{"id":186743,"date":"2026-05-07T22:47:30","date_gmt":"2026-05-07T22:47:30","guid":{"rendered":"http:\/\/69fcd1cbe9313cddedb534fc"},"modified":"2026-05-07T22:47:30","modified_gmt":"2026-05-07T22:47:30","slug":"miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet","status":"publish","type":"post","link":"https:\/\/sarmiento24h.com\/?p=186743","title":{"rendered":"Miles de apps programadas por la IA desparraman datos confidenciales por internet"},"content":{"rendered":"<p>\u00abSeg\u00fan la informaci\u00f3n limitada que compartieron, la principal afirmaci\u00f3n de RedAccess parece ser que algunos usuarios han publicado aplicaciones en la web abierta que deber\u00edan haber sido privadas\u00bb, escribi\u00f3 Amjad Masad, CEO de Replit, en una respuesta en X. \u00abReplit permite a los usuarios elegir si las aplicaciones son p\u00fablicas o privadas. Que las aplicaciones p\u00fablicas sean accesibles en internet es lo esperado. La configuraci\u00f3n de privacidad se puede cambiar en cualquier momento con un solo clic\u00bb.<\/p>\n<p>Un portavoz de Lovable respondi\u00f3 en un comunicado: \u00abEn Lovable nos tomamos muy en serio los informes sobre datos expuestos y sitios de <em>phishing<\/em>, y estamos trabajando activamente para obtener la informaci\u00f3n necesaria para investigar. Este asunto sigue en curso. Cabe destacar que Lovable proporciona a los desarrolladores las herramientas para crear aplicaciones de forma segura, pero la configuraci\u00f3n de la aplicaci\u00f3n es, en \u00faltima instancia, responsabilidad del creador\u00bb.<\/p>\n<p>Blake Brodie, directora de relaciones p\u00fablicas de Wix, la empresa matriz de Base44, declar\u00f3 que \u00abBase44 ofrece a los usuarios herramientas robustas para configurar la seguridad de sus propias aplicaciones, incluyendo controles de acceso y ajustes de visibilidad\u00bb. A\u00f1adi\u00f3 que \u00abdeshabilitar esos controles es una acci\u00f3n deliberada y sencilla que cualquier usuario puede realizar. En los casos en que las aplicaciones eran accesibles p\u00fablicamente, esto refleja una decisi\u00f3n de configuraci\u00f3n del usuario, no una <a href=\"https:\/\/es.wired.com\/articulos\/ciberataques-contra-mexicanos-estudio\">vulnerabilidad de la plataforma<\/a>\u00ab.<\/p>\n<p>Brodie tambi\u00e9n se\u00f1al\u00f3 que \u00abes sumamente f\u00e1cil fabricar aplicaciones que aparentan contener datos reales de usuarios. Sin un solo ejemplo verificado, no tenemos forma de evaluar la validez de estas afirmaciones\u00bb. Por su parte, RedAccess neg\u00f3 no haber proporcionado ejemplos a Base44.<\/p>\n<p>Zvi se\u00f1ala que para unas pocas docenas de aplicaciones web expuestas, lleg\u00f3 a ponerse en contacto con el propietario aparente de la aplicaci\u00f3n, que confirm\u00f3 que los datos hab\u00edan sido expuestos. RedAccess tambi\u00e9n comparti\u00f3 con WIRED comunicaciones anonimizadas en varios casos que mostraban a usuarios de Base44 dando las gracias a los investigadores por alertarles sobre aplicaciones web expuestas, que luego fueron protegidas o desconectadas.<\/p>\n<div class=\"ContentCardEmbedWrapper-hkvhYu kMYDit content-card-embed content-card-embed--stacked\" data-testid=\"ContentCardEmbedWrapper\" readability=\"23.303571428571\">\n<div class=\"ContentCardEmbedImage-bqahne fjmzkP content-card-embed__image\" data-testid=\"ContentCardEmbedImage\"><span class=\"SpanWrapper-kFnjvc eKnjjD responsive-asset\"><picture class=\"ResponsiveImagePicture-jKunQM gjCCFj responsive-image\"><img decoding=\"async\" alt=\"El dispositivo estilo Tamagotchi que Vermeeren construy\u00f3, llamado Clawy, para ayudar a gestionar las sesiones de codificaci\u00f3n de Claude.\" loading=\"lazy\" class=\"ResponsiveImageContainer-dkeESL cQPiWi responsive-image__image\" srcset=\"https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_120,c_limit\/IMG_0608%202.jpeg 120w, https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_240,c_limit\/IMG_0608%202.jpeg 240w, https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_320,c_limit\/IMG_0608%202.jpeg 320w, https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_640,c_limit\/IMG_0608%202.jpeg 640w\" sizes=\"100vw\" src=\"https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_775%2Cc_limit\/IMG_0608%25202.jpeg\"><\/picture><\/span><\/div>\n<div class=\"ContentCardEmbedInfo-buyHWH gWLOee\" readability=\"24.413265306122\">\n<div class=\"BaseText-fEwdHD ContentCardEmbedHed-kDKGDs fUtEc dlHXUJ content-card-embed__hed\" data-testid=\"ContentCardEmbedHed\"><a class=\"BaseLink-haTOKm ContentCardEmbedHedLink-iBZsco gAoKdC hhUFQU content-card-embed__hed-link link\" href=\"https:\/\/es.wired.com\/articulos\/ya-esta-aqui-el-vibe-coding-para-hardware-y-casas\" data-testid=\"ContentCardEmbedHedLink\">Ya est\u00e1 aqu\u00ed el <em>vibe coding<\/em> para <em>hardware<\/em> y casas<\/a><\/div>\n<p>Schematik es un programa que busca ayudar a las personas a hacer <em>vibe coding<\/em> para dispositivos f\u00edsicos. Esperemos que no cause ning\u00fan desastre.