{"id":2085,"date":"2025-12-09T15:25:42","date_gmt":"2025-12-09T18:25:42","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2085"},"modified":"2025-12-09T15:25:42","modified_gmt":"2025-12-09T18:25:42","slug":"5-security-settings-for-social-networks","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/5-security-settings-for-social-networks\/","title":{"rendered":"5 configura\u00e7\u00f5es de seguran\u00e7a para redes sociais"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Voc\u00ea j\u00e1 parou para pensar em quantas redes sociais voc\u00ea tem? \u00c9 muito prov\u00e1vel que o n\u00famero seja maior que tr\u00eas, mesmo que voc\u00ea n\u00e3o use todas. Elas s\u00e3o muito vantajosas porque permitem que nos conectemos com pessoas e conte\u00fados que apreciamos. Por\u00e9m, n\u00e3o podemos fechar os olhos diante dos riscos que o uso despreocupado das redes com rela\u00e7\u00e3o \u00e0 seguran\u00e7a pode trazer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Algumas das melhores formas de proteger suas redes sociais est\u00e3o no seu pr\u00f3prio perfil, na \u00e1rea de prefer\u00eancias e configura\u00e7\u00f5es. Apesar de alguns termos mudarem entre as plataformas, as ferramentas de privacidade dispon\u00edveis nelas s\u00e3o muito semelhantes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Agora, voc\u00ea vai aprender cinco configura\u00e7\u00f5es r\u00e1pidas que v\u00e3o te ajudar a se manter mais protegido nas redes sociais!<\/span><\/p>\n<h2><b>1. Visualiza\u00e7\u00e3o de conte\u00fado e publica\u00e7\u00f5es<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A maior parte das redes sociais permite que voc\u00ea decida se os seus posts, <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/scams\/golpe-da-selfie-criminosos-usam-engenharia-social-para-driblar-reconhecimento-facial\/\">fotos<\/a> e v\u00eddeos ser\u00e3o p\u00fablicos ou vis\u00edveis apenas para seus amigos ou seguidores. Procure n\u00e3o deixar seu perfil no modo p\u00fablico. O ideal \u00e9 manter o n\u00edvel mais alto de privacidade e permitir que as pessoas que voc\u00ea deseja tenham acesso e possam interagir com o que voc\u00ea compartilha.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por\u00e9m, considerando que muitas redes t\u00eam papel crescente para divulga\u00e7\u00e3o e networking profissional e, por isso, precisam ser mais abertas, \u00e9 importante se manter consciente do teor de seus posts e tomar cuidado para n\u00e3o publicar informa\u00e7\u00f5es demasiadas sobre a sua vida pessoal.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Para configurar quem pode ou n\u00e3o ver seus conte\u00fados, acesse as Configura\u00e7\u00f5es do seu perfil, procure pela op\u00e7\u00e3o relacionada \u00e0 privacidade e defina quem pode ter acesso ao seu perfil.<\/span><\/p>\n<h2>2. <b><\/b><b>Informa\u00e7\u00f5es de contato e localiza\u00e7\u00e3o<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u00c9 essencial que voc\u00ea limite quem tem acesso \u00e0s suas informa\u00e7\u00f5es de contato, como e-mail e telefone. De prefer\u00eancia, essas informa\u00e7\u00f5es devem ficar vis\u00edveis unicamente para voc\u00ea. Assim, voc\u00ea evita receber contatos indesejados, incluindo de cibercriminosos. Limite tamb\u00e9m quem pode te contatar via chat.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No caso da localiza\u00e7\u00e3o, evite incluir exatamente os locais que voc\u00ea frequenta em postagens, fotos e v\u00eddeos. Essa informa\u00e7\u00e3o pode ser usada por pessoas mal-intencionadas que voc\u00ea nem imagina que estejam acompanhando as suas redes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Para controlar esses dados, acesse as Configura\u00e7\u00f5es do seu perfil e busque pelas op\u00e7\u00f5es de privacidade da sua conta relacionadas \u00e0 sua localiza\u00e7\u00e3o. Para aumentar ainda mais a sua seguran\u00e7a, tamb\u00e9m vale a pena verificar as configura\u00e7\u00f5es do seu celular ou navegador para controlar quais apps t\u00eam permiss\u00e3o de acesso \u00e0 sua localiza\u00e7\u00e3o.<\/span><\/p>\n<h2>3. <b>Autentica\u00e7\u00e3o de dois fatores<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Essa dica pode at\u00e9 parecer batida, mas a autentica\u00e7\u00e3o de dois fatores \u00e9 t\u00e3o importante que vale a pena repetir. Com ela, voc\u00ea cria uma segunda barreira de prote\u00e7\u00e3o, que dificulta a invas\u00e3o de perfis mesmo em casos em que os criminosos t\u00eam acesso ao login e senha.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Para ativar a autentica\u00e7\u00e3o em dois fatores, acesse as Configura\u00e7\u00f5es e, ent\u00e3o, no menu de seguran\u00e7a, procure a op\u00e7\u00e3o para ativar a autentica\u00e7\u00e3o em duas etapas. De prefer\u00eancia, prefira se receber os c\u00f3digos de seguran\u00e7a por meio de apps autenticadores.