{"id":2242,"date":"2025-12-19T18:01:41","date_gmt":"2025-12-19T21:01:41","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2242"},"modified":"2025-12-19T18:01:41","modified_gmt":"2025-12-19T21:01:41","slug":"thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/","title":{"rendered":"Vai usar intelig\u00eancia artificial? Tome cuidado com o sigilo de dados"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">O uso de plataformas baseadas em intelig\u00eancia artificial e machine learning, como chatbots e ferramentas de intelig\u00eancia generativa<\/span><span style=\"font-weight: 400;\">, t\u00eam se tornado cada vez mais comuns em diversos setores. Cada vez mais acess\u00edveis ao p\u00fablico em geral, esses recursos, de fato, s\u00e3o capazes de auxiliar os profissionais em suas tarefas cotidianas, automatizando tarefas, facilitando o atendimento ao cliente e at\u00e9 mesmo criando trechos inteiros de c\u00f3digos a serem embutidos em produtos comerciais.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No entanto, nem tudo s\u00e3o flores. Muitos riscos \u00e0 seguran\u00e7a da informa\u00e7\u00e3o podem surgir quando essas ferramentas s\u00e3o usadas sem o devido cuidado. Uma das principais amea\u00e7as est\u00e1 relacionada \u00e0 inser\u00e7\u00e3o de dados sigilosos nessas plataformas. Lembre-se de que as intelig\u00eancias artificiais usam todas as informa\u00e7\u00f5es fornecidas pelos pr\u00f3prios usu\u00e1rios para melhorar suas capacidades de resposta. Com isso, \u00e9 poss\u00edvel que elas possam repassar essas informa\u00e7\u00f5es para terceiros.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vamos imaginar um exemplo simples. Ao interagir com um chatbot de intelig\u00eancia generativa, os usu\u00e1rios podem acabar compartilhando informa\u00e7\u00f5es confidenciais, como n\u00fameros de conta banc\u00e1ria, senhas, dados m\u00e9dicos ou informa\u00e7\u00f5es pessoais e corporativas sens\u00edveis.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Se esses dados forem armazenados ou usados de forma inadequada para o treinamento da plataforma, eles podem ser explorados por indiv\u00edduos mal-intencionados, resultando em viola\u00e7\u00f5es de privacidade e at\u00e9 mesmo em fraudes.<\/span><\/p>\n<h2><b>E quando a IA \u00e9 minha?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Outro risco significativo \u00e9 o vazamento de dados provenientes dessas ferramentas. Se o chatbot ou outra ferramenta de intelig\u00eancia artificial pertence \u00e0 sua organiza\u00e7\u00e3o, esses recursos devem garantir que as informa\u00e7\u00f5es coletadas sejam armazenadas de forma segura e protegidas contra acessos n\u00e3o autorizados. Como j\u00e1 sabemos, vazamento de dados pode causar danos irrepar\u00e1veis \u00e0 imagem da empresa, al\u00e9m de acarretar consequ\u00eancias legais e financeiras significativas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por fim, algoritmos de machine learning podem ser treinados com base em conjuntos de dados que refletem vieses e intoler\u00e2ncias existentes na sociedade. Se esses algoritmos forem utilizados em chatbots sem a devida revis\u00e3o e mitiga\u00e7\u00e3o, eles podem perpetuar preconceitos e discrimina\u00e7\u00f5es. \u00c9 fundamental que haja uma an\u00e1lise criteriosa e um monitoramento constante dos dados usados no treinamento dessas ferramentas para evitar que vieses discriminat\u00f3rios sejam reproduzidos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Para mitigar esses riscos \u00e0 seguran\u00e7a da informa\u00e7\u00e3o ao utilizar ferramentas de intelig\u00eancia artificial e machine learning, \u00e9 essencial adotar algumas medidas b\u00e1sicas. Algumas boas pr\u00e1ticas incluem obter o consentimento expl\u00edcito dos usu\u00e1rios antes de coletar qualquer informa\u00e7\u00e3o pessoal e remover informa\u00e7\u00f5es pessoais identific\u00e1veis dos conjuntos de dados utilizados no treinamento dos modelos de intelig\u00eancia artificial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/cryptography-what-is-it-and-how-to-use-it\/\">Tamb\u00e9m \u00e9 interessante utilizar criptografia<\/a> para proteger os dados armazenados e transmitidos, implementar controles de acesso adequados para garantir que apenas pessoas autorizadas possam manipular os dados coletados pelas ferramentas. Al\u00e9m disso, \u00e9 preciso realizar revis\u00f5es regulares dos algoritmos e modelos utilizados nas ferramentas, no intuito de identificar e corrigir poss\u00edveis vieses ou comportamentos indesejados.<\/span><\/p>\n<h2><b>Quem usa e manipula precisa de treinamento!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Por fim, o treinamento e a conscientiza\u00e7\u00e3o dos colaboradores tamb\u00e9m possuem um papel important\u00edssimo na mitiga\u00e7\u00e3o desses riscos. A capacita\u00e7\u00e3o para o correto aproveitamento dessas tecnologias inclui n\u00e3o apenas o repasse de boas pr\u00e1ticas, mas tamb\u00e9m a f\u00e1cil identifica\u00e7\u00e3o de amea\u00e7as como phishing ou outros m\u00e9todos de engenharia social.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>The use of platforms based on artificial intelligence and machine learning, such as chatbots and generative artificial intelligence tools, has become increasingly popular in several sectors. More accessible to the general public, these resources can actually assist professionals in their daily routines, automating tasks, facilitating customer service, and even creating entire code snippets to be [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2243,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-2242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T21:01:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Thinking of using artificial intelligence? Take care with data confidentiality!\",\"datePublished\":\"2025-12-19T21:01:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\",\"name\":\"Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png\",\"datePublished\":\"2025-12-19T21:01:41+00:00\",\"description\":\"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png\",\"width\":1500,\"height\":1000,\"caption\":\"artificial intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Thinking of using artificial intelligence? Take care with data confidentiality!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers","description":"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers","og_description":"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-19T21:01:41+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Thinking of using artificial intelligence? Take care with data confidentiality!","datePublished":"2025-12-19T21:01:41+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/"},"wordCount":458,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png","articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/","name":"Thinking of using artificial intelligence? Take care with data confidentiality! | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png","datePublished":"2025-12-19T21:01:41+00:00","description":"Discover the key data confidentiality risks of using artificial intelligence tools and learn best practices to protect sensitive information .","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/artificial-intelligence.png","width":1500,"height":1000,"caption":"artificial intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/thinking-of-using-artificial-intelligence-take-care-with-data-confidentiality\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Thinking of using artificial intelligence? Take care with data confidentiality!"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2242"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2242\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2243"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}