<\/p>\n<\/div>\n<\/div>\n<h2>Qu\u00e9 tanto podemos confiar en las <em>apps<\/em> de <em>vibe coding<\/em><\/h2>\n<p>Verificar si se han <a href=\"https:\/\/es.wired.com\/articulos\/mayor-filtracion-datos-de-historia-ha-expuesto-10-mil-millones-contrasenas\">expuesto datos reales<\/a> en alguna aplicaci\u00f3n web con IA no segura puede ser complicado, afirma Joel Margolis, investigador de seguridad que, junto con un colega, descubri\u00f3 recientemente que un juguete de chat con IA hab\u00eda expuesto 50,000 conversaciones que mantuvo con ni\u00f1os en un sitio web pr\u00e1cticamente sin seguridad. Los datos esta aplicaci\u00f3n de <em>vibe coding<\/em> podr\u00edan ser marcadores de posici\u00f3n, explica, o la aplicaci\u00f3n podr\u00eda ser simplemente una prueba de concepto (PoC). Brodie, de Wix, argument\u00f3 que dos ejemplos que WIRED comparti\u00f3 con Base44 parec\u00edan ser sitios de prueba o contener datos generados por IA.<\/p>\n<p>En el caso de las aplicaciones web analizadas por WIRED, no pudimos confirmar que los datos personales o corporativos fueran tan sensibles, o reales, como parec\u00edan.<\/p>\n<p>No obstante, Margolis afirma que el problema de las aplicaciones web con IA que exponen datos es muy real. Dice que con frecuencia se encuentra con el tipo de vulnerabilidades que Zvi catalog\u00f3. \u00abAlguien del equipo de <em>marketing<\/em> quiere crear un sitio web. No es ingeniero y probablemente tenga poca o ninguna experiencia o conocimiento en seguridad\u00bb, explica Margolis. Las herramientas de <a href=\"https:\/\/es.wired.com\/articulos\/futuro-de-programacion-impulsada-por-ia-esta-cerca\">programaci\u00f3n de IA<\/a>, a\u00f1ade, \u00abhacen lo que se les pide. Y a menos que se les pida que lo hagan de forma segura, no se esforzar\u00e1n por hacerlo\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00abSeg\u00fan la informaci\u00f3n limitada que compartieron, la&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":186744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[46],"tags":[],"class_list":["post-186743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sarmiento24h.com\/?p=186743\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h\" \/>\n<meta property=\"og:description\" content=\"\u00abSeg\u00fan la informaci\u00f3n limitada que compartieron, la&#046;&#046;&#046;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sarmiento24h.com\/?p=186743\" \/>\n<meta property=\"og:site_name\" content=\"Sarmiento24h\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/s24hnoticias\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-07T22:47:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_775%2Cc_limit\/IMG_0608%25202.jpeg\" \/>\n<meta name=\"author\" content=\"sarmiento24h@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:site\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"sarmiento24h@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743\"},\"author\":{\"name\":\"sarmiento24h@gmail.com\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\"},\"headline\":\"Miles de apps programadas por la IA desparraman datos confidenciales por internet\",\"datePublished\":\"2026-05-07T22:47:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743\"},\"wordCount\":640,\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg\",\"articleSection\":[\"Tecnologia\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743\",\"name\":\"Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg\",\"datePublished\":\"2026-05-07T22:47:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#primaryimage\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg\",\"width\":775,\"height\":1033},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=186743#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sarmiento24h.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Miles de apps programadas por la IA desparraman datos confidenciales por internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"name\":\"Sarmiento24h\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sarmiento24h.