<\/span><\/p>\n<h2>4. <b>Cuidado com links e an\u00fancios<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Lembre-se: nem tudo o que aparece nas redes \u00e9 seguro ou real. Essas plataformas s\u00e3o amplamente usadas por criminosos para dissemina\u00e7\u00e3o links e an\u00fancios falsos. Voc\u00ea pode acabar baixando um malware no seu dispositivo, preenchendo informa\u00e7\u00f5es em um formul\u00e1rio fraudulento ou at\u00e9 mesmo comprando um produto que nunca chegar\u00e1 \u00e0s suas m\u00e3os.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por isso, \u00e9 preciso ter muito cuidado por onde clica. Confira os coment\u00e1rios da postagem, pesquise sobre o assunto em outros canais de informa\u00e7\u00f5es e confirme se aquele perfil \u00e9 leg\u00edtimo antes de acessar qualquer conte\u00fado que pare\u00e7a suspeito.<\/span><\/p>\n<h2>5. <b>Cuidado com o que compartilha<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Por mais que voc\u00ea aumente a privacidade de suas contas por meio das configura\u00e7\u00f5es, tamb\u00e9m \u00e9 preciso pensar duas vezes antes de publicar certos conte\u00fados. Afinal, nunca se sabe quando um cibercriminoso pode estar de olho nas suas redes sociais \u2014 inclusive, por meio da invas\u00e3o do perfil de um amigo que voc\u00ea confia!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Portanto, sempre vale a pena se atentar aos detalhes de tudo o que voc\u00ea publica. Evite expor detalhes de onde voc\u00ea trabalha ou mora, quais lugares frequenta, quais s\u00e3o suas rela\u00e7\u00f5es familiares mais pr\u00f3ximas ou at\u00e9 mesmo fornecer ind\u00edcios do seu n\u00edvel socioecon\u00f4mico. Assim, voc\u00ea evita que essas informa\u00e7\u00f5es sejam usadas por cibercriminosos contra voc\u00ea.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Seguindo essas dicas, voc\u00ea poder\u00e1 usar as redes sociais com muito mais tranquilidade, privacidade e seguran\u00e7a!<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Have you stopped to think about how many social networks you\u2019re on? It\u2019s probably more than three, even if you\u2019re not active on all of them. They\u2019re really useful in connecting you to people and content you like. However, we simply cannot feign ignorance of the risks involved in careless network use when it comes [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2087,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[64,99,100],"class_list":["post-2085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-cybersecurity","tag-social-media","tag-social-networks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 security settings for social networks | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 security settings for social networks | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/5-security-settings-for-social-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T18:25:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"5 security settings for social networks\",\"datePublished\":\"2025-12-09T18:25:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/\"},\"wordCount\":663,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png\",\"keywords\":[\"cybersecurity\",\"social media\",\"social networks\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/\",\"name\":\"5 security settings for social networks | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png\",\"datePublished\":\"2025-12-09T18:25:42+00:00\",\"description\":\"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png\",\"width\":1500,\"height\":1000,\"caption\":\"security settings for social networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 security settings for social networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 security settings for social networks | Hacker Rangers","description":"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"5 security settings for social networks | Hacker Rangers","og_description":"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/5-security-settings-for-social-networks\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-09T18:25:42+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"5 security settings for social networks","datePublished":"2025-12-09T18:25:42+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/"},"wordCount":663,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png","keywords":["cybersecurity","social media","social networks"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/","name":"5 security settings for social networks | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png","datePublished":"2025-12-09T18:25:42+00:00","description":"Discover 5 quick security settings that boost your privacy and protect your personal data while using social networks safely.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/5-security-settings-for-social-networks.png","width":1500,"height":1000,"caption":"security settings for social networks"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/5-security-settings-for-social-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"5 security settings for social networks"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2085"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2085\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2087"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}