[{"data":1,"prerenderedAt":543},["ShallowReactive",2],{"api/page-es/learn/security-es":3,"footer-es":65,"es/learn/security-es-seo":239,"api/learn-categories-es":244,"navigation-es-learn-center":283,"api/learn-center-posts/security-es":336,"api/learn-center-categories-es":532},{"locale":4,"seo":5,"components":28,"layout":60,"breadcrumbs":61,"geofencings":64},"es",{"title":6,"metaTitle":6,"metaDescription":7,"keywords":8,"metaRobots":8,"structuredData":9,"metaImage":10,"metaSocial":18,"canonicalURL":8,"localizations":19},"Seguridad en Criptomonedas - Navega de forma segura en el mundo cripto","Navegar por el mundo de las criptomonedas puede ser un desafío si no se toman las precauciones de seguridad adecuadas. Aprende cómo mantener tus criptomonedas seguras - Centro de Aprendizaje de Bitstamp by Robinhood",null,{},{"url":11,"mime":12,"ext":13,"width":14,"height":15,"name":16,"alt":17},"bitstampImageUrl/learn_center_og_bf79546e8f_a8dc54f844_b1f085f216.png","image/png",".png",1200,630,"learn_center_og_bf79546e8f_a8dc54f844.png","",[],[20,23,26],{"pathname":21,"locale":22},"/learn/security/","en",{"pathname":24,"locale":25},"/en-gb/learn/security/","en-GB",{"pathname":27,"locale":4},"/es/learn/security/",[29,37,47,55],{"component":30,"props":31},"learn-center.learn-center-categories-pagination",{"sectionId":8,"backgroundColor":32,"paddingTop":33,"paddingBottom":33,"ordering":8,"ratio":34,"centered":35,"containerSize":36,"withoutSectionContainer":35},"Gray","small","1:1",false,"slim",{"component":38,"props":39,"content":40,"secondaryContent":44,"ctas":45,"secondaryCtas":46,"ctasNoMarginTop":35},"section.full-text",{"sectionId":8,"backgroundColor":32,"paddingTop":8,"paddingBottom":33,"ordering":8,"ratio":34,"centered":35,"containerSize":36,"withoutSectionContainer":35},{"text":41,"width":42,"align":43},"\u003Ch1>Seguridad\u003C/h1>\n","full","left",{"text":17},[],[],{"component":38,"props":48,"content":50,"secondaryContent":52,"ctas":53,"secondaryCtas":54,"ctasNoMarginTop":35},{"sectionId":8,"backgroundColor":32,"paddingTop":8,"paddingBottom":49,"ordering":8,"ratio":34,"centered":35,"containerSize":36,"withoutSectionContainer":35},"medium",{"text":51,"width":42,"align":43},"\u003Cp>Navegar por el mundo de las criptomonedas puede ser una tarea intimidante si no se toman las precauciones de seguridad adecuadas.\u003C/p>\n\u003Cp>En estos artículos, profundizamos en algunos de los riesgos que pueden ocurrir en una cadena de bloques, como un ataque del 51% cuando una sola entidad toma el control de la mayoría del poder de la cadena de bloques y puede modificar las reglas en su propio beneficio (como revertir transacciones). También te enseñamos sobre los ataques Sybil, que son ataques contra redes peer-to-peer en los que una sola entidad crea muchas identidades falsas para ganar ventaja en la red.\u003C/p>\n\u003Cp>Bitstamp by Robinhood también te enseña sobre precauciones de seguridad (como la autenticación de dos factores y la lista blanca), o cómo proteger tus criptomonedas utilizando una cartera multifirma (también conocida como multisig). Si no estás familiarizado, las carteras multisig requieren más de una clave privada para firmar y autorizar una transacción de criptomonedas.\u003C/p>\n\u003Cp>Las guías de Bitstamp by Robinhood te mantienen seguro al navegar por el ecosistema.\u003C/p>\n",{"text":17},[],[],{"component":56,"props":57,"categorySlug":59},"learn-center.category-posts",{"sectionId":8,"backgroundColor":32,"paddingTop":8,"paddingBottom":49,"ordering":8,"ratio":34,"centered":35,"containerSize":58,"withoutSectionContainer":35},"normal","security","learn-center",[62],{"id":63,"text":63,"url":8,"asUrl":35},"Seguridad",{},{"ready":66,"sections":67,"disclaimer":237,"copyright":238},true,[68,101,124,147,179,198],{"title":69,"content":17,"items":70},"Acerca de",[71,76,81,86,91,96],{"noFollow":66,"isExternal":35,"name":72,"value":73,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":74,"geofencings":75},"Quiénes