{"id":660,"date":"2009-11-19T23:55:34","date_gmt":"2009-11-20T04:25:34","guid":{"rendered":"https:\/\/hablandodeti.com\/blog\/?p=660"},"modified":"2009-11-19T23:55:34","modified_gmt":"2009-11-20T04:25:34","slug":"seguridad-2009-v-bluetooth-y-seguridad","status":"publish","type":"post","link":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/","title":{"rendered":"Seguridad 2009: V Bluetooth y seguridad"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg\" align=right alt=\"bluetooth\" title=\"bluetooth\" width=\"113\" height=\"117\" class=\"alignright size-full wp-image-661\" srcset=\"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg 113w, https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth-30x30.jpg 30w\" sizes=\"auto, (max-width: 113px) 100vw, 113px\" \/>En m\u00e1s de un lugar hemos le\u00eddo sobre los inconveneientes del mal uso del bluetooth, especialmente al aceptar recibir archivos cuyo origen desconocemos. Sin embargo siempre he restado importancia a este aspecto, quiz\u00e1s al pensar un poco altaneramente, que el sentido com\u00fan deber\u00eda bastar para evitar el peligro.<\/p>\n<p>Pero \u00faltimamente, al ver a los muchachos de la edad de mi hija mayor \u2013rondando los 13 a\u00f1os\u2014compartir canciones y archivos, he consentido en considerar m\u00e1s las alertas sobre el uso inadecuado del bluetooth. Ya que esta red de corta distancia es fundamental para los j\u00f3venes que la usan para comunicarse entre si, sin tener que pagar costos de planes de datos, y m\u00e1s de una vez les permite consultar dudas en vivo en plena presentaci\u00f3n de un examen.<\/p>\n<p>Pero un nuevo \u201cmodus operandi\u201d del hampa se est\u00e1 aprovechando de esto. Mientras est\u00e1n en un transporte p\u00fablico, los malhechores activan su propio tel\u00e9fono para rastrear dispositivos bluetooth y cuando consiguen alguno que tiene un nick que les interese \u2013como El iPhone de Mar\u00eda, o Carlos\u2019 Blackberry\u2014inician un env\u00edo de un archivo o foto para notar quien es el usuario en cuesti\u00f3n, y despu\u00e9s proceder a rodearlo y robarle el dispositivo por intimidaci\u00f3n.<\/p>\n<p>Es as\u00ed como una red, inicialmente creada para com partir archivos y conectarse a perif\u00e9ricos a corta distancia, se ha convertido en algunos casos en herramientas que revelan vulnerabilidades de sus usuarios. <\/p>\n<p>Asi que le recomiendo que mantenga apagada la red bluetooth de su celular o si va a tenerla encendida, al manos cambie el nick con el que identifica su tel\u00e9fono por algo gen\u00e9rico. Con esto qu\u00edzas pueda salvar no s\u00f3lo sus datos, sino todo el celular y as\u00ed podr\u00e1 seguir usando su tel\u00e9fono para estar <strong><em>hablandodeti<\/em><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En m\u00e1s de un lugar hemos le\u00eddo sobre los inconveneientes del mal uso del bluetooth, especialmente al aceptar recibir archivos cuyo origen desconocemos. Sin embargo siempre he restado importancia a este aspecto, quiz\u00e1s al pensar un poco altaneramente, que el sentido com\u00fan deber\u00eda bastar para evitar el peligro. Pero \u00faltimamente, al ver a los muchachos [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":661,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[674,101,41],"tags":[2712,514,258,348,2691,2702],"class_list":["post-660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-2009","category-telefonia","category-tendencias","tag-apple","tag-bluetooth","tag-iphone","tag-rim","tag-seguridad","tag-telefonia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguridad 2009: V Bluetooth y seguridad - Hablando de TI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad 2009: V Bluetooth y seguridad - Hablando de TI\" \/>\n<meta property=\"og:description\" content=\"En m\u00e1s de un lugar hemos le\u00eddo sobre los inconveneientes del mal uso del bluetooth, especialmente al aceptar recibir archivos cuyo origen desconocemos. Sin embargo siempre he restado importancia a este aspecto, quiz\u00e1s al pensar un poco altaneramente, que el sentido com\u00fan deber\u00eda bastar para evitar el peligro. Pero \u00faltimamente, al ver a los muchachos [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Hablando de TI\" \/>\n<meta property=\"article:published_time\" content=\"2009-11-20T04:25:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg?fit=113%2C117&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"113\" \/>\n\t<meta property=\"og:image:height\" content=\"117\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alcides Le\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/aleon1969\" \/>\n<meta name=\"twitter:site\" content=\"@aleon1969\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alcides Le\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/\"},\"author\":{\"name\":\"Alcides Le\u00f3n\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb9eb914c41b9aa527560547ed3a81b2\"},\"headline\":\"Seguridad 2009: V Bluetooth y seguridad\",\"datePublished\":\"2009-11-20T04:25:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/\"},\"wordCount\":318,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb9eb914c41b9aa527560547ed3a81b2\"},\"image\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/11\\\/bluetooth.jpg\",\"keywords\":[\"Apple\",\"bluetooth\",\"iPhone\",\"RIM\",\"Seguridad\",\"Telefon\u00eda\"],\"articleSection\":[\"Seguridad 2009\",\"Telefon\u00eda\",\"Tendencias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/\",\"url\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/\",\"name\":\"Seguridad 2009: V Bluetooth y seguridad - Hablando de