{"id":7237,"date":"2025-03-25T17:00:00","date_gmt":"2025-03-25T16:00:00","guid":{"rendered":"https:\/\/www.metrica-global.com\/ciberseguridad-el-acertijo-de-la-maleta\/"},"modified":"2025-07-30T11:47:05","modified_gmt":"2025-07-30T09:47:05","slug":"ciberseguridad-el-acertijo-de-la-maleta","status":"publish","type":"post","link":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/","title":{"rendered":"Ciberseguran\u00e7a: O enigma da mala"},"content":{"rendered":"\r\n<p data-start=\"300\" data-end=\"595\">A ciberseguran\u00e7a \u00e9 um pilar fundamental na era digital. Todos os dias, milh\u00f5es de dados circulam por redes que podem ser vulner\u00e1veis a acessos n\u00e3o autorizados. Para garantir que apenas o destinat\u00e1rio certo possa aceder \u00e0 informa\u00e7\u00e3o, existem t\u00e9cnicas avan\u00e7adas como a <strong data-start=\"567\" data-end=\"594\">encripta\u00e7\u00e3o assim\u00e9trica<\/strong>.<\/p>\r\n<p data-start=\"597\" data-end=\"706\">Neste artigo, explicamos como funciona esta tecnologia com a ajuda de um enigma que desafia o teu racioc\u00ednio.<\/p>\r\n<hr data-start=\"708\" data-end=\"711\" \/>\r\n<h3 data-section-id=\"a30flw\" data-start=\"713\" data-end=\"756\">O enigma da mala: consegues resolv\u00ea-lo?<\/h3>\r\n<p data-start=\"758\" data-end=\"941\">Imagina que uma pessoa precisa de enviar uma mala confidencial a outra, mas os transportadores n\u00e3o s\u00e3o de confian\u00e7a. Como pode garantir que ningu\u00e9m consegue abri-la durante o trajeto?<\/p>\r\n<p data-start=\"943\" data-end=\"1008\">Para entender melhor este desafio, considera estas equival\u00eancias:<\/p>\r\n<ul data-start=\"1010\" data-end=\"1202\">\r\n<li data-start=\"1010\" data-end=\"1070\">\r\n<p data-start=\"1012\" data-end=\"1070\">A <strong data-start=\"1014\" data-end=\"1022\">mala<\/strong> representa os dados que se pretendem proteger<\/p>\r\n<\/li>\r\n<li data-start=\"1071\" data-end=\"1129\">\r\n<p data-start=\"1073\" data-end=\"1129\">Os <strong data-start=\"1076\" data-end=\"1088\">cadeados<\/strong> simbolizam a encripta\u00e7\u00e3o da informa\u00e7\u00e3o<\/p>\r\n<\/li>\r\n<li data-start=\"1130\" data-end=\"1202\">\r\n<p data-start=\"1132\" data-end=\"1202\">Os <strong data-start=\"1135\" data-end=\"1154\">transportadores<\/strong> representam a rede por onde os dados circulam<\/p>\r\n<\/li>\r\n<\/ul>\r\n<p data-start=\"1204\" data-end=\"1289\">A pergunta-chave \u00e9: <strong data-start=\"1224\" data-end=\"1289\">como enviar a mala sem que os transportadores a possam abrir?<\/strong><\/p>\r\n<hr data-start=\"1291\" data-end=\"1294\" \/>\r\n<h3 data-section-id=\"1hx46f0\" data-start=\"1296\" data-end=\"1351\">A solu\u00e7\u00e3o: assim funciona a encripta\u00e7\u00e3o assim\u00e9trica<\/h3>\r\n<p data-start=\"1353\" data-end=\"1597\">A encripta\u00e7\u00e3o assim\u00e9trica permite enviar informa\u00e7\u00e3o de forma segura atrav\u00e9s de duas chaves: uma <strong data-start=\"1449\" data-end=\"1466\">chave p\u00fablica<\/strong>, acess\u00edvel a todos, e uma <strong data-start=\"1493\" data-end=\"1510\">chave privada<\/strong>, que apenas o destinat\u00e1rio possui. Aplicando este conceito ao enigma, a solu\u00e7\u00e3o seria:<\/p>\r\n<ol data-start=\"1599\" data-end=\"1978\">\r\n<li data-start=\"1599\" data-end=\"1723\">\r\n<p data-start=\"1602\" data-end=\"1723\">O remetente coloca o seu cadeado na mala e envia-a. Assim, mesmo que os transportadores a manuseiem, n\u00e3o a podem abrir.<\/p>\r\n<\/li>\r\n<li data-start=\"1724\" data-end=\"1836\">\r\n<p data-start=\"1727\" data-end=\"1836\">O destinat\u00e1rio recebe a mala, coloca o <strong data-start=\"1766\" data-end=\"1789\">seu pr\u00f3prio cadeado<\/strong> e devolve-a. Agora a mala tem dois cadeados.<\/p>\r\n<\/li>\r\n<li data-start=\"1837\" data-end=\"1978\">\r\n<p data-start=\"1840\" data-end=\"1978\">O remetente retira o <strong data-start=\"1861\" data-end=\"1876\">seu cadeado<\/strong> e volta a enviar a mala. Fica apenas o cadeado do destinat\u00e1rio, que agora \u00e9 o \u00fanico que a pode abrir.