negocio, asistir a eventos y actividades en vivo, quedar para jugar con amigos, o simplemente explorar como Heidy en el campo. Pues de eso va Decentraland, es un metaverso donde como usuarios tenemos el control total de lo que será nuestra experiencia, la cual, valga decirse, en primera instancia es increíble, súper inmersiva e intuitiva para el usuario promedio.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/685eb78a980c9b17b3c120abfa439a52.jpg" blurdataurl="data:image/png;base64,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" nextheight="720" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/dcec26f8e7e401b5a65a76d29a20038e.jpg" blurdataurl="data:image/png;base64,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" nextheight="720" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">Lo que en el mundo real podemos hacer con dólares, euros u otra moneda fiduciaria, en Decentraland lo hacemos con su propio token ($MANA), con el cual podemos comprar, vender y comerciar bienes y servicios, incluyendo las llamadas LAND, que tal y como en la vida real se pueden negociar o rentabilizar según el esquema de negocio del propietario. Por cierto, y como dato curioso, el concepto de tierras ha sido tan novedoso que ha atraído importantes inversores, al punto que se han vendido hasta por millones de dólares. ¡Sí, una locura!</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a3408735ea2409c9493ee89890af0fa5.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify">¡Amo la tecnología!... Qué dicha y qué privilegio poder vivir este momento, ser testigos de toda la innovación tecnológica presente y suponer lo que podría depararnos a futuro. Conceptos como el de metaverso podrían ser apenas la punta del iceberg. Avanzamos a un punto en el que la línea que nos separa de la virtualidad se va disipando poco a poco, mejorando la experiencia del usuario y ofreciéndonos grandes oportunidades de desarrollo, crecimiento y monetización.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/4e8d99af02afeb0da0a9e5fc38c2ae5e.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p style="text-align: justify"><code>Diseño de miniatura en Canva.com.<br>Capturas de pantalla de mi cuenta en Decentraland.</code><em><br></em></p><div data-type="subscribeButton" class="center-contents"><a class="email-subscribe-button" href="https://paragraph.xyz/@gorayii/memberships">Subscribe</a></div><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b472d4144964981e299e94cdc1a7e08b.png" blurdataurl="data:image/png;base64,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" nextheight="128" nextwidth="1024" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p></p>]]></content:encoded>
            <author>gorayii@newsletter.paragraph.com (Raicelys Gómez | Gorayii)</author>
            <category>metaverse</category>
            <category>web3</category>
            <category>vr</category>
            <category>ar</category>
            <category>ia</category>
            <category>blockchain</category>
            <category>decentraland</category>
            <category>technology</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/17e5adcc6f4df35f98d55f31c308c734.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>