TI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/11\\\/bluetooth.jpg\",\"datePublished\":\"2009-11-20T04:25:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/11\\\/bluetooth.jpg\",\"contentUrl\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/11\\\/bluetooth.jpg\",\"width\":\"113\",\"height\":\"117\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/2009\\\/11\\\/19\\\/seguridad-2009-v-bluetooth-y-seguridad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad 2009: V Bluetooth y seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/\",\"name\":\"Hablando de TI\",\"description\":\"Apuntes de Vida y Tecnolog\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb9eb914c41b9aa527560547ed3a81b2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb9eb914c41b9aa527560547ed3a81b2\",\"name\":\"Alcides Le\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/bannerhdti-long.png?fit=969%2C124&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/bannerhdti-long.png?fit=969%2C124&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/bannerhdti-long.png?fit=969%2C124&ssl=1\",\"width\":969,\"height\":124,\"caption\":\"Alcides Le\u00f3n\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/hablandodeti.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/bannerhdti-long.png?fit=969%2C124&ssl=1\"},\"description\":\"Ingeniero en Computaci\u00f3n, Comunicador especializado en tecnolog\u00eda, Blogger, Asesor en SocialMedia, Venezolano y Latinaom\u00e9ricano\",\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/aleon1969\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/aleon1969\"],\"url\":\"https:\\\/\\\/hablandodeti.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad 2009: V Bluetooth y seguridad - Hablando de TI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Seguridad 2009: V Bluetooth y seguridad - Hablando de TI","og_description":"En m\u00e1s de un lugar hemos le\u00eddo sobre los inconveneientes del mal uso del bluetooth, especialmente al aceptar recibir archivos cuyo origen desconocemos. Sin embargo siempre he restado importancia a este aspecto, quiz\u00e1s al pensar un poco altaneramente, que el sentido com\u00fan deber\u00eda bastar para evitar el peligro. Pero \u00faltimamente, al ver a los muchachos [&hellip;]","og_url":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/","og_site_name":"Hablando de TI","article_published_time":"2009-11-20T04:25:34+00:00","og_image":[{"width":113,"height":117,"url":"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg?fit=113%2C117&ssl=1","type":"image\/jpeg"}],"author":"Alcides Le\u00f3n","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/aleon1969","twitter_site":"@aleon1969","twitter_misc":{"Escrito por":"Alcides Le\u00f3n","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#article","isPartOf":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/"},"author":{"name":"Alcides Le\u00f3n","@id":"https:\/\/hablandodeti.com\/blog\/#\/schema\/person\/cb9eb914c41b9aa527560547ed3a81b2"},"headline":"Seguridad 2009: V Bluetooth y seguridad","datePublished":"2009-11-20T04:25:34+00:00","mainEntityOfPage":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/"},"wordCount":318,"commentCount":0,"publisher":{"@id":"https:\/\/hablandodeti.com\/blog\/#\/schema\/person\/cb9eb914c41b9aa527560547ed3a81b2"},"image":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg","keywords":["Apple","bluetooth","iPhone","RIM","Seguridad","Telefon\u00eda"],"articleSection":["Seguridad 2009","Telefon\u00eda","Tendencias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/","url":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/","name":"Seguridad 2009: V Bluetooth y seguridad - Hablando de TI","isPartOf":{"@id":"https:\/\/hablandodeti.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg","datePublished":"2009-11-20T04:25:34+00:00","breadcrumb":{"@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#primaryimage","url":"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg","contentUrl":"https:\/\/hablandodeti.com\/blog\/wp-content\/uploads\/2009\/11\/bluetooth.jpg","width":"113","height":"117"},{"@type":"BreadcrumbList","@id":"https:\/\/hablandodeti.com\/blog\/2009\/11\/19\/seguridad-2009-v-bluetooth-y-seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/hablandodeti.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Seguridad 2009: V Bluetooth y seguridad"}]},{"@type":"WebSite","@id":"https:\/\/hablandodeti.com\/blog\/#website","url":"https:\/\/hablandodeti.com\/blog\/","name":"Hablando de TI","description":"Apuntes de Vida y Tecnolog\u00eda","publisher":{"@id":"https:\/\/hablandodeti.com\/blog\/#\/schema\/person\/cb9eb914c41b9aa527560547ed3a81b2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hablandodeti.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/hablandodeti.com\/blog\/#\/schema\/person\/cb9eb914c41b9aa527560547ed3a81b2","name":"Alcides Le\u00f3n","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2023\/01\/bannerhdti-long.png?fit=969%2C124&ssl=1","url":"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2023\/01\/bannerhdti-long.png?fit=969%2C124&ssl=1","contentUrl":"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2023\/01\/bannerhdti-long.png?fit=969%2C124&ssl=1","width":969,"height":124,"caption":"Alcides Le\u00f3n"},"logo":{"@id":"https:\/\/i0.wp.com\/hablandodeti.com\/blog\/wp-content\/uploads\/2023\/01\/bannerhdti-long.png?fit=969%2C124&ssl=1"},"description":"Ingeniero en Computaci\u00f3n, Comunicador especializado en tecnolog\u00eda, Blogger, Asesor en SocialMedia, Venezolano y Latinaom\u00e9ricano","sameAs":["https:\/\/www.instagram.com\/aleon1969","https:\/\/x.com\/https:\/\/www.twitter.com\/aleon1969"],"url":"https:\/\/hablandodeti.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":0,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/media\/661"}],"wp:attachment":[{"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hablandodeti.com\/blog\/wp-json\/wp\/v2\/tags?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}