{"id":9820,"date":"2025-03-25T17:00:00","date_gmt":"2025-03-25T16:00:00","guid":{"rendered":"https:\/\/www.metrica-global.com\/ciberseguridad-el-acertijo-de-la-maleta\/"},"modified":"2025-07-31T09:13:16","modified_gmt":"2025-07-31T07:13:16","slug":"ciberseguridad-el-acertijo-de-la-maleta","status":"publish","type":"post","link":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/","title":{"rendered":"Cybersecurity: The Suitcase Riddle"},"content":{"rendered":"\r\n<p data-start=\"314\" data-end=\"621\">Cybersecurity is a critical pillar in the digital age. Every day, millions of pieces of data travel across networks that can be vulnerable to unauthorized access. To ensure that only the intended recipient can access this information, advanced techniques like\u00a0<strong data-start=\"586\" data-end=\"611\">asymmetric encryption<\/strong>\u00a0are used.<\/p>\r\n<p data-start=\"623\" data-end=\"740\">In this article, we explain how this technology works through a clever riddle designed to test your reasoning skills.<\/p>\r\n<hr data-start=\"742\" data-end=\"745\" \/>\r\n<h3 data-start=\"747\" data-end=\"789\">The Suitcase Riddle: Can You Solve It?<\/h3>\r\n<p data-start=\"791\" data-end=\"987\">Imagine someone needs to send a confidential suitcase to another person\u2014but the couriers transporting it cannot be trusted. How can they make sure no one else can open the suitcase during transit?<\/p>\r\n<p data-start=\"989\" data-end=\"1058\">To better understand the challenge, consider the following analogies:<\/p>\r\n<ul data-start=\"1060\" data-end=\"1242\">\r\n<li data-start=\"1060\" data-end=\"1126\">\r\n<p data-start=\"1062\" data-end=\"1126\">The suitcase represents the\u00a0<strong data-start=\"1090\" data-end=\"1098\">data<\/strong>\u00a0that needs to be protected.<\/p>\r\n<\/li>\r\n<li data-start=\"1127\" data-end=\"1169\">\r\n<p data-start=\"1129\" data-end=\"1169\">The locks symbolize\u00a0<strong data-start=\"1149\" data-end=\"1168\">data encryption<\/strong>.<\/p>\r\n<\/li>\r\n<li data-start=\"1170\" data-end=\"1242\">\r\n<p data-start=\"1172\" data-end=\"1242\">The couriers represent the\u00a0<strong data-start=\"1199\" data-end=\"1210\">network<\/strong>\u00a0through which the data travels.<\/p>\r\n<\/li>\r\n<\/ul>\r\n<p data-start=\"1244\" data-end=\"1357\">So here\u2019s the key question:\u00a0<strong data-start=\"1272\" data-end=\"1357\">How can the suitcase be sent securely without the couriers being able to open it?<\/strong><\/p>\r\n<hr data-start=\"1359\" data-end=\"1362\" \/>\r\n<h3 data-start=\"1364\" data-end=\"1413\">The Solution: How Asymmetric Encryption Works<\/h3>\r\n<p data-start=\"1415\" data-end=\"1647\">Asymmetric encryption ensures secure communication using two keys: one\u00a0<strong data-start=\"1486\" data-end=\"1496\">public<\/strong>, which anyone can access, and one\u00a0<strong data-start=\"1531\" data-end=\"1542\">private<\/strong>, which only the recipient possesses. Applying this to the suitcase riddle, the solution looks like this:<\/p>\r\n<ol data-start=\"1649\" data-end=\"2013\">\r\n<li data-start=\"1649\" data-end=\"1774\">\r\n<p data-start=\"1652\" data-end=\"1774\">The sender places\u00a0<strong data-start=\"1670\" data-end=\"1688\">their own lock<\/strong>\u00a0on the suitcase and sends it. Even though the couriers handle it, they can\u2019t open it.<\/p>\r\n<\/li>\r\n<li data-start=\"1775\" data-end=\"1873\">\r\n<p data-start=\"1778\" data-end=\"1873\">The recipient adds\u00a0<strong data-start=\"1797\" data-end=\"1815\">their own lock<\/strong>\u00a0to the suitcase and sends it back. Now, it has two locks.<\/p>\r\n<\/li>\r\n<li data-start=\"1874\" data-end=\"2013\">\r\n<p data-start=\"1877\" data-end=\"2013\">The sender\u00a0<strong data-start=\"1888\" data-end=\"1910\">removes their lock<\/strong>\u00a0and sends it again. Now only the recipient\u2019s lock remains, so they can unlock and access the contents.<\/p>\r\n<\/li>\r\n<\/ol>\r\n<p data-start=\"2015\" data-end=\"2169\">This is exactly how asymmetric encryption works: data is encrypted with a\u00a0<strong data-start=\"2089\" data-end=\"2103\">public key<\/strong>\u00a0but can only be decrypted with the\u00a0<strong data-start=\"2139\" data-end=\"2168\">corresponding private key<\/strong>.<\/p>\r\n<hr data-start=\"2171\" data-end=\"2174\" \/>\r\n<h3 data-start=\"2176\" data-end=\"2230\">Why Asymmetric Encryption Matters in Cybersecurity<\/h3>\r\n<p data-start=\"2232\" data-end=\"2500\">At\u00a0<strong data-start=\"2235\" data-end=\"2246\">METRICA<\/strong>, we use advanced encryption technologies to safeguard our clients\u2019 information and ensure data security. Asymmetric encryption plays a vital role in many modern systems\u2014like banking transactions, secure communications, and the storage of sensitive data.<\/p>\r\n<p data-start=\"2502\" data-end=\"2720\">If you\u2019re interested in learning more about cybersecurity and best practices for protecting your digital information, follow our blog and social media channels. We regularly share the latest insights on digital safety.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Imagine someone needs to send a confidential suitcase to another person\u2014but there\u2019s a catch: the couriers delivering it can\u2019t be trusted.