{"id":27785,"date":"2025-02-07T19:34:28","date_gmt":"2025-02-08T02:34:28","guid":{"rendered":"https:\/\/xx.network\/?page_id=27785"},"modified":"2025-02-07T19:53:02","modified_gmt":"2025-02-08T02:53:02","slug":"cmixx","status":"publish","type":"page","link":"https:\/\/xx.network\/es\/cmixx\/","title":{"rendered":"cMixx"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"27785\" class=\"elementor elementor-27785\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdb1b21 elementor-section-content-middle faq-banner elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cdb1b21\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1fc2a34\" data-id=\"1fc2a34\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd3bd04 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd3bd04\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d70a78\" data-id=\"2d70a78\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bca5a97 elementor-widget elementor-widget-accordion\" data-id=\"bca5a97\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1971\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1971\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How was cMixx invented?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1971\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1971\"><p><span style=\"font-weight: 400;\">En 2016, Chaum y un equipo de investigadores publicaron un dise\u00f1o para una red de mezcla \"acelerada\" llamada \"cmix\".  \"Precomputaci\u00f3n\" se propuso como soluci\u00f3n a la lentitud de las redes de mezcla t\u00edpicas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La precomputaci\u00f3n permite a los nodos mixtos ejecutar la criptograf\u00eda de clave p\u00fablica, que consume mucho tiempo, antes de la fase en tiempo real de tratamiento de mensajes o transmisi\u00f3n de datos entre remitentes y destinatarios. El resultado es un tipo de mixnet muy eficiente que permite a los usuarios enviar y recibir en tiempo real sin comprometer la seguridad ni la privacidad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Parte del proyecto de investigaci\u00f3n inicial fue una implementaci\u00f3n acad\u00e9mica de referencia que sirvi\u00f3 como prueba de concepto para cmix; inclu\u00eda un equipo backend de nodos mixtos y un cliente rudimentario para smartphone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En agosto de 2017, bajo el liderazgo de Chaum, un grupo de desarrollo comenz\u00f3 a crear una implementaci\u00f3n descentralizada, segura y escalable llamada cMixx.  El equipo inclu\u00eda a pioneros que desarrollaron los primeros sistemas criptogr\u00e1ficos pr\u00e1cticos, an\u00f3nimos y verificables. Sus miembros fueron de los primeros en proponer y desplegar monedas digitales, redes mixtas, criptograf\u00eda sin permiso, sistemas de votaci\u00f3n verificables y muchos otros avances en criptograf\u00eda.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1972\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1972\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a \"Mixnet\"?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1972\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1972\"><p><span style=\"font-weight: 400;\">cMixx es una mixnet muy r\u00e1pida.  En t\u00e9rminos m\u00e1s generales, las mixnets, tambi\u00e9n conocidas como redes de mezcla, fueron descritas por primera vez por David Chaum, fundador de xx network, en 1979. Una mixnet establece reglas criptogr\u00e1ficas para que los mensajes o transacciones sean retransmitidos por una secuencia de intermediarios de confianza conocidos como nodos mixtos. Estos nodos mixtos reciben un lote de datos cifrados de los usuarios, los permutan o \"mezclan\" aleatoriamente y env\u00edan los datos reordenados y cifrados al siguiente nodo mixto.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Esta \"mezcla\" oculta los metadatos asociados a la actividad del usuario, creando un sistema de comunicaci\u00f3n que protege la privacidad. Los metadatos son los detalles de qui\u00e9n, qu\u00e9, cu\u00e1ndo, d\u00f3nde y c\u00f3mo asociados a cualquier mensaje o actividad.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El principal inconveniente de las redes mixtas existentes es que las operaciones de clave p\u00fablica necesarias para la operaci\u00f3n de mezcla requieren un c\u00e1lculo intensivo.  De hecho, en 1979, los c\u00e1lculos descritos originalmente en el art\u00edculo de Chaum superaban la potencia de la mayor\u00eda de los ordenadores existentes.  Incluso ahora, los c\u00e1lculos necesarios para las redes mixtas t\u00edpicas consumen muchos recursos y tiempo.  Por eso, cuando se realizan a gran escala, las redes mixtas son demasiado lentas para la mayor\u00eda de los consumidores.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1973\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1973\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How cMixx Works<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1973\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1973\"><p><span style=\"font-weight: 400;\">cMixx es el protocolo avanzado de privacidad del xx network dise\u00f1ado para eliminar la exposici\u00f3n de metadatos en las interacciones en l\u00ednea entre personas, cadenas y empresas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En la precomputaci\u00f3n, tras la selecci\u00f3n aleatoria de un nuevo equipo de xx nodos, \u00e9stos realizan una serie de c\u00e1lculos criptogr\u00e1ficos resistentes a la cu\u00e1ntica para producir una plantilla que dicta c\u00f3mo debe procesar el equipo la informaci\u00f3n durante la mezcla. La plantilla est\u00e1 completamente definida antes de que llegue el lote de mensajes, lo que garantiza la confidencialidad al tiempo que aumenta dr\u00e1sticamente la velocidad a la que puede procesarse la informaci\u00f3n en la fase de tiempo real.