somos","/about-us/",{},{},{"noFollow":66,"isExternal":66,"name":77,"value":78,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":79,"geofencings":80},"Empleo","https://bitstamp.workable.com/",{},{},{"noFollow":66,"isExternal":35,"name":82,"value":83,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":84,"geofencings":85},"Legal y Privacidad","/legal/",{},{},{"noFollow":66,"isExternal":35,"name":87,"value":88,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":89,"geofencings":90},"Legal y Privacidad - EE. UU.","/legal/terms-of-use/inc/",{},{},{"noFollow":66,"isExternal":35,"name":92,"value":93,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":94,"geofencings":95},"Tarifas","/fee-schedule/",{},{},{"noFollow":35,"isExternal":35,"name":97,"value":98,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":99,"geofencings":100},"Preguntas frecuentes","/faq/",{},{},{"title":102,"content":17,"items":103},"Productos",[104,109,114,119],{"noFollow":35,"isExternal":35,"name":105,"value":106,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":107,"geofencings":108},"Aplicación móvil","/mobile/",{},{},{"noFollow":35,"isExternal":35,"name":110,"value":111,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":112,"geofencings":113},"Vista de trading","/market/tradeview/",{},{},{"noFollow":35,"isExternal":35,"name":115,"value":116,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":117,"geofencings":118},"Ganar con Staking","/crypto-staking/",{},{"geofencing-uk":66},{"noFollow":35,"isExternal":35,"name":120,"value":121,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":122,"geofencings":123},"Ganar con Préstamos","/crypto-lending/",{},{"geofencing-uk":66},{"title":125,"content":17,"items":126},"Servicios",[127,132,137,142],{"noFollow":35,"isExternal":35,"name":128,"value":129,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":130,"geofencings":131},"Instituciones y Socios","/institutional-trading/",{},{},{"noFollow":35,"isExternal":35,"name":133,"value":134,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":135,"geofencings":136},"Bitstamp como Servicio","/bitstamp-as-a-service/",{},{},{"noFollow":35,"isExternal":35,"name":138,"value":139,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":140,"geofencings":141},"El Ecosistema Bitstamp","/partners/",{},{},{"noFollow":35,"isExternal":35,"name":143,"value":144,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":145,"geofencings":146},"Pro","/pro/",{},{},{"title":148,"content":17,"items":149},"Recursos",[150,155,160,165,169,174],{"noFollow":66,"isExternal":35,"name":151,"value":152,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":35,"showOnMobile":66,"attachment":153,"geofencings":154},"API HTTP","/api/",{},{},{"noFollow":35,"isExternal":35,"name":156,"value":157,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":35,"showOnMobile":66,"attachment":158,"geofencings":159},"API Websocket v2","/websocket/v2/",{},{},{"noFollow":35,"isExternal":35,"name":161,"value":162,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":35,"showOnMobile":66,"attachment":163,"geofencings":164},"FIX v2","/fix/v2/",{},{},{"noFollow":66,"isExternal":35,"name":166,"value":152,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":35,"attachment":167,"geofencings":168},"Documentación API",{},{},{"noFollow":35,"isExternal":35,"name":170,"value":171,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":172,"geofencings":173},"Clave PGP","/pgp-key/",{},{},{"noFollow":35,"isExternal":35,"name":175,"value":176,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":177,"geofencings":178},"Red Lightning","/lightning-network-node/",{},{},{"title":180,"content":17,"items":181},"Dirección",[182,186,190,194],{"noFollow":35,"isExternal":35,"name":183,"value":17,"isEmail":35,"isPhoneNumber":35,"isText":66,"showOnDesktop":66,"showOnMobile":66,"attachment":184,"geofencings":185},"Bitstamp