{"id":2073,"date":"2020-08-22T08:46:24","date_gmt":"2020-08-22T08:46:24","guid":{"rendered":"https:\/\/invezt.co\/kaymera\/?p=447"},"modified":"2020-08-22T08:46:24","modified_gmt":"2020-08-22T08:46:24","slug":"aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad","status":"publish","type":"post","link":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/","title":{"rendered":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad"},"content":{"rendered":"\n<p>En Reddit, el usuario <strong>ToBrown05<\/strong> ha publicado un post afirmando haber aplicado ingenier\u00eda inversa a <strong>TikTok<\/strong> una de las redes sociales con mayor crecimiento en los \u00faltimos meses. Con varias actualizaciones en el hilo descubri\u00f3 que esta red de microvideos extrae informaci\u00f3n por medio de una API (Application Programming Interface), los datos que recopila son: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Hardware del tel\u00e9fono (tipo de CPU, n\u00famero de curso, ID de hardware, dimensiones de la pantalla, dpi, uso de memoria, espacio en disco, etc.). <\/li><li>Otras aplicaciones que ha instalado (incluso eliminadas).<\/li><li>Todo lo relacionado con la red (IP, IP local, direcci\u00f3n MAC, nombre de la red).<\/li><li>Algunas variantes de la aplicaci\u00f3n ten\u00edan habilitado el ping de GPS en ese momento, aproximadamente una vez cada 30 segundos; esto est\u00e1 habilitado de manera predeterminada si alguna vez etiqueta la ubicaci\u00f3n en una publicaci\u00f3n IIRC<\/li><li>Configuraron un servidor proxy local en su dispositivo para \u00abtranscodificar medios\u00bb, pero se puede abusar de \u00e9l muy f\u00e1cilmente ya que no tiene autenticaci\u00f3n.<\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u00abLa parte m\u00e1s aterradora de todo esto es que gran parte del registro que est\u00e1n haciendo es configurable de forma remota, y a menos que invierta cada una de sus bibliotecas nativas e inspeccione manualmente cada funci\u00f3n ofuscada. Tienen varias protecciones diferentes para evitar que usted tambi\u00e9n revierta o depure la aplicaci\u00f3n\u00bb.<\/p><cite><a href=\"https:\/\/www.reddit.com\/r\/videos\/comments\/fxgi06\/not_new_news_but_tbh_if_you_have_tiktiok_just_get\/\">https:\/\/www.reddit.com\/r\/videos\/comments\/fxgi06\/not_new_news_but_tbh_if_you_have_tiktiok_just_get\/<\/a><\/cite><\/blockquote>\n\n\n\n<p>Tambi\u00e9n hay algunos fragmentos de c\u00f3digo en la versi\u00f3n de Android que permiten descargar un archivo zip remoto, descomprimirlo y ejecutar dicho binario. No hay ninguna raz\u00f3n por la que una aplicaci\u00f3n m\u00f3vil necesite esta funcionalidad de forma leg\u00edtima.<\/p>\n\n\n\n<p>Por medio de la ingenier\u00eda inversa a TikTok, ToBrown05 explica en su publicaci\u00f3n que adem\u00e1s de todo lo anterior, no usaron HTTPS (HyperText Transfer Protocol Secure, Protocolo de transferencia de hipertexto)\u00a0durante mucho tiempo. Filtraron las direcciones de correo electr\u00f3nico de los usuarios en su API REST HTTP, as\u00ed como sus correos electr\u00f3nicos secundarios utilizados para restablecer las contrase\u00f1as, nombres reales y cumplea\u00f1os. Todo fue visible y p\u00fablico. <\/p>\n\n\n\n<p>Soy un nerd que descubre c\u00f3mo funcionan las aplicaciones para un trabajo. Llamarlo plataforma publicitaria es quedarse corto. TikTok es esencialmente <a href=\"https:\/\/invezt.co\/kaymera\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware dirigido a ni\u00f1os<\/a>. No uses TikTok. No permita que sus amigos y familiares lo usen\u00bb.<\/p>\n\n\n\n<p><strong>TikTok un posible problema de seguridad nacional para EUA<\/strong><\/p>\n\n\n\n<p>Despu\u00e9s de que esta informaci\u00f3n inundara los sitios de noticias, el gobierno de Estados Unidos tomaron cartas en el asunto y escal\u00f3 al grado de que el presidente Donald Trump firm\u00f3 una orden ejecutiva para prohibir la aplicaci\u00f3n en su pa\u00eds, a esta orden se sumaron la prohibici\u00f3n por parte de la marina por considerarla un riesgo. <\/p>\n\n\n\n<p>De nada sirvieron las propuestas de Microsoft, Oracle y Twitter para adquirir la aplicaci\u00f3n de origen chino, ni los argumentos de que la empresa est\u00e1 manejada por un equipo de norteamericanos y sus oficinas se realizan en dicho pa\u00eds. <\/p>\n\n\n\n<p>TikTok