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-27345 size-full\" src=\"https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx.png\" alt=\"\" width=\"1280\" height=\"720\" srcset=\"https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx.png 1280w, https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx-300x169.png 300w, https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx-1030x579.png 1030w, https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx-768x432.png 768w, https:\/\/xx.network\/wp-content\/uploads\/2024\/10\/Conventional-Mix-vs-cMixx-18x10.png 18w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">En tiempo real, los remitentes consultan a las pasarelas y env\u00edan sus datos. A continuaci\u00f3n, las pasarelas agregan los datos en conjuntos an\u00f3nimos. La red encamina los conjuntos de datos a trav\u00e9s de un equipo de nodos seleccionados al azar. El primer nodo del equipo utiliza la plantilla para cifrar eficazmente cada dato; el nodo tambi\u00e9n utiliza la plantilla para cambiar el orden de los datos en el conjunto. Los sucesivos nodos del equipo repiten este proceso. El \u00faltimo nodo env\u00eda el conjunto de datos an\u00f3nimos, ahora cifrados, a una pasarela. A continuaci\u00f3n, los destinatarios consultan xx pasarelas para recuperar sus datos.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1974\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1974\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How cMixx Protects Users and Their Data<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1974\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1974\"><p><span style=\"font-weight: 400;\">A diferencia del software de comunicaci\u00f3n y transferencia de datos existente que utiliza criptograf\u00eda heredada, cMixx es resistente a la computaci\u00f3n cu\u00e1ntica, salvaguardando los datos y contenidos incluso frente a futuras amenazas de la computaci\u00f3n cu\u00e1ntica.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El proceso de \"mezcla\" del xx network rompe el v\u00ednculo entre remitentes y destinatarios, garantizando el anonimato total e imposibilitando el seguimiento de patrones de interacci\u00f3n o la identificaci\u00f3n de usuarios. A diferencia de los m\u00e9todos tradicionales de comunicaci\u00f3n o transferencia de datos, que dejan al descubierto metadatos como direcciones IP y marcas de tiempo, el cMixx cifra y aleatoriza eficazmente el tr\u00e1fico de datos, impidiendo cualquier forma de rastreo. Este nivel de privacidad es crucial para proteger datos sensibles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El protocolo puede integrarse a la perfecci\u00f3n como una soluci\u00f3n de privacidad de capa 2 en varias redes blockchain, mejorando la seguridad de aplicaciones descentralizadas, empresas y otros servicios digitales. Con cMixx, el xx network est\u00e1 construyendo la infraestructura para una comunicaci\u00f3n segura, privada y escalable en la era digital.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec68211 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec68211\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6282f6c\" data-id=\"6282f6c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e449a2d elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"e449a2d\" data-element_type=\"widget\" data-settings=\"{&quot;source&quot;:&quot;external_url&quot;,&quot;source_external_url&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/xx.network\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Messenger_Icon-1.0.json&quot;,&quot;is_external&quot;:&quot;&quot;,&quot;nofollow&quot;:&quot;&quot;,&quot;custom_attributes&quot;:&quot;&quot;},&quot;trigger&quot;:&quot;bind_to_scroll&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;effects_relative_to&quot;:&quot;viewport&quot;,&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-09c76f1\" data-id=\"09c76f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49fe9f4 elementor-widget elementor-widget-text-editor\" data-id=\"49fe9f4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4>Ver: xx network proporciona destrucci\u00f3n de metadatos en tiempo real para mensajer\u00eda y transacciones ultraseguras.<\/h4>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a05b7f3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a05b7f3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-671a2d5\" data-id=\"671a2d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3027741 elementor-widget elementor-widget-video\" data-id=\"3027741\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"clipboard-write\" title=\"Player de V\u00eddeo vimeo\" src=\"https:\/\/player.vimeo.com\/video\/640539553?color&amp;autopause=0&amp;loop=0&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1&amp;h=6863a4418e#t=\" data-no-translation-title=\"\"><\/iframe>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>How was cMixx invented? In 2016, Chaum and a team of researchers published a design for an \u201caccelerated\u201d mix net [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/xx.network\/es\/cmixx\/\">Leer m\u00e1s...