<\/p>\r\n<\/li>\r\n<\/ol>\r\n<p data-start=\"1980\" data-end=\"2176\">Este mecanismo representa o funcionamento da <strong data-start=\"2025\" data-end=\"2052\">encripta\u00e7\u00e3o assim\u00e9trica<\/strong>: os dados s\u00e3o encriptados com a chave p\u00fablica do destinat\u00e1rio, mas apenas podem ser desencriptados com a sua chave privada.<\/p>\r\n<hr data-start=\"2178\" data-end=\"2181\" \/>\r\n<h3 data-section-id=\"fzskff\" data-start=\"2183\" data-end=\"2245\">A import\u00e2ncia da encripta\u00e7\u00e3o assim\u00e9trica na ciberseguran\u00e7a<\/h3>\r\n<p data-start=\"2247\" data-end=\"2545\">Na METRICA, aplicamos tecnologias avan\u00e7adas de encripta\u00e7\u00e3o para proteger a informa\u00e7\u00e3o dos nossos clientes e garantir a seguran\u00e7a dos seus dados. A encripta\u00e7\u00e3o assim\u00e9trica \u00e9 essencial em muitos sistemas modernos \u2014 desde transa\u00e7\u00f5es banc\u00e1rias a comunica\u00e7\u00f5es seguras e armazenamento de dados sens\u00edveis.<\/p>\r\n<p data-start=\"2547\" data-end=\"2762\">Se queres continuar a aprender mais sobre ciberseguran\u00e7a e boas pr\u00e1ticas para proteger a tua informa\u00e7\u00e3o, segue o nosso <strong data-start=\"2666\" data-end=\"2674\">blog<\/strong> e as <strong data-start=\"2680\" data-end=\"2697\">redes sociais<\/strong>, onde partilhamos conte\u00fados atualizados sobre seguran\u00e7a digital.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Uma pessoa precisa de enviar uma mala confidencial a outra, mas h\u00e1 um problema: os transportadores que a v\u00e3o levar n\u00e3o s\u00e3o de confian\u00e7a. Como pode garantir que ningu\u00e9m a consiga abrir durante o trajeto?<\/p>\n","protected":false},"author":1,"featured_media":7238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1472],"tags":[1491,1223,1351,1492,1493,1476,1494,1479,1495,1173,1231],"class_list":["post-7237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-qualidade-pt","tag-acertijo-pt","tag-ambito-tecnologico-pt","tag-ciberseguridad-pt","tag-cifrado-asimetrico-pt","tag-clave-pt","tag-consejos-de-seguridad-pt","tag-datos-seguros-pt","tag-proteccion-de-datos-pt","tag-proteger-la-informacion-pt","tag-sector-it-pt","tag-tecnologia-pt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguran\u00e7a: O enigma da mala - METRICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguran\u00e7a: O enigma da mala - METRICA\" \/>\n<meta property=\"og:description\" content=\"Uma pessoa precisa de enviar uma mala confidencial a outra, mas h\u00e1 um problema: os transportadores que a v\u00e3o levar n\u00e3o s\u00e3o de confian\u00e7a. Como pode garantir que ningu\u00e9m a consiga abrir durante o trajeto?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\" \/>\n<meta property=\"og:site_name\" content=\"METRICA\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T09:47:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"979\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\"},\"headline\":\"Ciberseguran\u00e7a: O enigma da mala\",\"datePublished\":\"2025-03-25T16:00:00+00:00\",\"dateModified\":\"2025-07-30T09:47:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\"},\"wordCount\":420,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"keywords\":[\"Acertijo\",\"\u00c1mbito Tecnol\u00f3gico\",\"Ciberseguridad\",\"Cifrado asim\u00e9trico\",\"Clave\",\"Consejos De Seguridad\",\"Datos seguros\",\"Protecci\u00f3n de Datos\",\"Proteger la informaci\u00f3n\",\"Sector IT\",\"Tecnolog\u00eda\"],\"articleSection\":[\"Qualidade\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\",\"url\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\",\"name\":\"Ciberseguran\u00e7a: O enigma da mala - METRICA\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"datePublished\":\"2025-03-25T16:00:00+00:00\",\"dateModified\":\"2025-07-30T09:47:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg\",\"width\":2560,\"height\":979,\"caption\":\"banner maleta scaled 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.metrica-global.