{"id":2060,"date":"2025-12-05T11:53:09","date_gmt":"2025-12-05T14:53:09","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2060"},"modified":"2025-12-05T11:53:09","modified_gmt":"2025-12-05T14:53:09","slug":"deepfake-phishing-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","title":{"rendered":"Deepfake phishing: o que \u00e9 e como se manter protegido"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Foi-se o tempo em que um v\u00eddeo ou uma mensagem de voz podiam nos ajudar a decifrar se uma solicita\u00e7\u00e3o era real ou fraudulenta. Hoje em dia, cibercriminosos conseguem criar phishings ultrarrealistas com t\u00e9cnicas de deepfake. Mas\u2026 voc\u00ea sabe o que significa cada um desses termos?<\/span><\/p>\n<h2><b>O que \u00e9 phishing, o que \u00e9 deepfake e, principalmente: o que \u00e9 deepfake phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Os phishings nada mais s\u00e3o do que as mensagens fraudulentas criadas por cibercriminosos para enganar as pessoas. Seja por e-mail, SMS ou redes sociais, o phishing acontece quando um fraudador efetua uma solicita\u00e7\u00e3o fraudulenta para uma v\u00edtima por meio de um conte\u00fado enganoso: um pedido de transfer\u00eancia de dinheiro, um pedido de compartilhamento de credenciais, entre muitos outros pretextos.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/in-the-age-of-deepfakes-not-every-picture-is-worth-a-thousand-words\/\">Deepfakes<\/a>, por outro lado, s\u00e3o conte\u00fados manipulados que apresentam pessoas agindo de um modo que nunca agiram no mundo real. Hoje em dia, por meio de uma intelig\u00eancia artificial, praticamente qualquer pessoa podem criar imagens, v\u00eddeos ou mensagens de voz extremamente fi\u00e9is \u00e0 fisionomia e \u00e0 cad\u00eancia de fala de algu\u00e9m que voc\u00ea conhece.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando um cibercriminoso usa t\u00e9cnicas de deepfake para enganar um internauta, chamamos o golpe de deepfake phishing, que nada mais \u00e9 do que uma fraude que usa conte\u00fados ultrarrealistas criados com intelig\u00eancia artificial.<\/span><\/p>\n<h2><b>Como o Deepfake Phishing funciona?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Os golpes de phishing com deepfake s\u00e3o efetuados da seguinte maneira. Em primeiro lugar, o fraudador fabrica conte\u00fados que parecem extremamente aut\u00eanticos, personificando uma pessoa que voc\u00ea conhece: o seu chefe, um colega de trabalho, um familiar ou um amigo.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como isso \u00e9 feito? O cibercriminoso recolhe imagens e v\u00eddeos j\u00e1 existentes da pessoa que se pretende personificar, materiais facilmente encontrados nas m\u00eddias sociais. Depois, alimenta um algoritmo de intelig\u00eancia artificial com esse conte\u00fado. Pronto! Agora, o sistema pode imitar essa pessoa quase que perfeitamente, criando v\u00eddeos, imagens e \u00e1udios falsos que podem enganar at\u00e9 mesmo os olhos e ouvidos mais treinados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O deepfake phishing tem sido insistentemente usado por cibercriminosos para direcionar ataques cibern\u00e9ticos contra empresas. Uma das formas mais comuns \u00e9 criando v\u00eddeos fraudulentos de CEOs ou executivos de alto escal\u00e3o pedindo que um colaborador fa\u00e7a transfer\u00eancias financeiras urgentes ou compartilhe credenciais de acesso a sistemas.\u00a0<\/span><\/p>\n<h3><b>Os gatilhos mais comuns<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Assim como em outros tipos de phishing, os criminosos empregam diferentes gatilhos mentais para tornar a fraude de deepfake phishing ainda mais convincentes. Alguns deles s\u00e3o:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Autoridade:<\/b><span style=\"font-weight: 400;\"> personificando autoridades, como CEOs e outros executivos C-level, ou mesmo colaboradores de bancos ou de governos, os cibercriminosos conseguem com que as v\u00edtimas acatem as solicita\u00e7\u00f5es fraudulentas mais facilmente.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Urg\u00eancia:<\/b><span style=\"font-weight: 400;\"> uma solicita\u00e7\u00e3o fraudulenta quase sempre ter\u00e1 um tom de urg\u00eancia ou amea\u00e7a, anunciando m\u00e1s consequ\u00eancias caso uma a\u00e7\u00e3o imediata n\u00e3o seja tomada: perda de clientes ou de fornecedores se uma transfer\u00eancia financeira n\u00e3o for feita, interrup\u00e7\u00e3o de algum sistema se uma credencial n\u00e3o for compartilhada, entre outros.