{"id":15826,"date":"2021-07-22T10:42:08","date_gmt":"2021-07-22T08:42:08","guid":{"rendered":"https:\/\/www.transparentedge.eu\/blog\/los-ataques-distribuidos-ddos\/"},"modified":"2022-11-25T10:07:39","modified_gmt":"2022-11-25T10:07:39","slug":"los-ataques-distribuidos-ddos","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/","title":{"rendered":"Los ataques distribuidos DDoS"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Seguramente habr\u00e1s o\u00eddo hablar alguna vez de ataques en internet que son capaces de paralizar hasta las m\u00e1s grandes empresas y proveedores de servicios. Todos sin excepci\u00f3n, y en todos los sectores, son vulnerables al <\/span><b>DDoS, <\/b><b><i>Distributed Denial Of Service<\/i><\/b><b> por sus siglas en ingl\u00e9s<\/b><span style=\"font-weight: 400;\"> o, lo que es lo mismo, a<\/span><span style=\"font-weight: 400;\">taque distribuido de denegaci\u00f3n de servicio<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Es un<\/span><b> grave problema. Y **no** hay soluci\u00f3n<\/b><span style=\"font-weight: 400;\">. B\u00e1sicamente porque los protocolos que se usan en internet no se dise\u00f1aron para impedir este tipo de ataques. Ve\u00e1moslo m\u00e1s en detalle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hay muchas variedades y t\u00e9cnicas para generar un DDoS. La metodolog\u00eda suele ser similar: <\/span><b>generar tr\u00e1fico desde muchos sitios a la vez hacia el objetivo de forma \u201calegal\u201d o incluso \u201clegal\u201d.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">En los \u00faltimos a\u00f1os ha ido creciendo el impacto y el volumen de estos ataques y con esos vol\u00famenes tan enormes, es realmente un<\/span><b> reto tecnol\u00f3gico contener estos ataques<\/b><span style=\"font-weight: 400;\"> en t\u00e9rminos t\u00e9cnicos y, por supuesto, econ\u00f3micos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Las compa\u00f1\u00edas no suelen tener capacidad de gestionar ese volumen de tr\u00e1fico y suelen <\/span><b>acudir a las CDN, como por ejemplo la espa\u00f1ola Transparent Edge Services<\/b><span style=\"font-weight: 400;\">, para <\/span><b>corregir o limitar el impacto de estos ataques<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pero<\/span><b>, \u00bfpor qu\u00e9 es dif\u00edcil?<\/b><span style=\"font-weight: 400;\"> Ve\u00e1moslo con una analog\u00eda.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagina que tienes un bar con dos o tres camareros. Imagina que alguien reparte invitaciones falsas, pero con tu logo, en las que invita a todo el mundo a las 20h. La invitaci\u00f3n es una barra libre. Y esa invitaci\u00f3n se reparte por todos lados. Tu recibir\u00e1s un aluvi\u00f3n de gente en tu bar a la que no podr\u00e1s atender. Y tampoco podr\u00e1s atender a los clientes habituales por la enorme cola en la entrada.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hasta aqu\u00ed es todo legal. Muchos no quieren pagar sus copas (\u201ces gratis\u201d, dec\u00eda la publicidad) y los que quieren no pueden hacerlo. Adem\u00e1s, los que se van, hablan mal (\u201cme han enga\u00f1ado\u201d) y se lo dicen a los de fuera. Es posible que pierdas clientes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No hay forma de prevenir el problema. No es posible tener un s\u00e9quito de relaciones p\u00fablicas vigilando todas las publicidades ni tener un mont\u00f3n de guardias de seguridad ni cien camareros \u201cpor si acaso\u201d. Lo \u00fanico que se puede hacer es salir a la puerta y, poco a poco, ir explicando a la gente que ha sido enga\u00f1ada. Durante todo ese tiempo, el DDoS ha tenido \u00e9xito: no se ha vendido ni un refresco.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00bfCu\u00e1nto ha costado hacer da\u00f1o? Unas fotocopias.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00bf<\/span><b>Cu\u00e1l puede ser el motivo<\/b><span style=\"font-weight: 400;\"> principal para que alguien quisiera hacer esto a mi negocio o a mi p\u00e1gina web? Posiblemente sea alguna de estas: <\/span><b>extorsi\u00f3n<\/b><span style=\"font-weight: 400;\">, ataque de la <\/span><b>competencia<\/b><span style=\"font-weight: 400;\">, <\/span><b>resentimiento<\/b><span style=\"font-weight: 400;\">, <\/span><b>protesta o <\/b><b><i>hacking<\/i><\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La<\/span><b> extorsi\u00f3n<\/b><span style=\"font-weight: 400;\"> es una amenaza en toda regla. Si no se paga, habr\u00e1 ataques. Pueden ser miles o cientos de miles de euros lo que demanden los delincuentes. En verdad, realizar un ataque de esta \u00edndole es bastante barato y sencillo. Pasa generalmente por la DeepWeb y es un negocio para algunos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Otros casos tienen su origen en el <\/span><b>resentimiento de empleados descontentos<\/b><span style=\"font-weight: 400;\"> o en protestas de <\/span><b>c\u00edberhacktivismo<\/b><span style=\"font-weight: 400;\">. Cualquier motivo espurio puede estar detr\u00e1s de que nuestra web, de repente y sin venir a cuento, reciba un gigantesco bofet\u00f3n de tr\u00e1fico que, cual tsunami, nos ahogue <\/span><b>sin ser capaces de hacer nada de forma inmediata<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hay servicios espec\u00edficos para mitigar el tr\u00e1fico. Los operadores tienen t\u00e9cnicas, sistemas y contactos para poder parar o reducir el impacto de los ataques. Pero nadie est\u00e1 a salvo 100% de este tipo de problema ya que, como hemos dicho, es relativamente sencillo generar un ataque de esta \u00edndole. Sin embargo, las autoridades est\u00e1n cada vez m\u00e1s habituadas a investigar estos incidentes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tambi\u00e9n es un tema econ\u00f3mico. Se pueden poner varios sistemas en paralelo, pero el coste ser\u00eda inasumible para la mayor\u00eda de las compa\u00f1\u00edas.