Ltd",{},{},{"noFollow":35,"isExternal":35,"name":187,"value":17,"isEmail":35,"isPhoneNumber":35,"isText":66,"showOnDesktop":66,"showOnMobile":66,"attachment":188,"geofencings":189},"5 New Street Square",{},{},{"noFollow":35,"isExternal":35,"name":191,"value":17,"isEmail":35,"isPhoneNumber":35,"isText":66,"showOnDesktop":66,"showOnMobile":66,"attachment":192,"geofencings":193},"Londres, EC4A 3TW",{},{},{"noFollow":35,"isExternal":35,"name":195,"value":17,"isEmail":35,"isPhoneNumber":35,"isText":66,"showOnDesktop":66,"showOnMobile":66,"attachment":196,"geofencings":197},"Reino Unido",{},{},{"title":199,"content":17,"items":200},"Contacto",[201,206,210,214,218,222,227,232],{"noFollow":35,"isExternal":35,"name":202,"value":203,"isEmail":35,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":204,"geofencings":205},"Atención al cliente","/customer-support/",{},{},{"noFollow":35,"isExternal":35,"name":207,"value":207,"isEmail":66,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":208,"geofencings":209},"info@bitstamp.net",{},{},{"noFollow":35,"isExternal":35,"name":211,"value":211,"isEmail":66,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":212,"geofencings":213},"press@bitstamp.net",{},{},{"noFollow":35,"isExternal":35,"name":215,"value":215,"isEmail":66,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":216,"geofencings":217},"support@bitstamp.net",{},{},{"noFollow":35,"isExternal":35,"name":219,"value":219,"isEmail":66,"isPhoneNumber":35,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":220,"geofencings":221},"complaints@bitstamp.net",{},{},{"noFollow":35,"isExternal":35,"name":223,"value":224,"isEmail":35,"isPhoneNumber":66,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":225,"geofencings":226},"+44 20 3868 9628","+442038689628",{},{},{"noFollow":35,"isExternal":35,"name":228,"value":229,"isEmail":35,"isPhoneNumber":66,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":230,"geofencings":231},"+1 800 712 5702","+18007125702",{},{},{"noFollow":35,"isExternal":35,"name":233,"value":234,"isEmail":35,"isPhoneNumber":66,"isText":35,"showOnDesktop":66,"showOnMobile":66,"attachment":235,"geofencings":236},"+352 20 88 10 96","+35220881096",{},{},"\u003Cp>Por favor, lea la \u003Ca href=\"/legal/risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Advertencia general de Riesgo\u003C/a> y el \u003Ca href=\"/legal/uk-investment-risk-warning/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Resumen de Riesgo\u003C/a> para residentes en el Reino Unido antes de invertir en criptoactivos.\u003C/p>\n\u003Cp>Los servicios relacionados con criptoactivos son prestados por las siguientes entidades legales de Bitstamp, según la residencia del cliente: (1) Bitstamp Europe S.A., autorizada por la Commission de Surveillance du Secteur Financier (CSSF) en Luxemburgo como institución de pago (licencia número Z00000012) y como proveedor de servicios de criptoactivos (licencia número N00000003); Dirección registrada: 40, avenue Monterey, L-2163 Luxemburgo, Gran Ducado de Luxemburgo; Número de registro: B196856; (2) Bitstamp UK Ltd., registrada en la Financial Conduct Authority (FCA) en el Reino Unido para la provisión de ciertas actividades relacionadas con criptoactivos bajo las Regulaciones de Prevención de Blanqueo de Capitales (Número de referencia de la entidad: 978690); Dirección registrada: 5 New Street Square, EC4A 3TW Londres, Reino Unido; Número de registro: 14174243; (3) Bitstamp Ltd., con dirección registrada en 5 New Street Square, EC4A 3TW Londres, Reino Unido y número de registro: 8157033; (4) Bitstamp Global Ltd., está registrada como Proveedor de Servicios de Activos Virtuales en las Islas Vírgenes Británicas y está supervisada por la Comisión de Servicios Financieros de las Islas Vírgenes Británicas (FSC); Dirección registrada: Piso 4, Banco Popular Building, Road Town, Tortola VG1110, Islas Vírgenes Británicas; Número de registro: 2086429; (5) Bitstamp