{"id":2092,"date":"2025-12-09T16:07:09","date_gmt":"2025-12-09T19:07:09","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2092"},"modified":"2025-12-09T16:07:09","modified_gmt":"2025-12-09T19:07:09","slug":"metaverse-experts-concerns-over-privacy-threats","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/","title":{"rendered":"Metaverse: Experts&#8217; concerns over privacy threats"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">No hay c\u00f3mo negar que el metaverso es una de las tendencias tecnol\u00f3gicas m\u00e1s prometedoras de los \u00faltimos a\u00f1os. Aunque el concepto parezca bastante complejo, la idea de que estamos literalmente insertos en un ambiente totalmente virtualizado para consumir contenido, colaborar e interactuar con otras personas al fin est\u00e1 dejando de ser un escenario de pel\u00edcula de ciencia ficci\u00f3n. Sin embargo, no todo son rosas y algunos expertos ya han manifestado una serie de preocupaciones con respecto a la moda del momento.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La verdad es una sola: las propuestas del metaverso, de hecho, generan nuevos riesgos y amenazas a la privacidad y seguridad cibern\u00e9tica de los usuarios. Es necesario que no solo las empresas involucradas en la creaci\u00f3n de esos ambientes digitales presten atenci\u00f3n a esas cuestiones, sino tambi\u00e9n que los propios internautas tomen cuidado al embarcar en ese terreno desconocido y que sean conscientes de los peligros que puede representar.<\/span><\/p>\n<h2><b>M\u00e1s datos que nunca<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Una de las preocupaciones relacionadas a la popularizaci\u00f3n de los metaversos es la relativa a la recogida excesiva de datos; y no hablamos solo de la informaci\u00f3n que ya se suele recoger en los d\u00edas actuales, como nombre, e-mail, direcci\u00f3n postal y afines. La mayor\u00eda de los proyectos de metaversos involucran el uso de dispositivos electr\u00f3nicos avanzados, como gafas de realidad virtual y aumentada (VR y AR), adem\u00e1s de otros sensores diversos que servir\u00edan para hacer el juego aun m\u00e1s \u201crealista\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, conviene detenerse a pensar en la cantidad de informaci\u00f3n de telemetr\u00eda que esos gadgets tendr\u00edan la capacidad de capturar. Bas\u00e1ndose en la dilataci\u00f3n de la pupila y el an\u00e1lisis de las pulsaciones card\u00edacas de los usuarios, una red de publicidad, por ejemplo, lograr\u00eda identificar qu\u00e9 tipo de publicidad es m\u00e1s eficiente para cierto individuo. Adem\u00e1s, al aumentar la recogida y el uso de datos, tambi\u00e9n se abren m\u00e1s precedentes para m\u00e1s filtraciones e interceptaciones por parte de delincuentes cibern\u00e9ticos.<\/span><\/p>\n<h2><b>Esto es un asalto\u2026 \u00a1digital!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Y, hablando de ciberdelincuentes, el cibercrimen tambi\u00e9n evoluciona paralelamente al metaverso. Ante todo, cabe recordar que la mayor\u00eda de esos ambientes digitales se est\u00e1n construyendo con bases s\u00f3lidas en la criptoeconom\u00eda. Se pueden adquirir tokens no fungibles (los famosos non-fungible tokens o NFT) y usar contratos inteligentes de la blockchain para, por ejemplo, comprar un terreno virtual por valores que se acercan a los precios de una propiedad en el mundo real.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, las redes blockchain no son invulnerables: ya se han detectado ataques y estafas dentro del metaverso en los cuales el comprador de un activo digital paga por un determinado bien y no lo recibe; adem\u00e1s de formas relativamente simples de robar criptomonedas. La mayor\u00eda de las veces, esos fraudes tambi\u00e9n incluyen el uso de ingenier\u00eda social para persuadir a la v\u00edctima a cerrar un negocio.<\/span><\/p>\n<h2><b>Y hay mucho m\u00e1s\u2026<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Esos ejemplos son solo la punta del iceberg. Dado que aun no existen legislaciones espec\u00edficas para metaversos (que protejan a las v\u00edctimas y penalicen actos indebidos en ese \u201cmundo cibern\u00e9tico\u201d), la conclusi\u00f3n es la de que, en los pr\u00f3ximos a\u00f1os, los metaversos probablemente aun nos causen dolores de cabeza hasta que la situaci\u00f3n se estabilice.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>There\u2019s no denying that the metaverse is one of the most promising technological trends of recent years. Although the concept seems quite complex, the idea of literally being inserted into a fully virtual environment to consume content, collaborate and interact with other people is finally shifting closer toward reality. However, it&#8217;s not all roses, and [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2094,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,102],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-metaverse"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metaverse: Experts&#039; concerns over privacy threats | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metaverse: Experts&#039; concerns over privacy threats | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T19:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Metaverse: Experts&#8217; concerns over privacy threats\",\"datePublished\":\"2025-12-09T19:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\"},\"wordCount\":456,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png\",\"keywords\":[\"cybersecurity\",\"metaverse\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\",\"name\":\"Metaverse: Experts' concerns over privacy threats | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png\",\"datePublished\":\"2025-12-09T19:07:09+00:00\",\"description\":\"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png\",\"width\":1500,\"height\":1000,\"caption\":\"metaverse\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metaverse: Experts&#8217; concerns over privacy threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Metaverse: Experts' concerns over privacy threats | Hacker Rangers","description":"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Metaverse: Experts' concerns over privacy threats | Hacker Rangers","og_description":"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-09T19:07:09+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Metaverse: Experts&#8217; concerns over privacy threats","datePublished":"2025-12-09T19:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/"},"wordCount":456,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png","keywords":["cybersecurity","metaverse"],"articleSection":["Cybersecurity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/","name":"Metaverse: Experts' concerns over privacy threats | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png","datePublished":"2025-12-09T19:07:09+00:00","description":"Explore the privacy and cybersecurity risks of the metaverse, from massive data collection to digital scams targeting virtual assets.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/metaverse.png","width":1500,"height":1000,"caption":"metaverse"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/metaverse-experts-concerns-over-privacy-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Metaverse: Experts&#8217; concerns over privacy threats"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2094"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}