<\/span><\/p>\n<p><b>Nuestro consejo<\/b><span style=\"font-weight: 400;\"> es t<\/span><b>ener las medidas necesarias para hacer frente a estos ataques, confiando en el trabajo y el buen hacer de los proveedores de confianza,<\/b><span style=\"font-weight: 400;\"> que se dejar\u00e1n la piel por corregir cuanto antes cualquier incidente que sobrevenga, ya sea por un ataque distribuido o por cualquier otro.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seguramente habr\u00e1s o\u00eddo hablar alguna vez de ataques en internet que son capaces de paralizar hasta las m\u00e1s grandes empresas [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":16051,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[159],"tags":[138,139,140,144,149,155,160,161,162,163],"class_list":["post-15826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alto-rendimiento-en","tag-alto-rendimiento-en","tag-cdn-en","tag-distribucion-de-contenidos-en","tag-web-en","tag-performance-en","tag-trafico-paginas-en","tag-ataque-en","tag-ddos-en","tag-transparentcdn-en","tag-seguridad-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Los ataques distribuidos DDoS - Transparent Edge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los ataques distribuidos DDoS - Transparent Edge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-22T08:42:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-25T10:07:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png\" \/>\n\t<meta property=\"og:image:width\" content=\"494\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jara Exp\u00f3sito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/\"},\"author\":{\"name\":\"Jara Exp\u00f3sito\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/e2bd1cb076dea3d14dfdad4191c83f1a\"},\"headline\":\"Los ataques distribuidos DDoS\",\"datePublished\":\"2021-07-22T08:42:08+00:00\",\"dateModified\":\"2022-11-25T10:07:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/\"},\"wordCount\":739,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DDoS_teaser.png\",\"keywords\":[\"alto rendimiento\",\"CDN\",\"distribuci\u00f3n de contenidos\",\"web\",\"Performance\",\"tr\u00e1fico p\u00e1ginas\",\"ataque\",\"DDoS\",\"TransparentCDN\",\"Seguridad\"],\"articleSection\":[\"alto rendimiento\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/\",\"name\":\"Los ataques distribuidos DDoS - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DDoS_teaser.png\",\"datePublished\":\"2021-07-22T08:42:08+00:00\",\"dateModified\":\"2022-11-25T10:07:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DDoS_teaser.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/DDoS_teaser.png\",\"width\":494,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/blog\\\/los-ataques-distribuidos-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los ataques distribuidos DDoS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/e2bd1cb076dea3d14dfdad4191c83f1a\",\"name\":\"Jara Exp\u00f3sito\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los ataques distribuidos DDoS - Transparent Edge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/","og_locale":"en_US","og_type":"article","og_title":"Los ataques distribuidos DDoS - Transparent Edge","og_url":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/","og_site_name":"Transparent Edge","article_published_time":"2021-07-22T08:42:08+00:00","article_modified_time":"2022-11-25T10:07:39+00:00","og_image":[{"width":494,"height":320,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png","type":"image\/png"}],"author":"Jara Exp\u00f3sito","twitter_card":"summary_large_image","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/"},"author":{"name":"Jara Exp\u00f3sito","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/e2bd1cb076dea3d14dfdad4191c83f1a"},"headline":"Los ataques distribuidos DDoS","datePublished":"2021-07-22T08:42:08+00:00","dateModified":"2022-11-25T10:07:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/"},"wordCount":739,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png","keywords":["alto rendimiento","CDN","distribuci\u00f3n de contenidos","web","Performance","tr\u00e1fico p\u00e1ginas","ataque","DDoS","TransparentCDN","Seguridad"],"articleSection":["alto rendimiento"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/","url":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/","name":"Los ataques distribuidos DDoS - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png","datePublished":"2021-07-22T08:42:08+00:00","dateModified":"2022-11-25T10:07:39+00:00","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/11\/DDoS_teaser.png","width":494,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/en\/blog\/los-ataques-distribuidos-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Los ataques distribuidos DDoS"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/e2bd1cb076dea3d14dfdad4191c83f1a","name":"Jara Exp\u00f3sito"}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=15826"}],"version-history":[{"count":1,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15826\/revisions"}],"predecessor-version":[{"id":16066,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15826\/revisions\/16066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/16051"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=15826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=15826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=15826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}