{"id":2008,"date":"2025-12-03T10:51:35","date_gmt":"2025-12-03T13:51:35","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2008"},"modified":"2025-12-03T11:11:36","modified_gmt":"2025-12-03T14:11:36","slug":"using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/","title":{"rendered":"Usar carregadores e cabos USB emprestados: ser\u00e1 que essa \u00e9 uma atitude segura?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Electronic devices such as smartphones, tablets, and <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/trabalho-remoto-com-computador-pessoal\/\">computers are increasingly part of our daily lives<\/a>, and it\u2019s almost impossible to go anywhere without taking at least one of them with us. <\/span><span style=\"font-weight: 400;\">Entretanto, precisamos ter cuidado ao que conectamos aos nossos dispositivos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Da mesma forma que voc\u00ea n\u00e3o compartilha uma escova de dentes por ser algo \u00edntimo e pessoal, voc\u00ea tamb\u00e9m deveria ter mais cuidado ao emprestar ou pedir um cabo emprestado para um colega. Afinal, uma simples atitude como essa pode acabar facilitando o acesso dos criminosos aos seus dados pessoais, al\u00e9m de poder contaminar os seus dispositivos com malware.<\/span><\/p>\n<h2><b>Como os criminosos conseguem invadir os dispositivos atrav\u00e9s de cabos?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">J\u00e1 existe at\u00e9 mesmo um tipo de cabo, chamado OMG Cable, que ficou conhecido como \"o cabo USB mais perigoso do mundo\". Ele foi lan\u00e7ado em 2019 por um pesquisador de seguran\u00e7a e a sua inten\u00e7\u00e3o inicial era testar as defesas digitais das empresas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isso s\u00f3 foi poss\u00edvel com o surgimento dos cabos Tipo C, que possuem uma capacidade maior de transfer\u00eancia de energia e de dados.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Esse tipo de cabo possui a apar\u00eancia de um cabo comum, por\u00e9m, nada mais \u00e9 do que um minicomputador disfar\u00e7ado, capaz de capturar as teclas pressionadas no smartphone, extrair dados, roubar credenciais e instalar malware. E, para causar todo esse dano, basta com que ele se conecte a um dispositivo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mesmo que o OMG Cable tenha sido criado com um objetivo diferente, hoje em dia, os criminosos conseguem facilmente adulterar cabos de carregador do Tipo C e portas USB. Ent\u00e3o, voc\u00ea pode acabar comprando ou pedindo emprestado um cabo adulterado caso n\u00e3o tome os devidos cuidados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Assim, esse cen\u00e1rio se torna ainda mais perigoso, j\u00e1 que conectar um aparelho a um cabo desconhecido pode colocar a seguran\u00e7a dos seus dispositivos e dos seus dados em risco.<\/span><\/p>\n<h2><b>E n\u00e3o para por a\u00ed\u2026<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Os criminosos podem facilmente modificar diretamente as conex\u00f5es USB das centrais de carregamento p\u00fablicas de locais como aeroportos, caf\u00e9s e rodovi\u00e1rias. E, como consequ\u00eancia disso, acessam as informa\u00e7\u00f5es do seu dispositivo enquanto ele est\u00e1 carregando, j\u00e1 que a porta USB permite transfer\u00eancias e, portanto, acaba funcionando como uma via aberta de transmiss\u00e3o de dados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Caso acabe utilizando um cabo ou porta USB adulterado, voc\u00ea pode ter suas senhas, fotos, contatos, mensagens, documentos e outros dados pessoais roubados. Al\u00e9m disso, voc\u00ea pode estar sofrendo outros riscos, como por exemplo:<\/span><\/p>\n<h3><b>Mau funcionamento do aparelho<\/b><\/h3>\n<p><b><\/b><span style=\"font-weight: 400;\"> Seu dispositivo pode ser alvo de um malware, que rouba suas informa\u00e7\u00f5es, bloqueia o seu aparelho ou at\u00e9 mesmo causa danos f\u00edsicos ao sistema.<\/span><\/p>\n<h3><b>Consumo alto de bateria e rede de internet<\/b><\/h3>\n<p><b><\/b><span style=\"font-weight: 400;\"> Seu aparelho pode ser infectado por um v\u00edrus que consome bateria, internet e outros recursos, prejudicando, assim, o uso e a qualidade do dispositivo.<\/span><\/p>\n<h3><b>Acesso remoto por parte dos criminosos<\/b><\/h3>\n<p><b><\/b><span style=\"font-weight: 400;\"> Atrav\u00e9s de malwares, criminosos podem controlar remotamente seu dispositivo. Nesses casos, os golpistas podem fazer liga\u00e7\u00f5es, enviar mensagens ou acessar sua c\u00e2mera sem o seu consentimento.