
{"id":1296,"date":"2011-03-28T10:18:22","date_gmt":"2011-03-28T13:18:22","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1296"},"modified":"2011-03-28T10:21:35","modified_gmt":"2011-03-28T13:21:35","slug":"proteger-la-privacidad-de-su-telefono-con-android","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/","title":{"rendered":"Proteger la privacidad de su tel\u00e9fono con Android"},"content":{"rendered":"<p><a href=\"https:\/\/market.android.com\/details?id=com.xeudoxus.privacy.blocker\" target=\"_new\">Privacy Blocker<\/a><\/p>\n<p><a href=\"https:\/\/market.android.com\/details?id=com.xeudoxus.privacy.blocker\" target=\"_new\">Bloqueador de privacidad<\/a> es una aplicaci\u00f3n para Android que para aplicaciones instaladas que recolectan informaci\u00f3n personal.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg\" alt=\"\" \/><\/p>\n<p>El  programa, b\u00e1sicamente, establece claramente el tipo de datos de ciertas  aplicaciones est\u00e1n solicitando sobre su tel\u00e9fono Android y enviarlo de  nuevo.<\/p>\n<p>Privacidad Bloqueador sustituye los datos dentro de las aplicaciones  con datos falsos y efectivamente corrige los problemas potenciales de  privacidad.<\/p>\n<p>Usted puede estar sorprendido de ver que tipo de  informaci\u00f3n que ciertas aplicaciones est\u00e1n solicitando como su n\u00famero  telef\u00f3nico o ubicaci\u00f3n actual antena de telefon\u00eda m\u00f3vil.<br \/>\nFuente: http:\/\/www.net-security.org<br \/>\n<strong><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy Blocker Bloqueador de privacidad es una aplicaci\u00f3n para Android que para aplicaciones instaladas que recolectan informaci\u00f3n personal. El programa, b\u00e1sicamente, establece claramente el tipo de datos de ciertas aplicaciones est\u00e1n solicitando sobre su tel\u00e9fono Android y enviarlo de nuevo. Privacidad Bloqueador sustituye los datos dentro de las aplicaciones con datos falsos y efectivamente corrige [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1296","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Proteger la privacidad de su tel\u00e9fono con Android<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Proteger la privacidad de su tel\u00e9fono con Android\",\"datePublished\":\"2011-03-28T13:18:22+00:00\",\"dateModified\":\"2011-03-28T13:21:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\"},\"wordCount\":112,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Proteger la privacidad de su tel\u00e9fono con Android\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg\",\"datePublished\":\"2011-03-28T13:18:22+00:00\",\"dateModified\":\"2011-03-28T13:21:35+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage\",\"url\":\"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg\",\"contentUrl\":\"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Proteger la privacidad de su tel\u00e9fono con Android","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Proteger la privacidad de su tel\u00e9fono con Android","datePublished":"2011-03-28T13:18:22+00:00","dateModified":"2011-03-28T13:21:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/"},"wordCount":112,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage"},"thumbnailUrl":"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/","url":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Proteger la privacidad de su tel\u00e9fono con Android","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage"},"thumbnailUrl":"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg","datePublished":"2011-03-28T13:18:22+00:00","dateModified":"2011-03-28T13:21:35+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/proteger-la-privacidad-de-su-telefono-con-android\/#primaryimage","url":"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg","contentUrl":"http:\/\/www.net-security.org\/images\/articles\/android-privacy-blocker.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1296"}],"version-history":[{"count":3,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1296\/revisions"}],"predecessor-version":[{"id":1299,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1296\/revisions\/1299"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}