{"id":7983,"date":"2011-10-12T22:00:00","date_gmt":"2011-10-12T22:00:00","guid":{"rendered":"https:\/\/networks.imdea.org\/desvelando-el-lado-oscuro-de-bittorrent\/"},"modified":"2021-01-08T16:18:59","modified_gmt":"2021-01-08T15:18:59","slug":"desvelando-el-lado-oscuro-de-bittorrent","status":"publish","type":"post","link":"https:\/\/networks.imdea.org\/es\/desvelando-el-lado-oscuro-de-bittorrent\/","title":{"rendered":"Desvelando el lado oscuro de BitTorrent"},"content":{"rendered":"<p><\/p>\n<p class=\"rtejustify\"><!--more-->Con decenas de millones de usuarios, descargas diarias, el 60% del tr\u00e1fico upstream y el 20% del tr\u00e1fico downstream en Europa, BitTorrent es la aplicaci\u00f3n de intercambio de archivos P2P (Peer to Peer) m\u00e1s popular del mundo y representa una parte significativa del tr\u00e1fico actual en Internet. Sin embargo, esta gran popularidad no s\u00f3lo atrae a usuarios habituales del intercambio de archivos, sino tambi\u00e9n a usuarios malintencionados.<\/p>\n<p class=\"rtejustify\" style=\"text-align: left;\"><img decoding=\"async\" style=\"float: left; margin: 10px; width: 150px;\" src=\"\/Portals\/7\/Imagenes\/Noticias\/bittorrent-300x300.jpg\" alt=\"\" \/>La investigaci\u00f3n desarrollada por el <a href=\"http:\/\/www.networks.imdea.org\">Institute IMDEA Networks<\/a>, la <a href=\"http:\/\/www.uc3m.es\" target=\"_blank\" rel=\"noopener noreferrer\">Universidad Carlos III de Madrid<\/a> y el <a href=\"http:\/\/www.it-sudparis.eu\/en_accueil.html\" target=\"_blank\" rel=\"noopener noreferrer\">Institut Telecom Sud Paris<\/a>, \u201c<a href=\"http:\/\/arxiv.org\/PS_cache\/arxiv\/pdf\/1105\/1105.3671v2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TorrentGuard: stopping scam and malware\u00a0distribution in the BitTorrent ecosystem<\/a>\u201d, se enfoc\u00f3 en el fen\u00f3meno de la publicaci\u00f3n de contenidos falsos y maliciosos en el ecosistema BitTorrent. Se examinaron treinta mil torrents publicados en el portal PirateBay durante un per\u00edodo de dos semanas. Los resultados mostraron que el 35% de los torrents analizados se asociaban a contenidos falsos. Esto significa que uno de cada tres torrents tiene un contenido distinto al que se describe en el t\u00edtulo.<\/p>\n<p class=\"rtejustify\"><img decoding=\"async\" style=\"float: right; margin: 10px; width: 250px;\" src=\"\/Portals\/7\/Imagenes\/Noticias\/the_pirate_bay.png\" alt=\"\" \/> PirateBay, el portal m\u00e1s popular de BitTorrent, elimina todos los torrents que se demuestra que son falsos, junto con la cuenta de usuario que public\u00f3 el contenido. Los torrents falsos son identificados por los usuarios que efect\u00faan descargas, quienes informan a PirateBay, el cual, a su vez, elimina el torrent y la cuenta de usuario. Pese a este mecanismo de detecci\u00f3n\/eliminaci\u00f3n, una de cada cuatro descargas de BitTorrent tiene contenidos falsos. Esto supone una grave amenaza que todav\u00eda no se ha resuelto.<\/p>\n<p class=\"rtejustify\">El estudio muestra que s\u00f3lo 20 editores son responsables de la inyecci\u00f3n del 90% de los contenidos falsos que aparecen en el ecosistema BitTorrent. La mayor\u00eda de estos editores utilizan servidores dedicados de empresas extranjeras, con el fin de tener suficientes recursos para sus actividades, as\u00ed como para ocultar su identidad. Se dedica un enorme esfuerzo a distribuir estos contenidos falsos, porque los portales eliminan todas las cuentas desde las cuales se publican dichos contenidos, y se han de crear cuentas nuevas continuamente. El estudio tambi\u00e9n describe distintas t\u00e9cnicas utilizadas por los editores para atraer a los usuarios a sus contenidos. Estas t\u00e9cnicas incluyen el uso de t\u00edtulos de pel\u00edculas de \u00e9xito o la falsificaci\u00f3n de las estad\u00edsticas de rendimiento de un torrent para que parezca m\u00e1s popular. Esta enorme inversi\u00f3n de dinero y recursos s\u00f3lo puede explicarse por las fuertes motivaciones que impulsan la distribuci\u00f3n de contenidos falsos.<\/p>\n<p class=\"rtejustify\"><img decoding=\"async\" style=\"float: right; margin: 10px; width: 250px;\" src=\"\/Portals\/7\/Imagenes\/Noticias\/p2p_redorbit_news.gif\" alt=\"\" \/> Con el fin de identificar estas motivaciones, los investigadores examinaron a fondo una gran cantidad de contenidos falsos. Su an\u00e1lisis demostr\u00f3 que los editores de contenidos falsos se ajustan a tres perfiles distintos. Un sesenta y cinco por ciento de ellos explotan la popularidad del sistema BitTorrent para propagar r\u00e1pidamente malware entre miles de usuarios. El contenido publicado puede ser malware en s\u00ed mismo, pero algunos editores utilizan t\u00e9cnicas m\u00e1s sofisticadas. Publican pel\u00edculas con t\u00edtulos atrayentes, que se abren en un reproductor con ventanas emergentes. En \u00e9stas se le pide al usuario que instale nuevos codecs, y proporcionan el enlace a una URL donde pueden descargarse. El software de seguridad y antivirus detecta el archivo que contiene los codecs falsos como malware.