Asia Pte Ltd, autorizada por la Monetary Authority of Singapore (MAS) como institución principal de pago (licencia número PS20200667); Dirección registrada: 63 Chulia Street, OCBC Centre East, #15-01, Singapur 049514; Número de registro: 202016687K; y (6) Bitstamp USA, Inc., autorizada para llevar a cabo actividades de negocio en moneda virtual y como transmisor de dinero por el New York State Department of Financial Services (licencia número 0000018), además de otras \u003Ca href=\"/legal/usa-inc/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">licencias y registros de transmisor de dinero\u003C/a> (Número NMLS: \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">1905429\u003C/a>) para más información; Dirección registrada: 85 Willow Road, Menlo Park, CA 94025, Estados Unidos de América; Número de registro: 5481543.\u003C/p>\n\u003Cp>Los servicios de inversión relacionados con la negociación de derivados de criptoactivos son proporcionados por Bitstamp Financial Services Ltd., autorizada y supervisada por la Agencia de Mercados de Valores de Eslovenia (ATVP) como empresa de inversión bajo MiFiD. La negociación de derivados de criptoactivos conlleva riesgos significativos y puede ocasionar pérdidas sustanciales. Por favor, opere de manera responsable y asegúrese de comprender los riesgos asociados. Puede encontrar más información sobre los riesgos \u003Ca href=\"/legal/financial-services/general-terms-and-conditions/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">aquí\u003C/a>. Para ayudarle a entender los riesgos implicados, hemos preparado una serie de \u003Ca href=\"/derivatives/key-information-documents/\" target=\"_blank\" rel=\"noopener noreferrer\">Documentos de Información Clave (KIDs)\u003C/a> que destacan los riesgos y beneficios relacionados con cada contrato de derivados. La negociación de derivados de criptoactivos no está disponible para clientes en Estados Unidos, Canadá, Japón y algunos otros países. Bitstamp Financial Services Ltd. no presta servicios de criptoactivos.\u003C/p>\n\u003Cp>Para conocer más sobre la entidad de Bitstamp que le presta servicios, consulte la sección Perfil/Mi información en su cuenta de Bitstamp. Puede leer más acerca de nuestros términos legales, políticas y divulgaciones \u003Ca href=\"/legal/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">aquí\u003C/a>.\u003C/p>\n","\u003Cp>Todos los derechos reservados © 2026 Bitstamp by Robinhood. \u003Ca href=\"https://www.nmlsconsumeraccess.org/EntityDetails.aspx/COMPANY/1905429\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NMLS #1905429\u003C/a>\u003C/p>\n",{"description":7,"ogDescription":7,"ogImage":240,"twitterImage":240,"twitterSite":241,"twitterCreator":241,"twitterCard":242,"twitterTitle":6,"twitterDescription":7,"titleTemplate":243},"https://assets.bitstamp.net/msc/_ipx/enlarge_true&f_png&fit_cover&q_85&s_1200x630/bitstampImageUrl/learn_center_og_bf79546e8f_a8dc54f844_b1f085f216.png","@Bitstamp","summary_large_image","%s",[245,249,253,257,261,265,267,271,275,279],{"title":246,"url":247,"geofencings":248},"Criptomonedas 101","/es/learn/crypto-101/",{},{"title":250,"url":251,"geofencings":252},"Definiciones de criptomonedas","/es/learn/crypto-definitions/",{},{"title":254,"url":255,"geofencings":256},"Guía de criptomonedas","/es/learn/cryptocurrency-guide/",{"geofencing-uk":66},{"title":258,"url":259,"geofencings":260},"Perfiles de empresas","/es/learn/company-profiles/",{},{"title":262,"url":263,"geofencings":264},"Perfiles de personas","/es/learn/people-profiles/",{},{"title":63,"url":27,"geofencings":266},{},{"title":268,"url":269,"geofencings":270},"Tecnología de cadena de bloques","/es/learn/blockchain/",{},{"title":272,"url":273,"geofencings":274},"Trading de criptomonedas","/es/learn/crypto-trading/",{},{"title":276,"url":277,"geofencings":278},"Tutoriales ","/es/learn/bitstamp-tutorials/",{},{"title":280,"url":281,"geofencings":282},"Web3","/es/learn/web3/",{},{"items":284,"ready":66,"platformButtonText":332,"backButtonText":333,"logInButtonText":334,"signUpButtonText":335},[285,289,295,298,302,305,309,314,318,323,328],{"headerName":286,"sidemenuName":128,"url":129,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":287,"submenu":288,"tag":17},"Instituciones",{},[],{"headerName":290,"sidemenuName":290,"url":291,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":292,"submenu":293,"tag":294},"Derivados","/perpetual-futures/",{},[],"NUEVO",{"headerName":143,"sidemenuName":143,"url":144,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":296,"submenu":297,"tag":17},{},[],{"headerName":299,"sidemenuName":299,"url":106,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":300,"submenu":301,"tag":17},"Aplicación Móvil",{},[],{"headerName":115,"sidemenuName":115,"url":116,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":303,"submenu":304,"tag":17},{"geofencing-uk":66},[],{"headerName":306,"sidemenuName":306,"url":121,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":307,"submenu":308,"tag":17},"Ganar Prestando",{"geofencing-uk":66},[],{"headerName":310,"sidemenuName":310,"url":311,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":312,"submenu":313,"tag":17},"Mercados","/markets/",{},[],{"headerName":315,"sidemenuName":315,"url":111,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":316,"submenu":317,"tag":17},"Vista de Trading",{},[],{"headerName":319,"sidemenuName":319,"url":320,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":321,"submenu":322,"tag":17},"Blog","https://blog.bitstamp.net/",{},[],{"headerName":324,"sidemenuName":324,"url":325,"noFollow":35,"showInHeader":66,"showInSidemenu":66,"geofencings":326,"submenu":327,"tag":17},"Aprender","/learn/",{},[],{"headerName":329,"sidemenuName":329,"url":106,"noFollow":35,"showInHeader":35,"showInSidemenu":66,"geofencings":330,"submenu":331,"tag":17},"Obtener la app de Bitstamp",{},[],"Ir a la plataforma","Atrás","Iniciar sesión","Comenzar",{"posts":337,"paginationItems":530},[338,353,365,375,385,395,406,416,426,436,448,458,468,478,488,498,508,518],{"category":339,"image":342,"title":349,"excerpt":350,"url":351,"geofencings":352},{"name":340,"url":21,"geofencings":341},"Security",{},{"url":343,"mime":344,"ext":345,"width":346,"height":347,"name":348,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_99svg_f592e3b367_66105d8905_c00b80cb39.svg","image/svg+xml",".svg",192,108,"1920x1080px_illustrations_learningcenter_99svg_f592e3b367_66105d8905.svg","¿Cómo se logra el consenso descentralizado?","\u003Cp>Las redes descentralizadas como Bitcoin, Litecoin, Ethereum o Bitcoin Cash no tienen una autoridad central que valide sus transacciones criptográficas o proteja sus registros.\u003C/p>\n","/es/learn/security/how-is-decentralized-consensus-achieved/",{},{"category":354,"image":356,"title":361,"excerpt":362,"url":363,"geofencings":364},{"name":340,"url":21,"geofencings":355},{},{"url":357,"mime":344,"ext":345,"width":358,"height":359,"name":360,"alt":17},"bitstampImageUrl/How_to_use_a_ledger_wallet_svg_3c2a259ed9_9226b93003_4ecfb2312a.svg",1920,1080,"How_to_use_a_ledger_wallet_svg_3c2a259ed9_9226b93003.svg","¿Cómo usar la billetera Ledger?","\u003Cp>Aprende cómo utilizar las billeteras de hardware de Ledger para custodiar tus propias criptomonedas.\u003C/p>\n","/es/learn/security/how-to-use-ledger-wallet/",{},{"category":366,"image":368,"title":371,"excerpt":372,"url":373,"geofencings":374},{"name":340,"url":21,"geofencings":367},{},{"url":369,"mime":12,"ext":13,"width":358,"height":359,"name":370,"alt":17},"bitstampImageUrl/What_is_Phishing_1png_fc4b35bebf_3fe22bcb8a_01ed867b67.png","What_is_Phishing_1png_fc4b35bebf_3fe22bcb8a.png","¿Qué es el phishing?","\u003Cp>El phishing es un ataque en línea donde actores maliciosos envían mensajes a las víctimas haciéndose pasar por una persona o empresa de confianza.