{"id":62663,"date":"2023-05-23T08:40:24","date_gmt":"2023-05-23T11:40:24","guid":{"rendered":"https:\/\/abes.org.br\/?p=62663"},"modified":"2023-05-11T22:44:29","modified_gmt":"2023-05-12T01:44:29","slug":"adeus-senhas-comeca-a-era-das-chaves-de-acesso","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/","title":{"rendered":"Goodbye passwords! The era of access keys begins"},"content":{"rendered":"<p style=\"text-align: center\"><i>Google users can now say goodbye to their passwords and adopt the new security standard<\/i><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-62664 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9-300x125.png\" alt=\"\" width=\"396\" height=\"165\" \/><\/p>\n<p>Google service users can now choose to sign in with passkeys in place of passwords and two-step verification (2SV). With this change, various forms of cybercrime aimed at stealing passwords, such as phishing attacks, can become much more difficult.<\/p>\n<p>Passkeys are a more convenient and secure alternative to passwords. When you add a passkey to your Google Account, Google will now ask for it when you sign in or perform sensitive actions on your account. The passkey is stored on your local computer or mobile device, which will ask for your screen lock biometrics or PIN to confirm it&#039;s really you. Biometric data is never shared with Google or any other third party \u2014 the screen lock releases the locally stored passkey.<\/p>\n<p>working by\u00a0<a href=\"https:\/\/blog.google\/intl\/pt-br\/novidades\/tecnologia\/mais-um-passo-na-direcao-a-um-futuro-sem-senha\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/s2305.imxsnd10.com\/link.php?code%3DbDpodHRwcyUzQSUyRiUyRmJsb2cuZ29vZ2xlJTJGaW50bCUyRnB0LWJyJTJGbm92aWRhZGVzJTJGdGVjbm9sb2dpYSUyRm1haXMtdW0tcGFzc28tbmEtZGlyZWNhby1hLXVtLWZ1dHVyby1zZW0tc2VuaGElMkY6MzI3NTAzMTMwNzpzYW5kcmFzYW50QGdtYWlsLmNvbTo4ODRjNTU6NDU%3D&amp;source=gmail&amp;ust=1683940543786000&amp;usg=AOvVaw0xOzTJGVItoggzL_oLmf76\"><u>FIDO protocol<\/u><\/a>, passkeys are compatible between devices from different manufacturers and different operating systems. You can use your keys from an Android phone on Windows or iOS, and vice versa.<\/p>\n<p>If you use multiple devices, for example a laptop, PC or tablet, you can create a passkey for each one. This prevents you from being locked out of your account if you lose your devices, and makes it easier to upgrade from one device to another. You can also release access between devices through QR-Code.<\/p>\n<p>If you lose or have stolen a device with a passkey to your Google Account and believe someone else can unlock it, you can immediately revoke the passkey in your account settings. If your device supports the option to remotely wipe it, consider doing that too, especially if your device also has passwords for other services.<\/p>\n<p>Start your password-free future now! Access:\u00a0<a href=\"http:\/\/g.co\/passkeys\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/g.co\/passkeys&amp;source=gmail&amp;ust=1683940543786000&amp;usg=AOvVaw0R3M0jDKkZv56K1WMunwDh\">g.co\/passkeys<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Os usu\u00e1rios do Google j\u00e1 podem dizer adeus \u00e0s suas senhas e adotar o novo padr\u00e3o de seguran\u00e7a Usu\u00e1rios de servi\u00e7os do Google agora podem optar por fazer login com chaves de acesso no lugar de senhas e da verifica\u00e7\u00e3o de duas etapas (2SV). Com essa mudan\u00e7a, diversas formas de cibercrime que visam roubar senhas, [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":62664,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[3788,4060,4061,4059],"class_list":["post-62663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ataques-de-phishing","tag-conta-do-google","tag-dados-biometricos","tag-formas-de-cibercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adeus, senhas! Come\u00e7a a era das chaves de acesso - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adeus, senhas! Come\u00e7a a era das chaves de acesso - ABES\" \/>\n<meta property=\"og:description\" content=\"Os usu\u00e1rios do Google j\u00e1 podem dizer adeus \u00e0s suas senhas e adotar o novo padr\u00e3o de seguran\u00e7a Usu\u00e1rios de servi\u00e7os do Google agora podem optar por fazer login com chaves de acesso no lugar de senhas e da verifica\u00e7\u00e3o de duas etapas (2SV). Com essa mudan\u00e7a, diversas formas de cibercrime que visam roubar senhas, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T11:40:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Adeus, senhas! Come\u00e7a a era das chaves de acesso\",\"datePublished\":\"2023-05-23T11:40:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/unnamed-9.png\",\"keywords\":[\"ataques de phishing\",\"Conta do Google\",\"dados biom\u00e9tricos\",\"formas de cibercrime\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/\",\"name\":\"Adeus, senhas! Come\u00e7a a era das chaves de acesso - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/unnamed-9.png\",\"datePublished\":\"2023-05-23T11:40:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/unnamed-9.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/unnamed-9.png\",\"width\":1600,\"height\":669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adeus, senhas! Come\u00e7a a era das chaves de acesso\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Goodbye, passwords! The era of access keys begins - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/","og_locale":"en_US","og_type":"article","og_title":"Adeus, senhas! Come\u00e7a a era das chaves de acesso - ABES","og_description":"Os usu\u00e1rios do Google j\u00e1 podem dizer adeus \u00e0s suas senhas e adotar o novo padr\u00e3o de seguran\u00e7a Usu\u00e1rios de servi\u00e7os do Google agora podem optar por fazer login com chaves de acesso no lugar de senhas e da verifica\u00e7\u00e3o de duas etapas (2SV). Com essa mudan\u00e7a, diversas formas de cibercrime que visam roubar senhas, [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-05-23T11:40:24+00:00","og_image":[{"width":1600,"height":669,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Adeus, senhas! Come\u00e7a a era das chaves de acesso","datePublished":"2023-05-23T11:40:24+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/"},"wordCount":355,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png","keywords":["ataques de phishing","Conta do Google","dados biom\u00e9tricos","formas de cibercrime"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/","url":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/","name":"Goodbye, passwords! The era of access keys begins - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png","datePublished":"2023-05-23T11:40:24+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/unnamed-9.png","width":1600,"height":669},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/adeus-senhas-comeca-a-era-das-chaves-de-acesso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Adeus, senhas! Come\u00e7a a era das chaves de acesso"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-16 13:51:28","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=62663"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62663\/revisions"}],"predecessor-version":[{"id":62665,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62663\/revisions\/62665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/62664"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=62663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=62663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=62663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}