<span class=\"screen-reader-text\"> from cMixx<\/span><\/a><\/p>","protected":false},"author":164,"featured_media":18773,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-27785","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>cMixx - xx network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xx.network\/es\/cmixx\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"cMixx - xx network\" \/>\n<meta property=\"og:description\" content=\"How was cMixx invented? In 2016, Chaum and a team of researchers published a design for an \u201caccelerated\u201d mix net [...]Leer m\u00e1s... from cMixx\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xx.network\/es\/cmixx\/\" \/>\n<meta property=\"og:site_name\" content=\"xx network\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-08T02:53:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xx.network\/cmixx\/\",\"url\":\"https:\/\/xx.network\/cmixx\/\",\"name\":\"cMixx - xx network\",\"isPartOf\":{\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xx.network\/cmixx\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xx.network\/cmixx\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg\",\"datePublished\":\"2025-02-08T02:34:28+00:00\",\"dateModified\":\"2025-02-08T02:53:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xx.network\/cmixx\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xx.network\/cmixx\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/xx.network\/cmixx\/#primaryimage\",\"url\":\"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg\",\"contentUrl\":\"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xx.network\/cmixx\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xx.network\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cMixx\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#website\",\"url\":\"https:\/\/pvrjousb.elementor.cloud\/\",\"name\":\"xx network\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pvrjousb.elementor.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#organization\",\"name\":\"xx network\",\"url\":\"https:\/\/pvrjousb.elementor.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xx.network\/wp-content\/uploads\/2021\/10\/xx-network_logotype_color.svg\",\"contentUrl\":\"https:\/\/xx.network\/wp-content\/uploads\/2021\/10\/xx-network_logotype_color.svg\",\"width\":525,\"height\":175,\"caption\":\"xx network\"},\"image\":{\"@id\":\"https:\/\/pvrjousb.elementor.cloud\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"cMixx - xx network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xx.network\/es\/cmixx\/","og_locale":"es_ES","og_type":"article","og_title":"cMixx - xx network","og_description":"How was cMixx invented? In 2016, Chaum and a team of researchers published a design for an \u201caccelerated\u201d mix net [...]Leer m\u00e1s... from cMixx","og_url":"https:\/\/xx.network\/es\/cmixx\/","og_site_name":"xx network","article_modified_time":"2025-02-08T02:53:02+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xx.network\/cmixx\/","url":"https:\/\/xx.network\/cmixx\/","name":"cMixx - xx network","isPartOf":{"@id":"https:\/\/pvrjousb.elementor.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xx.network\/cmixx\/#primaryimage"},"image":{"@id":"https:\/\/xx.network\/cmixx\/#primaryimage"},"thumbnailUrl":"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg","datePublished":"2025-02-08T02:34:28+00:00","dateModified":"2025-02-08T02:53:02+00:00","breadcrumb":{"@id":"https:\/\/xx.network\/cmixx\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xx.network\/cmixx\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/xx.network\/cmixx\/#primaryimage","url":"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg","contentUrl":"https:\/\/xx.network\/wp-content\/uploads\/2022\/01\/What-is-it-like-to-be-an-xx-Node_.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/xx.network\/cmixx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xx.network\/"},{"@type":"ListItem","position":2,"name":"cMixx"}]},{"@type":"WebSite","@id":"https:\/\/pvrjousb.elementor.cloud\/#website","url":"https:\/\/pvrjousb.elementor.cloud\/","name":"xx network","description":"","publisher":{"@id":"https:\/\/pvrjousb.elementor.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pvrjousb.elementor.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/pvrjousb.elementor.cloud\/#organization","name":"xx network","url":"https:\/\/pvrjousb.elementor.cloud\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pvrjousb.elementor.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/xx.network\/wp-content\/uploads\/2021\/10\/xx-network_logotype_color.svg","contentUrl":"https:\/\/xx.network\/wp-content\/uploads\/2021\/10\/xx-network_logotype_color.svg","width":525,"height":175,"caption":"xx network"},"image":{"@id":"https:\/\/pvrjousb.elementor.cloud\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/pages\/27785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/comments?post=27785"}],"version-history":[{"count":0,"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/pages\/27785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/media\/18773"}],"wp:attachment":[{"href":"https:\/\/xx.network\/es\/wp-json\/wp\/v2\/media?parent=27785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}