\u003C/p>\n","/es/learn/security/what-is-phishing/",{},{"category":376,"image":378,"title":381,"excerpt":382,"url":383,"geofencings":384},{"name":340,"url":21,"geofencings":377},{},{"url":379,"mime":344,"ext":345,"width":346,"height":347,"name":380,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_100svg_f4565986d1_20e4fe64f1_b37a774837.svg","1920x1080px_illustrations_learningcenter_100svg_f4565986d1_20e4fe64f1.svg","¿Qué es la inmutabilidad de la blockchain?","\u003Cp>Las blockchains que utilizan prueba de trabajo a menudo se denominan registros inmutables: todo lo que se escribe en una blockchain de este tipo permanece allí. Es imposible alterar o reemplazar esa información. Pero, ¿es realmente imposible forzar cambios en una blockchain, modificar el historial de transacciones y redistribuir monedas? La respuesta simple es: no es imposible, solo muy, muy difícil.\u003C/p>\n","/es/learn/security/what-is-blockchain-immutability/",{},{"category":386,"image":388,"title":391,"excerpt":392,"url":393,"geofencings":394},{"name":340,"url":21,"geofencings":387},{},{"url":389,"mime":344,"ext":345,"width":346,"height":347,"name":390,"alt":17},"bitstampImageUrl/What_is_Anti_Money_Laundering_law_AML_svg_c1a977ad19_fd735f2b3b_1e61e080bd.svg","What_is_Anti_Money_Laundering_law_AML_svg_c1a977ad19_fd735f2b3b.svg","¿Qué es la ley contra el blanqueo de capitales? (AML)","\u003Cp>El término 'anti-lavado de dinero' abarca las leyes, regulaciones y procedimientos establecidos para evitar que los delincuentes disimulen el dinero obtenido por medios ilícitos.\u003C/p>\n","/es/learn/security/what-is-anti-money-laundering-law-aml/",{},{"category":396,"image":398,"title":402,"excerpt":403,"url":404,"geofencings":405},{"name":340,"url":21,"geofencings":397},{},{"url":399,"mime":12,"ext":13,"width":14,"height":400,"name":401,"alt":17},"bitstampImageUrl/proof_of_reservespng_fb942a8fa3_b95e334ca7_2a8e3c1fde.png",623,"proof_of_reservespng_fb942a8fa3_b95e334ca7.png","¿Qué es la Prueba de Reservas?","\u003Cp>La Prueba de Reservas (PoR) es una forma en que los exchanges de criptomonedas rinden cuentas públicamente de sus activos digitales, asegurando que los depósitos de los usuarios estén seguros y disponibles para su retiro.\u003C/p>\n","/es/learn/security/what-is-proof-of-reserves/",{},{"category":407,"image":409,"title":412,"excerpt":413,"url":414,"geofencings":415},{"name":340,"url":21,"geofencings":408},{},{"url":410,"mime":344,"ext":345,"width":346,"height":347,"name":411,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_101svg_9e30efbc69_2666dbd988_d3218a1698.svg","1920x1080px_illustrations_learningcenter_101svg_9e30efbc69_2666dbd988.svg","¿Qué es un ataque del 51%?","\u003Cp>Un ataque del 51% (también conocido como ataque de mayoría o ataque de doble gasto) es un posible ataque a las cadenas de bloques que se crean mediante el proceso de minería.\u003C/p>\n","/es/learn/security/what-is-a-51-percent-attack/",{},{"category":417,"image":419,"title":422,"excerpt":423,"url":424,"geofencings":425},{"name":340,"url":21,"geofencings":418},{},{"url":420,"mime":344,"ext":345,"width":346,"height":347,"name":421,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_102svg_e3d1925618_f8390bfa3b_72b1e278cc.svg","1920x1080px_illustrations_learningcenter_102svg_e3d1925618_f8390bfa3b.svg","¿Qué es un ataque Sybil?","\u003Cp>Un ataque Sybil es un ataque contra redes peer-to-peer en el que un solo atacante crea múltiples identidades falsas para obtener una ventaja en la red. Otros usuarios no reconocen estas identidades como ficticias, lo que otorga al atacante una influencia desproporcionadamente grande sobre la red.