<\/p>\n<p class=\"rtejustify\">Por otra parte, el 35% de los editores de contenidos falsos son estafadores. Utilizan el ecosistema torrent para atraer a los usuarios a sus p\u00e1ginas web, donde llevan a cabo distintos tipos de fraudes. Por ejemplo, pueden pedir a las v\u00edctimas que proporcionen su n\u00famero de tarjeta de cr\u00e9dito o que participen en concursos con SMS premium. Por tanto, lo que motiva a estos editores es el dinero. El resultado es que un porcentaje muy reducido de los torrents falsos se origina en las agencias antipirater\u00eda. Al contrario que los otros dos tipos de editores, que tienen motivaciones fraudulentas, las agencias antipirater\u00eda publican versiones falsas de los contenidos bajo derechos de autor que desean proteger. Las medidas de las agencias antipirater\u00eda se ven limitadas por la cantidad de contenido (a solicitud de una empresa) y el tiempo disponible (en las semanas antes y despu\u00e9s de que el contenido, por ejemplo una pel\u00edcula, se estrene).<\/p>\n<p class=\"rtejustify\">Con el fin de protegerse contra los torrents falsos, los investigadores desarrollaron y evaluaron un software llamado \u201cTorrentGuard\u201d. Este programa utiliza el portal PirateBay para recopilar las direcciones IP utilizadas para distribuir los contenidos falsos. Estas direcciones se ponen luego en una lista negra. El software tambi\u00e9n controla cada torrent publicado en PirateBay y lo marca como falso si se ha utilizado una direcci\u00f3n IP de la lista negra para servir el contenido. Con este m\u00e9todo es posible identificar los contenidos falsos poco despu\u00e9s de que se publiquen por primera vez, lo cual acelera el proceso de detecci\u00f3n. El software est\u00e1 a disposici\u00f3n del p\u00fablico y se puede acceder a \u00e9l a trav\u00e9s de una p\u00e1gina web o de un popular plug-in para los clientes de BitTorrent. El uso generalizado de esta herramienta podr\u00eda evitar hasta 35 millones de descargas de contenidos falsos cada a\u00f1o, contribuyendo as\u00ed a reducir el n\u00famero de infecciones inform\u00e1ticas y episodios fraudulentos a los que se enfrentan los usuarios de BitTorrent.<\/p>\n<p class=\"rtecenter\">El estudio fue realizado por <a href=\"http:\/\/fourier.networks.imdea.org\/~michal_kryczka\/\" target=\"_blank\" rel=\"noopener noreferrer\">Michal Kryczka<\/a>, del Institute IMDEA Networks, <a href=\"http:\/\/www.it.uc3m.es\/~rcuevas\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Rub\u00e9n Cuevas<\/a>, <a href=\"http:\/\/enjambre.it.uc3m.es\/~rgonzalez\/\" target=\"_blank\" rel=\"noopener noreferrer\">Roberto Gonz\u00e1lez<\/a> y <a href=\"http:\/\/www.it.uc3m.es\/~azcorra\/indice.html\" target=\"_blank\" rel=\"noopener noreferrer\">Arturo Azcorra<\/a> de la Universidad Carlos III de Madrid, y <a href=\"http:\/\/www-public.it-sudparis.eu\/~cuevas_r\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u00c1ngel Cuevas<\/a> del Institut Telecom Sud Paris (Francia).<\/p>\n<p><strong>Leer m\u00e1s:<\/strong><br \/>\n<a href=\"http:\/\/www.madrimasd.org\/informacionIdi\/analisis\/opinion\/opinion.asp?id=50081\" target=\"_blank\" rel=\"noopener noreferrer\">Madrimasd &#8211; Notiweb<\/a><\/p>\n<p>&nbsp;<\/p>\n<div style=\"min-height: 30px;\"><a target=\"_blank\" rel=\"noindex,nofollow\" href=\"https:\/\/networks.imdea.org\/es\/desvelando-el-lado-oscuro-de-bittorrent\/?format=pdf\" title=\"Download PDF\"><img decoding=\"async\" style=\"float: left;max-width: 50px;\" alt=\"Download PDF\" src=\"https:\/\/networks.imdea.org\/wp-content\/plugins\/wp-advanced-pdf\/asset\/images\/pdf.png\"><\/a><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":20885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,1187],"tags":[500,465,467],"class_list":["post-7983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","category-press-release","tag-content-delivery-networks","tag-internet","tag-uc3m"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Desvelando el lado oscuro de BitTorrent - IMDEA Networks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desvelando el lado oscuro de BitTorrent - IMDEA Networks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/\" \/>\n<meta property=\"og:site_name\" content=\"IMDEA Networks\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-12T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-08T15:18:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"799\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"in_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"in_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/\"},\"author\":{\"name\":\"in_admin\",\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67\"},\"headline\":\"Desvelando el lado oscuro de BitTorrent\",\"datePublished\":\"2011-10-12T22:00:00+00:00\",\"dateModified\":\"2021-01-08T15:18:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/\"},\"wordCount\":1708,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg\",\"keywords\":[\"Content-delivery networks\",\"Internet\",\"UC3M\"],\"articleSection\":[\"Noticias\",\"Press release\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/\",\"url\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/\",\"name\":\"Desvelando el lado oscuro de BitTorrent - IMDEA