<\/p>\n","protected":false},"author":1,"featured_media":9821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[2670],"tags":[2680,2563,2674,2681,2682,2675,2683,2678,2684,2571,2551],"class_list":["post-9820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quality-en","tag-acertijo-en","tag-ambito-tecnologico-en","tag-ciberseguridad-en","tag-cifrado-asimetrico-en","tag-clave-en","tag-consejos-de-seguridad-en","tag-datos-seguros-en","tag-proteccion-de-datos-en","tag-proteger-la-informacion-en","tag-sector-it-en","tag-tecnologia-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity: The Suitcase Riddle - METRICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: The Suitcase Riddle - METRICA\" \/>\n<meta property=\"og:description\" content=\"Imagine someone needs to send a confidential suitcase to another person\u2014but there\u2019s a catch: the couriers delivering it can\u2019t be trusted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\" \/>\n<meta property=\"og:site_name\" content=\"METRICA\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T07:13:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"979\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\"},\"headline\":\"Cybersecurity: The Suitcase Riddle\",\"datePublished\":\"2025-03-25T16:00:00+00:00\",\"dateModified\":\"2025-07-31T07:13:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\"},\"wordCount\":366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"keywords\":[\"Acertijo\",\"\u00c1mbito Tecnol\u00f3gico\",\"Ciberseguridad\",\"Cifrado asim\u00e9trico\",\"Clave\",\"Consejos De Seguridad\",\"Datos seguros\",\"Protecci\u00f3n de Datos\",\"Proteger la informaci\u00f3n\",\"Sector IT\",\"Tecnolog\u00eda\"],\"articleSection\":[\"Quality\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\",\"url\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\",\"name\":\"Cybersecurity: The Suitcase Riddle - METRICA\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"datePublished\":\"2025-03-25T16:00:00+00:00\",\"dateModified\":\"2025-07-31T07:13:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"width\":2560,\"height\":979,\"caption\":\"BANNER NOTICIAS - banner maleta\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.metrica-global.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: The Suitcase Riddle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metrica-global.com\/#website\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"name\":\"METRICA\",\"description\":\"Servicios Globales IT\",\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metrica-global.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.metrica-global.com\/#organization\",\"name\":\"METRICA\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"width\":332,\"height\":58,\"caption\":\"METRICA\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"url\":\"https:\/\/www.metrica-global.com\/en\/author\/desarrollo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: The Suitcase Riddle - METRICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: The Suitcase Riddle - METRICA","og_description":"Imagine someone needs to send a confidential suitcase to another person\u2014but there\u2019s a catch: the couriers delivering it can\u2019t be trusted.","og_url":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/","og_site_name":"METRICA","article_published_time":"2025-03-25T16:00:00+00:00","article_modified_time":"2025-07-31T07:13:16+00:00","og_image":[{"width":2560,"height":979,"url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"desarrollo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#article","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/"},"author":{"name":"desarrollo","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc"},"headline":"Cybersecurity: The Suitcase Riddle","datePublished":"2025-03-25T16:00:00+00:00","dateModified":"2025-07-31T07:13:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/"},"wordCount":366,"commentCount":0,"publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"image":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","keywords":["Acertijo","\u00c1mbito Tecnol\u00f3gico","Ciberseguridad","Cifrado asim\u00e9trico","Clave","Consejos De Seguridad","Datos seguros","Protecci\u00f3n de Datos","Proteger la informaci\u00f3n","Sector IT","Tecnolog\u00eda"],"articleSection":["Quality"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/","url":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/","name":"Cybersecurity: The Suitcase Riddle - METRICA","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"image":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","datePublished":"2025-03-25T16:00:00+00:00","dateModified":"2025-07-31T07:13:16+00:00","breadcrumb":{"@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","width":2560,"height":979,"caption":"BANNER NOTICIAS - banner maleta"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metrica-global.com\/en\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.metrica-global.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: The Suitcase Riddle"}]},{"@type":"WebSite","@id":"https:\/\/www.metrica-global.com\/#website","url":"https:\/\/www.metrica-global.com\/","name":"METRICA","description":"Servicios Globales IT","publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metrica-global.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.metrica-global.com\/#organization","name":"METRICA","url":"https:\/\/www.metrica-global.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","width":332,"height":58,"caption":"METRICA"},"image":{"@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","caption":"desarrollo"},"url":"https:\/\/www.metrica-global.com\/en\/author\/desarrollo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/posts\/9820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/comments?post=9820"}],"version-history":[{"count":2,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/posts\/9820\/revisions"}],"predecessor-version":[{"id":12568,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/posts\/9820\/revisions\/12568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/media\/9821"}],"wp:attachment":[{"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/media?parent=9820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/categories?post=9820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.metrica-global.com\/en\/wp-json\/wp\/v2\/tags?post=9820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}