{"id":41453,"date":"2021-08-10T09:36:57","date_gmt":"2021-08-10T07:36:57","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=41453"},"modified":"2021-12-14T09:27:03","modified_gmt":"2021-12-14T08:27:03","slug":"privacy-with-qr-cards","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/privacy-with-qr-cards\/","title":{"rendered":"Security alert for our privacy with QR letters"},"content":{"rendered":"<p>The QR code, which we also call Bidi (although they are not the same) is a <strong>two-dimensional code <\/strong>created in 1994 by a subsidiary company of Toyota. Its acronym \u201cQR\u201d derives from English <strong>\u201cQuick Response\u201d<\/strong> and it differs from the Bidi code by the three squares in the corners that allow the position of the code to be detected when scanning it.<\/p>\n\n\n\n<p>We are experiencing a digital transformation, where cybersecurity is born with the need to safeguard this transformation process. With the <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" data-type=\"URL\" data-id=\"https:\/\/eiposgrados.com\/master-en-ciberseguridad\/\">Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/a> You will be trained in this area.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Initial function of QR code<\/h2>\n\n\n\n<p>Although they were initially created to<strong> register vehicle spare parts<\/strong>, today it has many more uses, especially consumer-oriented, thanks to the readers built into Smartphones. <\/p>\n\n\n\n<p>And it would not be until 2002 when they really became important. They would be the <strong>mobile phone companies<\/strong> those that are beginning to give it a more consumer-focused use, especially to advertise their products.<\/p>\n\n\n\n<p>For example, the<strong> QR letters<\/strong>, especially thanks to the pandemic since in this way, we avoid contact with paper letters and the risk that could entail.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/08\/alerta-de-seguridad-codigo-qr-1024x671.jpg\" alt=\"\" class=\"wp-image-41468\" width=\"502\" height=\"329\" title=\"\"><\/figure><\/div>\n\n\n\n<p>What happens is that every time we consult the QR letters, or any content or link from a bidi code, <strong>we provide important data<\/strong> such as the location and our interest in the product or service consulted, information that would interest many <strong>marketing companies<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data collection<\/h2>\n\n\n\n<p>As we have been able to read in The New York Times, there are systems that collect data from QR letter queries that can even be used to<strong> track customers<\/strong>. Consulting the menu in QR plus the data that can be obtained from the connection, browser, etc., provides much more information than we think.<\/p>\n\n\n\n<p>Although it is not much, if we add the<strong> consultation of the letters<\/strong>, some <strong>advertising inquiry<\/strong>, or collect the data of a QR store, is more than enough information to<strong> create databases <\/strong>that thanks to unique identifiers, they can create a consumption profile of any user. Which, as we have already mentioned, is a cake highly desired by marketing companies and others.<\/p>\n\n\n\n<p>Let&#039;s hope that with the boom that QR codes are having among consumers, the big browsers <strong>strengthen your security<\/strong> to avoid data \u201cleaks\u201d and ensure data privacy.<\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered if there is privacy with QR cards? We tell you about the data collection that exists with this code, go ahead!<\/p>","protected":false},"author":1,"featured_media":41467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-41453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/41453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=41453"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/41453\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/41467"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=41453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=41453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=41453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}