no fue la \u00fanica aplicaci\u00f3n bajo sospecha de pa\u00edses como EUA y la India, otra veintena de aplicaciones han sido prohibidas por las mismas sospechas de espionaje y mal uso de informaci\u00f3n privada de los usuarios, que se sospecha es proporcionada al partido comunista chino. <\/p>\n\n\n\n<p><strong>Anonymous llama a no utilizar TikTok<\/strong><\/p>\n\n\n\n<p>El llamado inesperado de la organizaci\u00f3n Anonymous a no utilizar TikTok encendi\u00f3 m\u00e1s el debate sobre el uso de la informaci\u00f3n de los usuarios por parte de la empresa responsable de su desarrollo poniendo en la mesa posibles escenarios en los que la extracci\u00f3n de informaci\u00f3n y el cruce con otras funcionalidades de los dispositivos, como sistemas de reconocimiento facial, huellas dactilares, repositorios de contrase\u00f1as, uso de correo electr\u00f3nico y otras, pondr\u00edan en grave riesgo a objetivos de alto nivel. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">A guy on reddit reversed engineered <a href=\"https:\/\/twitter.com\/hashtag\/TikTok?src=hash&amp;ref_src=twsrc%5Etfw\">#TikTok<\/a><br><br>Here\u2019s what he found on the data it collects on you<br><br>It\u2019s far worse than just stealing what\u2019s on your clipboard: <a href=\"https:\/\/t.co\/oqaQyYDXT2\">pic.twitter.com\/oqaQyYDXT2<\/a><\/p>&mdash; Dan \ud83c\uddfa\ud83c\udde6 (@d1rtydan) <a href=\"https:\/\/twitter.com\/d1rtydan\/status\/1277081198624337920?ref_src=twsrc%5Etfw\">June 28, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Delete TikTok now; if you know someone that is using it explain to them it is essentially malware operated by the Chinese government running a massive spying operation. <a href=\"https:\/\/t.co\/J7N9FS7PvG\">https:\/\/t.co\/J7N9FS7PvG<\/a><\/p>&mdash; Anonymous (@YourAnonCentral) <a href=\"https:\/\/twitter.com\/YourAnonCentral\/status\/1278204068175818752?ref_src=twsrc%5Etfw\">July 1, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>En Reddit, el usuario ToBrown05 ha publicado un post afirmando haber aplicado ingenier\u00eda inversa a TikTok una de las redes sociales con mayor crecimiento en los \u00faltimos meses. Con varias actualizaciones en el hilo descubri\u00f3 que esta red de microvideos extrae informaci\u00f3n por medio de una API (Application Programming Interface), los datos que recopila son:&hellip;&nbsp;<a href=\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":487,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[10],"tags":[37,13,14,15,38,39],"class_list":["post-2073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","tag-apps-peligrosas","tag-kaymera","tag-kaymera-app","tag-kaymera-technologies","tag-tiktok","tag-vulnerabilidades-en-dispositivos-moviles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict<\/title>\n<meta name=\"description\" content=\"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict\" \/>\n<meta property=\"og:description\" content=\"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaymera by Invict\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-22T08:46:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"475\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin_pupij279\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_pupij279\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\"},\"author\":{\"name\":\"admin_pupij279\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\"},\"headline\":\"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad\",\"datePublished\":\"2020-08-22T08:46:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\"},\"wordCount\":687,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg\",\"keywords\":[\"apps peligrosas\",\"Kaymera\",\"Kaymera app\",\"Kaymera Technologies\",\"TikTok\",\"vulnerabilidades en dispositivos m\u00f3viles\"],\"articleSection\":[\"Noticias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\",\"url\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\",\"name\":\"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict\",\"isPartOf\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg\",\"datePublished\":\"2020-08-22T08:46:24+00:00\",\"author\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\"},\"description\":\"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo\",\"breadcrumb\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage\",\"url\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg\",\"contentUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg\",\"width\":950,\"height\":475,\"caption\":\"ingenier\u00eda