{"id":63800,"date":"2017-09-18T12:46:33","date_gmt":"2017-09-18T10:46:33","guid":{"rendered":"https:\/\/internetrepublica.com\/?p=63800"},"modified":"2017-09-26T15:05:12","modified_gmt":"2017-09-26T13:05:12","slug":"blueborne-conoces-la-nueva-amenaza-inalambrica","status":"publish","type":"post","link":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/","title":{"rendered":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong>BlueBorne<\/strong> es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware necesita que hagas click en un enlace o descargar alg\u00fan tipo de archivo para infectar el dispositivo. Suena amenazador, \u00bfno?<\/p>\n<p>&nbsp;<\/p>\n<p>Pues m\u00e1s de 5.000 millones de dispositivos Bluetooth se han visto afectados por este malware, que recientemente ha sido descubierto por una compa\u00f1\u00eda de seguridad. Para ello, el atacante necesita poco m\u00e1s de un minuto para conectarse a un m\u00f3vil cercano. Pueden incluso abrir aplicaciones, coger tus fotos o instalar incluso un virus en tu dispositivo.<\/p>\n<p>&nbsp;<\/p>\n<p>Con que tan solo est\u00e9 tu conexi\u00f3n Bluetooth activada, esta amenaza podr\u00e1 acceder a tu dispositivo, y de esta forma lograr\u00e1 tomar el control del mismo. Al ser inal\u00e1mbrico, es considerado especialmente infeccioso, y es muy dif\u00edcil que los usuarios lo detecten una vez est\u00e1 instalado en sus gadgets.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Un dato muy importante que debes tener en cuenta es que, los cortafuegos y los antivirus no est\u00e1n preparados para detectar este tipo de amenazas por aire.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Esta vulnerabilidad afecta a dispositivos que utilizan diferentes sistemas operativos, incluidos los de Google, Apple o Microsoft. En el caso de Apple, la compa\u00f1\u00eda ha confirmado que el malware no afecta a dispositivos con iOS 10 o versiones superiores.<\/p>\n<p>&nbsp;<\/p>\n<p>Adem\u00e1s, en aparatos como altavoces, auriculares, televisiones o cualquier otro gadget con esta conectividad, tambi\u00e9n puede interferir.<\/p>\n<p>&nbsp;<\/p>\n<p>En este v\u00eddeo pod\u00e9is ver la peligrosidad de una posible moda de virus inform\u00e1ticos transmitidos por \u201caire\u201d.<\/p>\n<p>&nbsp;<\/p>\n<div style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/LLNtZKpL0P8\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00bfC\u00f3mo sabes si tu smartphone ha sido afectado?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Para ello dispones de una app gratuita llamada \u201c<strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.armis.blueborne_detector&amp;hl=en&amp;rdid=com.armis.blueborne_detector\" target=\"_blank\" rel=\"noopener\">BlueBorne Vulnerability Scanner<\/a><\/strong>\u201d. As\u00ed podr\u00e1s comprobar si tu dispositivo ha sido amenazado por este malware. Deber\u00e1s pulsar el bot\u00f3n para analizar y en segundos te avisar\u00e1 si es vulnerable o no. Tambi\u00e9n dispone de la funci\u00f3n de analizar dispositivos Bluetooth que est\u00e1n a tu alrededor.<\/p>\n<p>&nbsp;<\/p>\n<p>Por lo tanto, lo m\u00e1s seguro, por ahora, es tener desactivado la conectividad Bluetooth para evitar este tipo de amenazas.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware&#8230;<\/p>\n","protected":false},"author":3,"featured_media":63801,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[120],"tags":[1026,1027,447],"class_list":["post-63800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-media","tag-blueborne","tag-malware","tag-movil"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica<\/title>\n<meta name=\"description\" content=\"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica\" \/>\n<meta property=\"og:description\" content=\"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet Rep\u00fablica\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-18T10:46:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-26T13:05:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Internet Rep\u00fablica\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Internet Rep\u00fablica\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\"},\"author\":{\"name\":\"Internet Rep\u00fablica\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9\"},\"headline\":\"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica?\",\"datePublished\":\"2017-09-18T10:46:33+00:00\",\"dateModified\":\"2017-09-26T13:05:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\"},\"wordCount\":373,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png\",\"keywords\":[\"BlueBorne\",\"malware\",\"m\u00f3vil\"],\"articleSection\":[\"Social Media\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\",\"url\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\",\"name\":\"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png\",\"datePublished\":\"2017-09-18T10:46:33+00:00\",\"dateModified\":\"2017-09-26T13:05:12+00:00\",\"author\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9\"},\"description\":\"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware\",\"breadcrumb\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage\",\"url\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png\",\"contentUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png\",\"width\":\"750\",\"height\":\"422\",\"caption\":\"BlueBorne\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Agencia Marketing Digital\",\"item\":\"https:\/\/internetrepublica.