{"version":"1.0","provider_name":"Inibe Industrias","provider_url":"https:\/\/www.inibeindustrias.com","title":"Los nuevos 3 cifrados irrompibles de IBM - Inibe Industrias","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GmO8nTwKeX\"><a href=\"https:\/\/www.inibeindustrias.com\/index.php\/2024\/08\/17\/los-nuevos-3-cifrados-irrompibles-de-ibm\/\">Los nuevos 3 cifrados irrompibles de IBM<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.inibeindustrias.com\/index.php\/2024\/08\/17\/los-nuevos-3-cifrados-irrompibles-de-ibm\/embed\/#?secret=GmO8nTwKeX\" width=\"600\" height=\"338\" title=\"\u00abLos nuevos 3 cifrados irrompibles de IBM\u00bb \u2014 Inibe Industrias\" data-secret=\"GmO8nTwKeX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.inibeindustrias.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.inibeindustrias.com\/wp-content\/uploads\/2024\/08\/candado.webp","thumbnail_width":930,"thumbnail_height":523,"description":"Aunque se espera que los ordenadores cu\u00e1nticos ayuden a resolver problemas hasta ahora demasiado complicados para los equipos modernos, tambi\u00e9n pueden suponer un peligro si grupos cibercriminales los usan con el objetivo de realizar ataques con ellos. Es por eso que es preciso respaldar esta tecnolog\u00eda con la ciberseguridad adecuada, antes de que grupos criminales [&hellip;]"}