inversa a TikTok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/invict.com.co\/kaymera\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\",\"url\":\"https:\/\/invict.com.co\/kaymera\/\",\"name\":\"Kaymera by Invict\",\"description\":\"High-end mobile security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\",\"name\":\"admin_pupij279\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g\",\"caption\":\"admin_pupij279\"},\"sameAs\":[\"https:\/\/invict.com.co\/kaymera\"],\"url\":\"https:\/\/invict.com.co\/kaymera\/author\/admin_pupij279\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict","description":"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict","og_description":"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo","og_url":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/","og_site_name":"Kaymera by Invict","article_published_time":"2020-08-22T08:46:24+00:00","og_image":[{"width":950,"height":475,"url":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg","type":"image\/jpeg"}],"author":"admin_pupij279","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin_pupij279","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#article","isPartOf":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/"},"author":{"name":"admin_pupij279","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0"},"headline":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad","datePublished":"2020-08-22T08:46:24+00:00","mainEntityOfPage":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/"},"wordCount":687,"commentCount":0,"image":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg","keywords":["apps peligrosas","Kaymera","Kaymera app","Kaymera Technologies","TikTok","vulnerabilidades en dispositivos m\u00f3viles"],"articleSection":["Noticias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/","url":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/","name":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad - Kaymera by Invict","isPartOf":{"@id":"https:\/\/invict.com.co\/kaymera\/#website"},"primaryImageOfPage":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg","datePublished":"2020-08-22T08:46:24+00:00","author":{"@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0"},"description":"Por medio de ingenier\u00eda inversa descruben importantes fallos de seguridad en la red social TikTok y la consideran un riesgo","breadcrumb":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#primaryimage","url":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg","contentUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/08\/tiktok.jpeg","width":950,"height":475,"caption":"ingenier\u00eda inversa a TikTok"},{"@type":"BreadcrumbList","@id":"https:\/\/invict.com.co\/kaymera\/2020\/08\/22\/aplican-ingenieria-inversa-a-tiktok-y-revelan-un-verdadero-peligro-de-seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/invict.com.co\/kaymera\/"},{"@type":"ListItem","position":2,"name":"Aplican ingenier\u00eda inversa a TikTok y revelan un verdadero peligro de seguridad"}]},{"@type":"WebSite","@id":"https:\/\/invict.com.co\/kaymera\/#website","url":"https:\/\/invict.com.co\/kaymera\/","name":"Kaymera by Invict","description":"High-end mobile security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0","name":"admin_pupij279","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g","caption":"admin_pupij279"},"sameAs":["https:\/\/invict.com.co\/kaymera"],"url":"https:\/\/invict.com.co\/kaymera\/author\/admin_pupij279\/"}]}},"_links":{"self":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts\/2073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/comments?post=2073"}],"version-history":[{"count":0,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts\/2073\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/media\/487"}],"wp:attachment":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/media?parent=2073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/categories?post=2073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/tags?post=2073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}