\u003C/p>\n","/es/learn/security/what-is-a-sybil-attack/",{},{"category":427,"image":429,"title":432,"excerpt":433,"url":434,"geofencings":435},{"name":340,"url":21,"geofencings":428},{},{"url":430,"mime":344,"ext":345,"width":346,"height":347,"name":431,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_97svg_f64f60bf13_d0b3c3222e_986abc8106.svg","1920x1080px_illustrations_learningcenter_97svg_f64f60bf13_d0b3c3222e.svg","¿Qué es una cartera MultiSig?","\u003Cp>Una cartera MultiSig es una cartera digital que opera con direcciones de firma múltiple. Esto significa que requiere más de una clave privada para firmar y autorizar una transacción de criptomonedas o, en algunos casos, que se pueden utilizar varias claves diferentes para generar una firma.\u003C/p>\n","/es/learn/security/what-is-a-multisig-wallet/",{},{"category":437,"image":439,"title":444,"excerpt":445,"url":446,"geofencings":447},{"name":340,"url":21,"geofencings":438},{},{"url":440,"mime":344,"ext":345,"width":441,"height":442,"name":443,"alt":17},"bitstampImageUrl/what_are_multi_party_computation_mpc_walletssvg_d8a8152581_e96bc1fb08_3b6de2b187.svg",1676,857,"what_are_multi_party_computation_mpc_walletssvg_d8a8152581_e96bc1fb08.svg","¿Qué son las Carteras de Computación Multi-Parte (MPC)?","\u003Cp>La computación multi-parte (MPC) es un protocolo criptográfico que permite a múltiples partes calcular una función única basada en sus entradas individuales sinrevelar ninguna entrada a las otras partes. Las carteras MPC son una implementación práctica de la tecnología MPC, ofreciendo beneficios como seguridad y eficiencia en la transferencia de fondos.\u003C/p>\n","/es/learn/security/what-are-multi-party-computation-mpc-wallets/",{},{"category":449,"image":451,"title":454,"excerpt":455,"url":456,"geofencings":457},{"name":340,"url":21,"geofencings":450},{},{"url":452,"mime":344,"ext":345,"width":346,"height":347,"name":453,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_96svg_21bb745812_73c66d208f_a95c130485.svg","1920x1080px_illustrations_learningcenter_96svg_21bb745812_73c66d208f.svg","¿Qué son las claves privadas y públicas?","\u003Cp>Las monedas digitales como bitcoin o ether (Ethereum) no se llaman criptomonedas sin motivo. Al no tener forma física ni una autoridad central que verifique las transferencias y la propiedad de las monedas, la funcionalidad de las criptomonedas depende fundamentalmente de la criptografía.\u003C/p>\n","/es/learn/security/what-are-private-and-public-keys/",{},{"category":459,"image":461,"title":464,"excerpt":465,"url":466,"geofencings":467},{"name":340,"url":21,"geofencings":460},{},{"url":462,"mime":344,"ext":345,"width":346,"height":347,"name":463,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_94svg_8f63224791_1b487da01d.svg","1920x1080px_illustrations_learningcenter_94svg_8f63224791.svg","¿Qué son las reglas de consenso de la cadena de bloques?","\u003Cp>Una de las dificultades que enfrentan las redes distribuidas de cadenas de bloques es llegar a un acuerdo sobre qué transacciones son legítimas, qué bloques son válidos y cuál es la cadena más larga. Para resolver este problema, cada cadena de bloques implementa una serie de reglas de consenso que todos los usuarios, o nodos, deben seguir.\u003C/p>\n","/es/learn/security/what-are-blockchain-consensus-rules/",{},{"category":469,"image":471,"title":474,"excerpt":475,"url":476,"geofencings":477},{"name":340,"url":21,"geofencings":470},{},{"url":472,"mime":344,"ext":345,"width":346,"height":347,"name":473,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_95svg_34d243a12e_18ac8c1b97.svg","1920x1080px_illustrations_learningcenter_95svg_34d243a12e.svg","¿Qué son las reglas de política de la cadena de bloques?","\u003Cp>Las reglas de política de la cadena de bloques se refieren a opciones de configuración que modifican el comportamiento de los nodos. Cada nodo puede establecer sus propias reglas para servir sus intereses individuales.