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Media\",\"item\":\"https:\/\/internetrepublica.com\/blog\/social-media\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica?\",\"item\":\"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\",\"url\":\"https:\/\/internetrepublica.com\/blog\/\",\"name\":\"Internet Rep\u00fablica\",\"description\":\"Agencia SEO y Marketing Digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9\",\"name\":\"Internet Rep\u00fablica\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g\",\"caption\":\"Internet Rep\u00fablica\"},\"description\":\"Somos una agencia de marketing digital especializada en SEO (posicionamiento en buscadores), gesti\u00f3n de reputaci\u00f3n online (ORM), marketing de contenidos y Social Media. Ayudamos a darle visibilidad a tu marca en internet para que consigas, no solo atraer a tus potenciales clientes, sino tambi\u00e9n fidelizarlos.\",\"url\":\"https:\/\/internetrepublica.com\/blog\/author\/redaccion\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica","description":"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/","og_locale":"es_ES","og_type":"article","og_title":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica","og_description":"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware","og_url":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/","og_site_name":"Internet Rep\u00fablica","article_published_time":"2017-09-18T10:46:33+00:00","article_modified_time":"2017-09-26T13:05:12+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png","type":"image\/png"}],"author":"Internet Rep\u00fablica","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Internet Rep\u00fablica","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#article","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/"},"author":{"name":"Internet Rep\u00fablica","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9"},"headline":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica?","datePublished":"2017-09-18T10:46:33+00:00","dateModified":"2017-09-26T13:05:12+00:00","mainEntityOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/"},"wordCount":373,"commentCount":0,"image":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage"},"thumbnailUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png","keywords":["BlueBorne","malware","m\u00f3vil"],"articleSection":["Social Media"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/","url":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/","name":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica? - Internet Rep\u00fablica","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage"},"image":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage"},"thumbnailUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png","datePublished":"2017-09-18T10:46:33+00:00","dateModified":"2017-09-26T13:05:12+00:00","author":{"@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9"},"description":"&nbsp; BlueBorne es un malware que principalmente se ha desarrollado para el espionaje, el robo y secuestro de documentos. La mayor\u00eda de veces, el malware","breadcrumb":{"@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#primaryimage","url":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png","contentUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/BlueBorne.png","width":"750","height":"422","caption":"BlueBorne"},{"@type":"BreadcrumbList","@id":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Agencia Marketing Digital","item":"https:\/\/internetrepublica.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Social Media","item":"https:\/\/internetrepublica.com\/blog\/social-media\/"},{"@type":"ListItem","position":3,"name":"BlueBorne, \u00bfconoces la nueva amenaza inal\u00e1mbrica?","item":"https:\/\/internetrepublica.com\/blog\/blueborne-conoces-la-nueva-amenaza-inalambrica\/"}]},{"@type":"WebSite","@id":"https:\/\/internetrepublica.com\/blog\/#website","url":"https:\/\/internetrepublica.com\/blog\/","name":"Internet Rep\u00fablica","description":"Agencia SEO y Marketing Digital","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/bd9791fd10528a2a566fe7cdb0146de9","name":"Internet Rep\u00fablica","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6faa042cdb824b8ea62dca05f5a2cc69ec645b229c22a0f4f2d67fad9ec31439?s=96&d=mm&r=g","caption":"Internet Rep\u00fablica"},"description":"Somos una agencia de marketing digital especializada en SEO (posicionamiento en buscadores), gesti\u00f3n de reputaci\u00f3n online (ORM), marketing de contenidos y Social Media. Ayudamos a darle visibilidad a tu marca en internet para que consigas, no solo atraer a tus potenciales clientes, sino tambi\u00e9n fidelizarlos.","url":"https:\/\/internetrepublica.com\/blog\/author\/redaccion\/"}]}},"_links":{"self":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/comments?post=63800"}],"version-history":[{"count":8,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63800\/revisions"}],"predecessor-version":[{"id":63871,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63800\/revisions\/63871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/media\/63801"}],"wp:attachment":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/media?parent=63800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/categories?post=63800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/tags?post=63800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}