{"id":4423,"date":"2016-08-01T21:35:05","date_gmt":"2016-08-02T00:35:05","guid":{"rendered":"https:\/\/rafael.bonifaz.ec\/blog\/?p=4423"},"modified":"2016-08-01T21:58:32","modified_gmt":"2016-08-02T00:58:32","slug":"debian-ahora-accesible-desde-servicios-ocultos","status":"publish","type":"post","link":"https:\/\/rafael.bonifaz.ec\/blog\/2016\/08\/debian-ahora-accesible-desde-servicios-ocultos\/","title":{"rendered":"Debian ahora accesible desde servicios ocultos."},"content":{"rendered":"<p>Debian anunci\u00f3 que varias de sus p\u00e1ginas web, as\u00ed como sus repositorios ser\u00e1n accesibles a <a href=\"https:\/\/bits.debian.org\/2016\/08\/debian-and-tor-services-available-as-onion-services.html\" target=\"_blank\">trav\u00e9s de servicios ocultos sin salir de la red Tor<\/a>.<\/p>\n<h3 class='related_post_title'>Art\u00edculos relacionados<\/h3><ul class='related_post'><li><a href=\"https:\/\/rafael.bonifaz.ec\/blog\/2016\/11\/subgraph-os-para-la-privacidad-y-anonimato\/\" title=\"Subgraph OS para la privacidad y anonimato\">Subgraph OS para la privacidad y anonimato<\/a><\/li><li><a href=\"https:\/\/rafael.bonifaz.ec\/blog\/2015\/02\/acceder-a-un-computado-a-traves-de-tor-sin-ip-publico\/\" title=\"Acceder a un Computador a trav\u00e9s de Tor sin IP P\u00fablico\">Acceder a un Computador a trav\u00e9s de Tor sin IP P\u00fablico<\/a><\/li><li><a href=\"https:\/\/rafael.bonifaz.ec\/blog\/2013\/04\/presentacion-software-libre-criptografia-y-privacidad-spaceapps_ecu\/\" title=\"Presentaci\u00f3n: Software Libre, Criptograf\u00eda y Privacidad #spaceapps_ecu\">Presentaci\u00f3n: Software Libre, Criptograf\u00eda y Privacidad #spaceapps_ecu<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Debian anunci\u00f3 que varias de sus p\u00e1ginas web, as\u00ed como sus repositorios ser\u00e1n accesibles a trav\u00e9s de servicios ocultos sin salir de la red Tor. Art\u00edculos relacionadosSubgraph OS para la privacidad y anonimatoAcceder a un Computador a trav\u00e9s de Tor sin IP P\u00fablicoPresentaci\u00f3n: Software Libre, Criptograf\u00eda y Privacidad #spaceapps_ecu<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[1,121,3],"tags":[71,101,172,117],"class_list":["post-4423","post","type-post","status-publish","format-aside","hentry","category-general","category-privacidad","category-software-libre","tag-debian","tag-seguridades","tag-software-libre","tag-tor","post_format-post-format-aside"],"_links":{"self":[{"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/posts\/4423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/comments?post=4423"}],"version-history":[{"count":3,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/posts\/4423\/revisions"}],"predecessor-version":[{"id":4426,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/posts\/4423\/revisions\/4426"}],"wp:attachment":[{"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/media?parent=4423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/categories?post=4423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rafael.bonifaz.ec\/blog\/wp-json\/wp\/v2\/tags?post=4423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}