{"id":3334,"date":"2024-08-21T22:09:28","date_gmt":"2024-08-21T22:09:28","guid":{"rendered":"https:\/\/urudataciberseguridad.com\/?p=3334"},"modified":"2024-08-21T22:19:16","modified_gmt":"2024-08-21T22:19:16","slug":"la-privacidad-no-existe","status":"publish","type":"post","link":"https:\/\/urudataciberseguridad.com\/en\/la-privacidad-no-existe\/","title":{"rendered":"Privacy Does Not Exist"},"content":{"rendered":"<p class=\"\"><\/p>\n\n\n\n<p class=\"translation-block\"><strong>Finland, October 2020, in the midst of the pandemic. Ellen is not coping well with confinement <\/strong>due to a key factor: she can no longer visit her psychiatrist, who has supported her through the difficult process of healing old wounds. These began in her youth after intrafamilial abuse that Ellen locked away in her memory, but which resurface daily in different ways.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Carl, her psychiatrist, has been the key to her being able, finally after many years, to confront and process those memories. <\/strong>Neither her parents, husband, nor children know about these painful scars. It is her secret.<\/p>\n\n\n\n<p class=\"translation-block\">Her pleasant weekly session with Carl, in his charming office in the T\u00f6\u00f6l\u00f6 district, is no longer in person and has become virtual, which makes her uncomfortable. <strong>Having Carl, a well-known psychiatrist from Helsinki, is a luxury she can afford thanks to <em>Vastaamo<\/em>, the most renowned (and expensive) private mental health service in Finland.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">That October afternoon, during the unbearable confinement, she receives a WhatsApp message that stops her world:\n\u201cGood afternoon Mrs. Ellen Helmi, pleased to contact you. I inform you that I have in my possession all the transcripts of the sessions you have had with Dr. Carl MIRKO. <strong>Unfortunately, <em>Vaastamo\u00a0<\/em> (from where I obtained this information) has refused to pay for the recovery of the data, and therefore I am contacting you to make you the following offer: for 30,000 crowns we will delete your information from our servers; otherwise, we will be forced to make it public.<\/strong> You have 24 hours from this moment. Given the content of these sessions, please accept my sympathy for what you have suffered.\u201d<\/p>\n\n\n\n<p class=\"translation-block\">She immediately receives a second message, which she later understands to be the <strong>instructions to purchase and deposit Monero cryptocurrency into the attacker\u2019s digital wallet.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\"><strong><em>Vastaamo<\/em>, <\/strong> known in Finland as the \u201cMcDonald\u2019s of psychotherapy,\u201d is the most recognized mental health institution in the country. Around 50,000 people use this premium service.<\/p>\n\n\n\n<p class=\"translation-block\">The clinic has been the victim of a massive cyberattack. The information from all patient sessions has been leaked. A ransom demand for a huge sum was made to the clinic, but it refused to pay. Following this refusal, attackers redirected their demand to the patients, requesting an average of 200 euros each to prevent the information from being made public.<\/p>\n\n\n\n<p class=\"translation-block\">The attacker remained anonymous.<strong> Authorities suspected a pro-Russian cybercriminal group, given the historical tension between the two countries<\/strong>, although some characteristics of the attack seemed familiar to investigators.<\/p>\n\n\n\n<p class=\"translation-block\">Despite efforts, no responsible party could be located until three years later.<\/p>\n\n\n\n<p class=\"translation-block\">February 2023, Courbevoie, France. Police responded to a domestic violence complaint. At the residence, they find an intoxicated man asleep on the sofa. When asked for identification, he presents a Romanian ID card, but something does not match.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>His physical appearance does not resemble someone of that nationality he is a tall blond man, and his accent does not fit.<\/strong> When his details are entered into Interpol, an alert is triggered: the man is Julius Kivim\u00e4ki, 26 years old. Julius, known by the alias \u201cZeekill,\u201d had been an active cybercriminal since the age of 13 and had been arrested numerous times.<strong> In the years following the <em>Vastaamo<\/em> attack, investigators had found evidence linking him directly to the case. Certain cryptocurrency wallet movements from ransom payments also strongly implicated him.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">Kivim\u00e4ki was finally sentenced in 2024 to six years and three months in prison. In a historic precedent, Vastaamo\u2019s director, Ville Tapio, was also convicted for failing to adequately protect patients\u2019 confidential data. Their data lacked even the minimum necessary security measures. At least 30,000 patients were extorted, and one confirmed suicide resulted from the attack.\n<br>\nVastaamo, the prestigious mental health service and a model in Europe, ceased operations as a consequence of the incident and is considered the largest criminal case in Finnish history.<\/p>\n\n\n\n<p class=\"\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Finlandia, octubre de 2020, plena \u00e9poca de pandemia.&nbsp;Ellen no est\u00e1 llevando bien el confinamiento&nbsp;debido a un factor fundamental: no puede visitar a su psiquiatra, qui\u00e9n la ha acompa\u00f1ado en un duro proceso de cicatrizar viejas heridas. \u00c9stas comenzaron a dejar su marca en su juventud tras una serie de abusos intrafamiliares que Ellen guard\u00f3 bajo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La privacidad no existe - Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudataciberseguridad.com\/en\/la-privacidad-no-existe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La privacidad no existe - Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Finlandia, octubre de 2020, plena \u00e9poca de pandemia.