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Escassez: <\/b><span style=\"font-weight: 400;\">oportunidades imperd\u00edveis e benef\u00edcios exclusivos tamb\u00e9m est\u00e3o no leque de argumentos de um cibercriminoso para convencer as v\u00edtimas a tomar uma a\u00e7\u00e3o rapidamente.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Entre os riscos associados a cair em uma fraude de deepfake, est\u00e3o o roubo de identidade, fraudes financeiras e preju\u00edzos \u00e0 pr\u00f3pria reputa\u00e7\u00e3o ou \u00e0 reputa\u00e7\u00e3o da empresa.\u00a0<\/span><\/p>\n<h2><b>Como identificar um golpe por deepfake?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Os phishings por deepfakes s\u00e3o crimes quase perfeitos, \u00e9 verdade. Mas quase sempre \u00e9 poss\u00edvel notar algumas inconsist\u00eancias que te ajudam a identificar uma fraude:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Movimentos n\u00e3o naturais dos olhos e da boca:<\/b><span style=\"font-weight: 400;\"> deepfakes frequentemente apresentam movimentos n\u00e3o naturais dos olhos e da boca. Piscadas estranhas e l\u00e1bios mal sincronizados com a fala s\u00e3o algumas falhas comuns.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Aten\u00e7\u00e3o aos detalhes de m\u00e3os, cabelo e outras partes do corpo:<\/b><span style=\"font-weight: 400;\"> n\u00e3o raro, \u00e9 poss\u00edvel notar formatos estranhos ou cortados das m\u00e3os, das orelhas e do cabelo em deepfakes.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Voz artificial:<\/b><span style=\"font-weight: 400;\"> desconfie de cad\u00eancias de fala muito perfeitas, que n\u00e3o apresentem hesita\u00e7\u00f5es, corre\u00e7\u00f5es ou ru\u00eddos no fundo. \u00c9 poss\u00edvel que elas tenham sido criadas com intelig\u00eancia artificial.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">No final das contas, diante de fraudes ultrarrealistas como essas criadas por deepfake, o melhor \u00e9 sempre desconfiar de solicita\u00e7\u00f5es suspeitas. Procure sempre confirmar a veracidade do pedido pessoalmente com o solicitante antes de prosseguir com alguma a\u00e7\u00e3o.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Gone are the days when a video or a voice message could help you guess whether a request was real or fraudulent. Nowadays, cybercriminals can create ultra-realistic phishing scams using deepfake techniques. But first&#8230; do you know what each of these terms means? What is phishing, what is deepfake, and, most importantly, what is deepfake [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2062,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[41],"tags":[64,86,92,70],"class_list":["post-2060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","tag-cybersecurity","tag-deepfakes","tag-phishing","tag-scam"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deepfake Phishing explained and how you can protect yourself | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T14:53:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Deepfake Phishing explained and how you can protect yourself\",\"datePublished\":\"2025-12-05T14:53:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"keywords\":[\"cybersecurity\",\"deepfakes\",\"phishing\",\"scam\"],\"articleSection\":[\"Phishing\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\",\"name\":\"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"datePublished\":\"2025-12-05T14:53:09+00:00\",\"description\":\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"width\":1500,\"height\":1000,\"caption\":\"deepfake phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepfake Phishing explained and how you can protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","og_description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-05T14:53:09+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Deepfake Phishing explained and how you can protect yourself","datePublished":"2025-12-05T14:53:09+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"},"wordCount":628,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","keywords":["cybersecurity","deepfakes","phishing","scam"],"articleSection":["Phishing"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","url":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","name":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","datePublished":"2025-12-05T14:53:09+00:00","description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","width":1500,"height":1000,"caption":"deepfake phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Deepfake Phishing explained and how you can protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2060"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2062"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}