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\",\"name\":\"Sarmiento24h\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"width\":1220,\"height\":324,\"caption\":\"Sarmiento24h\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/s24hnoticias\",\"https:\\\/\\\/x.com\\\/sarmiento24h\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\",\"name\":\"sarmiento24h@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632\",\"caption\":\"sarmiento24h@gmail.com\"},\"sameAs\":[\"https:\\\/\\\/sarmiento24h.com\"],\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sarmiento24h.com\/?p=186743","og_locale":"es_ES","og_type":"article","og_title":"Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h","og_description":"\u00abSeg\u00fan la informaci\u00f3n limitada que compartieron, la&#46;&#46;&#46;","og_url":"https:\/\/sarmiento24h.com\/?p=186743","og_site_name":"Sarmiento24h","article_publisher":"https:\/\/facebook.com\/s24hnoticias","article_published_time":"2026-05-07T22:47:30+00:00","og_image":[{"url":"https:\/\/media.es.wired.com\/photos\/69e63b05c94cbfe15881fcad\/master\/w_775%2Cc_limit\/IMG_0608%25202.jpeg","type":"","width":"","height":""}],"author":"sarmiento24h@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@sarmiento24h","twitter_site":"@sarmiento24h","twitter_misc":{"Escrito por":"sarmiento24h@gmail.com","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sarmiento24h.com\/?p=186743#article","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/?p=186743"},"author":{"name":"sarmiento24h@gmail.com","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d"},"headline":"Miles de apps programadas por la IA desparraman datos confidenciales por internet","datePublished":"2026-05-07T22:47:30+00:00","mainEntityOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=186743"},"wordCount":640,"publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=186743#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg","articleSection":["Tecnologia"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/sarmiento24h.com\/?p=186743","url":"https:\/\/sarmiento24h.com\/?p=186743","name":"Miles de apps programadas por la IA desparraman datos confidenciales por internet - Sarmiento24h","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=186743#primaryimage"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=186743#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg","datePublished":"2026-05-07T22:47:30+00:00","breadcrumb":{"@id":"https:\/\/sarmiento24h.com\/?p=186743#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sarmiento24h.com\/?p=186743"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/?p=186743#primaryimage","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg","width":775,"height":1033},{"@type":"BreadcrumbList","@id":"https:\/\/sarmiento24h.com\/?p=186743#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sarmiento24h.com\/"},{"@type":"ListItem","position":2,"name":"Miles de apps programadas por la IA desparraman datos confidenciales por internet"}]},{"@type":"WebSite","@id":"https:\/\/sarmiento24h.com\/#website","url":"https:\/\/sarmiento24h.com\/","name":"Sarmiento24h","description":"","publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sarmiento24h.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sarmiento24h.com\/#organization","name":"Sarmiento24h","url":"https:\/\/sarmiento24h.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","width":1220,"height":324,"caption":"Sarmiento24h"},"image":{"@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/s24hnoticias","https:\/\/x.com\/sarmiento24h"]},{"@type":"Person","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d","name":"sarmiento24h@gmail.com","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632","url":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1777762632","caption":"sarmiento24h@gmail.com"},"sameAs":["https:\/\/sarmiento24h.com"],"url":"https:\/\/sarmiento24h.com\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/miles-de-apps-programadas-por-la-ia-desparraman-datos-confidenciales-por-internet.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/186743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=186743"}],"version-history":[{"count":0,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/186743\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/media\/186744"}],"wp:attachment":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=186743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=186743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=186743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}