&nbsp;Ellen no est\u00e1 llevando bien el confinamiento&nbsp;debido a un factor fundamental: no puede visitar a su psiquiatra, qui\u00e9n la ha acompa\u00f1ado en un duro proceso de cicatrizar viejas heridas. \u00c9stas comenzaron a dejar su marca en su juventud tras una serie de abusos intrafamiliares que Ellen guard\u00f3 bajo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudataciberseguridad.com\/en\/la-privacidad-no-existe\/\" \/>\n<meta property=\"og:site_name\" content=\"Ciberseguridad\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-21T22:09:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T22:19:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"lprado\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lprado\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/\"},\"author\":{\"name\":\"lprado\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\"},\"headline\":\"La privacidad no existe\",\"datePublished\":\"2024-08-21T22:09:28+00:00\",\"dateModified\":\"2024-08-21T22:19:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/\"},\"wordCount\":875,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/\",\"name\":\"La privacidad no existe - Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1\",\"datePublished\":\"2024-08-21T22:09:28+00:00\",\"dateModified\":\"2024-08-21T22:19:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1\",\"width\":1000,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/la-privacidad-no-existe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La privacidad no existe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"name\":\"Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudataciberseguridad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\",\"name\":\"Ciberseguridad\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"contentUrl\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"width\":185,\"height\":27,\"caption\":\"Ciberseguridad\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\",\"name\":\"lprado\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"caption\":\"lprado\"},\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/en\\\/author\\\/lprado\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La privacidad no existe - Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudataciberseguridad.com\/en\/la-privacidad-no-existe\/","og_locale":"en_US","og_type":"article","og_title":"La privacidad no existe - Ciberseguridad","og_description":"Finlandia, octubre de 2020, plena \u00e9poca de pandemia.&nbsp;Ellen no est\u00e1 llevando bien el confinamiento&nbsp;debido a un factor fundamental: no puede visitar a su psiquiatra, qui\u00e9n la ha acompa\u00f1ado en un duro proceso de cicatrizar viejas heridas. \u00c9stas comenzaron a dejar su marca en su juventud tras una serie de abusos intrafamiliares que Ellen guard\u00f3 bajo [&hellip;]","og_url":"https:\/\/urudataciberseguridad.com\/en\/la-privacidad-no-existe\/","og_site_name":"Ciberseguridad","article_published_time":"2024-08-21T22:09:28+00:00","article_modified_time":"2024-08-21T22:19:16+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp","type":"image\/webp"}],"author":"lprado","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lprado","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#article","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/"},"author":{"name":"lprado","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59"},"headline":"La privacidad no existe","datePublished":"2024-08-21T22:09:28+00:00","dateModified":"2024-08-21T22:19:16+00:00","mainEntityOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/"},"wordCount":875,"commentCount":0,"publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/","url":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/","name":"La privacidad no existe - Ciberseguridad","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#primaryimage"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1","datePublished":"2024-08-21T22:09:28+00:00","dateModified":"2024-08-21T22:19:16+00:00","breadcrumb":{"@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#primaryimage","url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1","width":1000,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/urudataciberseguridad.com\/la-privacidad-no-existe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urudataciberseguridad.com\/"},{"@type":"ListItem","position":2,"name":"La privacidad no existe"}]},{"@type":"WebSite","@id":"https:\/\/urudataciberseguridad.com\/#website","url":"https:\/\/urudataciberseguridad.com\/","name":"Ciberseguridad","description":"","publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudataciberseguridad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudataciberseguridad.com\/#organization","name":"Ciberseguridad","url":"https:\/\/urudataciberseguridad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/","url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","contentUrl":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","width":185,"height":27,"caption":"Ciberseguridad"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59","name":"lprado","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","caption":"lprado"},"url":"https:\/\/urudataciberseguridad.com\/en\/author\/lprado\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/08\/whatsapp-image-2024-08-06-at-42630-pmjpeg.webp?fit=1000%2C1000&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/3334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/comments?post=3334"}],"version-history":[{"count":2,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/3334\/revisions"}],"predecessor-version":[{"id":3338,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/3334\/revisions\/3338"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media\/3335"}],"wp:attachment":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media?parent=3334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/categories?post=3334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/tags?post=3334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}