<\/span><\/p>\n<h2><b>Boas pr\u00e1ticas para carregar o seu dispositivo de maneira segura<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Agora que voc\u00ea j\u00e1 conhece os riscos de compartilhar carregadores ou utilizar t\u00f3tens ou carregadores USB p\u00fablicos, aprenda o que fazer para se proteger:<\/span><\/p>\n<h3><b>Evite pedir cabos emprestados<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Sempre que poss\u00edvel, evite pedir emprestado cabos de outras pessoas para carregar seus dispositivos. Voc\u00ea nunca sabe quando um cabo pode ter sido adulterado, ent\u00e3o, para evitar correr esse risco, prefira adotar outros m\u00e9todos de carregamento.<\/span><\/p>\n<h3><b>Evite usar portas USB p\u00fablicas<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Sempre que poss\u00edvel, evite usar portas USB de locais p\u00fablicos, como aeroportos, rodovi\u00e1rias, caf\u00e9s e shoppings. Caso seja extremamente necess\u00e1rio us\u00e1-las, mantenha seu dispositivo desligado enquanto carrega.<\/span><\/p>\n<h3><b>Invista em carregadores port\u00e1teis<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Os carregadores port\u00e1teis, tamb\u00e9m conhecidos como power banks, s\u00e3o um investimento valioso do ponto de vista da seguran\u00e7a e da praticidade. Existem op\u00e7\u00f5es de diversos valores e com diferentes capacidades de carga.<\/span><\/p>\n<h3><b>Use carregadores originais ou de confian\u00e7a<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Prefira sempre usar carregadores originais fornecidos pelo fabricante do seu dispositivo ou carregadores de marcas confi\u00e1veis \u200b\u200be reconhecidas. Embora possam ser mais caros, esses carregadores passam por rigorosos testes de seguran\u00e7a e s\u00e3o menos propensos a representar um risco para sua seguran\u00e7a digital.<\/span><\/p>\n<p><b>Por fim, nunca esque\u00e7a: quando se trata de seguran\u00e7a digital, \u00e9 melhor prevenir do que remediar!<\/b><\/p>","protected":false},"excerpt":{"rendered":"<p>Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without taking at least one of them with us. However, we need to be careful about what we connect to our devices. Just as you wouldn\u2019t share a toothbrush because it\u2019s intimate and [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2010,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[77,79,64,78],"class_list":["post-2008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cable","tag-charger","tag-cybersecurity","tag-usb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T13:51:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T14:11:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Using borrowed chargers and USB cables: is this a safe habit?\",\"datePublished\":\"2025-12-03T13:51:35+00:00\",\"dateModified\":\"2025-12-03T14:11:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\"},\"wordCount\":626,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png\",\"keywords\":[\"cable\",\"charger\",\"cybersecurity\",\"USB\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\",\"name\":\"Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png\",\"datePublished\":\"2025-12-03T13:51:35+00:00\",\"dateModified\":\"2025-12-03T14:11:36+00:00\",\"description\":\"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png\",\"width\":1500,\"height\":1000,\"caption\":\"USB cables and chargers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using borrowed chargers and USB cables: is this a safe habit?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers","description":"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers","og_description":"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-03T13:51:35+00:00","article_modified_time":"2025-12-03T14:11:36+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Using borrowed chargers and USB cables: is this a safe habit?","datePublished":"2025-12-03T13:51:35+00:00","dateModified":"2025-12-03T14:11:36+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/"},"wordCount":626,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png","keywords":["cable","charger","cybersecurity","USB"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/","name":"Using borrowed chargers and USB cables: is this a safe habit? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png","datePublished":"2025-12-03T13:51:35+00:00","dateModified":"2025-12-03T14:11:36+00:00","description":"Electronic devices such as smartphones, tablets, and computers are increasingly part of our daily lives, and it\u2019s almost impossible to go anywhere without Learn essential USB cable safety tips.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cabos-USB-e-carregadores.png","width":1500,"height":1000,"caption":"USB cables and chargers"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/using-borrowed-chargers-and-usb-cables-is-this-a-safe-habit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Using borrowed chargers and USB cables: is this a safe habit?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2008"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2008\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2010"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}