Networks\",\"isPartOf\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg\",\"datePublished\":\"2011-10-12T22:00:00+00:00\",\"dateModified\":\"2021-01-08T15:18:59+00:00\",\"author\":{\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67\"},\"breadcrumb\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage\",\"url\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg\",\"contentUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg\",\"width\":799,\"height\":504},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/networks.imdea.org\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unrevealing the dark side of BitTorrent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/networks.imdea.org\/es\/#website\",\"url\":\"https:\/\/networks.imdea.org\/es\/\",\"name\":\"IMDEA Networks\",\"description\":\"IMDEA Networks Multisite\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/networks.imdea.org\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67\",\"name\":\"in_admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/networks.imdea.org\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4fd5849709f4f0a3c17a6da181c537d91bc0fce2505fb75c0293ba6963162590?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4fd5849709f4f0a3c17a6da181c537d91bc0fce2505fb75c0293ba6963162590?s=96&d=mm&r=g\",\"caption\":\"in_admin\"},\"url\":\"https:\/\/networks.imdea.org\/es\/author\/in_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Desvelando el lado oscuro de BitTorrent - IMDEA Networks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/","og_locale":"es_ES","og_type":"article","og_title":"Desvelando el lado oscuro de BitTorrent - IMDEA Networks","og_url":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/","og_site_name":"IMDEA Networks","article_published_time":"2011-10-12T22:00:00+00:00","article_modified_time":"2021-01-08T15:18:59+00:00","og_image":[{"width":799,"height":504,"url":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg","type":"image\/jpeg"}],"author":"in_admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"in_admin","Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#article","isPartOf":{"@id":"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/"},"author":{"name":"in_admin","@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67"},"headline":"Desvelando el lado oscuro de BitTorrent","datePublished":"2011-10-12T22:00:00+00:00","dateModified":"2021-01-08T15:18:59+00:00","mainEntityOfPage":{"@id":"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/"},"wordCount":1708,"commentCount":0,"image":{"@id":"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage"},"thumbnailUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg","keywords":["Content-delivery networks","Internet","UC3M"],"articleSection":["Noticias","Press release"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/","url":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/","name":"Desvelando el lado oscuro de BitTorrent - IMDEA Networks","isPartOf":{"@id":"https:\/\/networks.imdea.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage"},"image":{"@id":"https:\/\/networks.imdea.org\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage"},"thumbnailUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg","datePublished":"2011-10-12T22:00:00+00:00","dateModified":"2021-01-08T15:18:59+00:00","author":{"@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67"},"breadcrumb":{"@id":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/"]]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#primaryimage","url":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg","contentUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2021\/01\/media-file-torrentguard.jpg","width":799,"height":504},{"@type":"BreadcrumbList","@id":"https:\/\/networks.imdea.org\/es\/unrevealing-the-dark-side-of-bittorrent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/networks.imdea.org\/es\/"},{"@type":"ListItem","position":2,"name":"Unrevealing the dark side of BitTorrent"}]},{"@type":"WebSite","@id":"https:\/\/networks.imdea.org\/es\/#website","url":"https:\/\/networks.imdea.org\/es\/","name":"IMDEA Networks","description":"IMDEA Networks Multisite","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/networks.imdea.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/f70fb6a680a52d2833b7db1bf8bbad67","name":"in_admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/networks.imdea.org\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4fd5849709f4f0a3c17a6da181c537d91bc0fce2505fb75c0293ba6963162590?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fd5849709f4f0a3c17a6da181c537d91bc0fce2505fb75c0293ba6963162590?s=96&d=mm&r=g","caption":"in_admin"},"url":"https:\/\/networks.imdea.org\/es\/author\/in_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/7983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/comments?post=7983"}],"version-history":[{"count":2,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/7983\/revisions"}],"predecessor-version":[{"id":20886,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/7983\/revisions\/20886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/media\/20885"}],"wp:attachment":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/media?parent=7983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/categories?post=7983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/tags?post=7983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}