{"version":"1.0","provider_name":"Tech blog for developers | Facilcloud","provider_url":"https:\/\/www.blog.facilcloud.com\/noticias","author_name":"Astro Cloud","author_url":"https:\/\/www.blog.facilcloud.com\/noticias\/author\/cloudio\/","title":"\u00bfQu\u00e9 motiva a un hacker? - Tech blog for developers | Facilcloud","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"T6OWJC5wPW\"><a href=\"https:\/\/www.blog.facilcloud.com\/noticias\/what-motivates-a-hacker\/\">\u00bfQu\u00e9 motiva a un hacker?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.blog.facilcloud.com\/noticias\/what-motivates-a-hacker\/embed\/#?secret=T6OWJC5wPW\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfQu\u00e9 motiva a un hacker?\u00bb \u2014 Tech blog for developers | Facilcloud\" data-secret=\"T6OWJC5wPW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.blog.facilcloud.com\/noticias\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.blog.facilcloud.com\/noticias\/wp-content\/uploads\/2015\/11\/Hackers-01.jpg","thumbnail_width":700,"thumbnail_height":253,"description":"Mucho se ha hablado sobre las razones que llevan a una persona a violar la privacidad de otra mediante herramientas y medios electr\u00f3nicos, la venganza podr\u00eda ser considerada la principal motivaci\u00f3n por la cual una persona hackea, pero la psic\u00f3loga Mary Aiken\u00a0 considera un enfoque distinto, se basa en un\u00a0 psicoan\u00e1lisis en t\u00e9rminos freudianos como [&hellip;]"}