\u003C/p>\n","/es/learn/security/what-are-blockchain-policy-rules/",{},{"category":479,"image":481,"title":484,"excerpt":485,"url":486,"geofencings":487},{"name":340,"url":21,"geofencings":480},{},{"url":482,"mime":12,"ext":13,"width":358,"height":359,"name":483,"alt":17},"bitstampImageUrl/What_are_vulnerable_smart_contracts_and_how_to_spot_them_png_f7bad3fca8_73d6cf28d1_03b0ad3c6e.png","What_are_vulnerable_smart_contracts_and_how_to_spot_them_png_f7bad3fca8_73d6cf28d1.png","¿Qué son los contratos inteligentes vulnerables?","\u003Cp>Los contratos inteligentes vulnerables tienen debilidades técnicas de varios tipos que pueden ser explotadas por atacantes para robar fondos o datos.\u003C/p>\n","/es/learn/security/what-are-vulnerable-smart-contracts/",{},{"category":489,"image":491,"title":494,"excerpt":495,"url":496,"geofencings":497},{"name":340,"url":21,"geofencings":490},{},{"url":492,"mime":344,"ext":345,"width":346,"height":347,"name":493,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_93svg_e7a94e0033_898d993680_f858d7d81f.svg","1920x1080px_illustrations_learningcenter_93svg_e7a94e0033_898d993680.svg","¿Qué tan privada es la cadena de bloques?","\u003Cp>Mantener la privacidad en el mundo digital es cada vez más difícil hoy en día. Los gigantes de Internet se han propuesto recopilar la mayor cantidad de datos posible sobre sus usuarios. Incluso existen empresas cuyo único propósito es recoger datos de usuarios, con o sin consentimiento, y venderlos a terceros.\u003C/p>\n","/es/learn/security/how-private-is-blockchain/",{},{"category":499,"image":501,"title":504,"excerpt":505,"url":506,"geofencings":507},{"name":340,"url":21,"geofencings":500},{},{"url":502,"mime":344,"ext":345,"width":346,"height":347,"name":503,"alt":17},"bitstampImageUrl/1920x1080px_illustrations_learningcenter_92_1svg_f4bb2bbd43_a462c7dc8d_f877c2175d.svg","1920x1080px_illustrations_learningcenter_92_1svg_f4bb2bbd43_a462c7dc8d.svg","Confianza y seguridad en la cadena de bloques","\u003Cp>Cuando compras algo, confías en alguien para autorizar que has pagado por el producto o servicio. En los intercambios tradicionales, este alguien es un tercero que goza de la confianza de todos los involucrados en la transacción.\u003C/p>\n","/es/learn/security/blockchain-trustlessness-security/",{},{"category":509,"image":511,"title":514,"excerpt":515,"url":516,"geofencings":517},{"name":340,"url":21,"geofencings":510},{},{"url":512,"mime":12,"ext":13,"width":358,"height":359,"name":513,"alt":17},"bitstampImageUrl/What_is_Know_Your_Customer_KYC_png_83a5dc83a5_f2f76a306f_a47f89b1f5.png","What_is_Know_Your_Customer_KYC_png_83a5dc83a5_f2f76a306f.png","Conozca a su Cliente (KYC)","\u003Cp>Conozca a su Cliente (KYC) es el proceso utilizado por las empresas financieras para identificar a los clientes y establecer los riesgos de hacer negocios con ellos.\u003C/p>\n","/es/learn/security/know-your-customer-kyc/",{},{"category":519,"image":521,"title":526,"excerpt":527,"url":528,"geofencings":529},{"name":340,"url":21,"geofencings":520},{},{"url":522,"mime":12,"ext":13,"width":523,"height":524,"name":525,"alt":17},"bitstampImageUrl/Cryptocurrency_Scams_and_Fraud_Preventionpng_e56edfc69c_9b60ae0eab_da5a8980c9.png",1921,1081,"Cryptocurrency_Scams_and_Fraud_Preventionpng_e56edfc69c_9b60ae0eab.png","Estafas de criptomonedas y prevención de fraudes","\u003Cp>Las estafas y el fraude son una realidad desafortunada en las criptomonedas. Al aprender qué buscar, los usuarios pueden protegerse mejor a sí mismos y a sus fondos.\u003C/p>\n","/es/learn/security/cryptocurrency-scams-and-fraud-prevention/",{},[531],"/category-posts/security-es-1.json",[533,534,535,536,537,538,539,540,541,542],{"name":246,"url":247,"hideInCategoryPagination":35},{"name":250,"url":251,"hideInCategoryPagination":66},{"name":254,"url":255,"hideInCategoryPagination":35},{"name":258,"url":259,"hideInCategoryPagination":35},{"name":262,"url":263,"hideInCategoryPagination":35},{"name":63,"url":27,"hideInCategoryPagination":35},{"name":268,"url":269,"hideInCategoryPagination":35},{"name":272,"url":273,"hideInCategoryPagination":35},{"name":276,"url":277,"hideInCategoryPagination":35},{"name":280,"url":281,"hideInCategoryPagination":35},1776943567325]