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguran\u00e7a: O enigma da mala\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metrica-global.com\/#website\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"name\":\"METRICA\",\"description\":\"Servicios Globales IT\",\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metrica-global.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.metrica-global.com\/#organization\",\"name\":\"METRICA\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"width\":332,\"height\":58,\"caption\":\"METRICA\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"url\":\"https:\/\/www.metrica-global.com\/pt\/author\/desarrollo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguran\u00e7a: O enigma da mala - METRICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/","og_locale":"pt_PT","og_type":"article","og_title":"Ciberseguran\u00e7a: O enigma da mala - METRICA","og_description":"Uma pessoa precisa de enviar uma mala confidencial a outra, mas h\u00e1 um problema: os transportadores que a v\u00e3o levar n\u00e3o s\u00e3o de confian\u00e7a. Como pode garantir que ningu\u00e9m a consiga abrir durante o trajeto?","og_url":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/","og_site_name":"METRICA","article_published_time":"2025-03-25T16:00:00+00:00","article_modified_time":"2025-07-30T09:47:05+00:00","og_image":[{"width":2560,"height":979,"url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"desarrollo","Est. reading time":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#article","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/"},"author":{"name":"desarrollo","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc"},"headline":"Ciberseguran\u00e7a: O enigma da mala","datePublished":"2025-03-25T16:00:00+00:00","dateModified":"2025-07-30T09:47:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/"},"wordCount":420,"commentCount":0,"publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"image":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","keywords":["Acertijo","\u00c1mbito Tecnol\u00f3gico","Ciberseguridad","Cifrado asim\u00e9trico","Clave","Consejos De Seguridad","Datos seguros","Protecci\u00f3n de Datos","Proteger la informaci\u00f3n","Sector IT","Tecnolog\u00eda"],"articleSection":["Qualidade"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/","url":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/","name":"Ciberseguran\u00e7a: O enigma da mala - METRICA","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"image":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","datePublished":"2025-03-25T16:00:00+00:00","dateModified":"2025-07-30T09:47:05+00:00","breadcrumb":{"@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#primaryimage","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/03\/banner-maleta-scaled-1.jpg","width":2560,"height":979,"caption":"banner maleta scaled 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metrica-global.com\/pt\/ciberseguridad-el-acertijo-de-la-maleta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.metrica-global.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Ciberseguran\u00e7a: O enigma da mala"}]},{"@type":"WebSite","@id":"https:\/\/www.metrica-global.com\/#website","url":"https:\/\/www.metrica-global.com\/","name":"METRICA","description":"Servicios Globales IT","publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metrica-global.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.metrica-global.com\/#organization","name":"METRICA","url":"https:\/\/www.metrica-global.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","width":332,"height":58,"caption":"METRICA"},"image":{"@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","caption":"desarrollo"},"url":"https:\/\/www.metrica-global.com\/pt\/author\/desarrollo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/comments?post=7237"}],"version-history":[{"count":2,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7237\/revisions"}],"predecessor-version":[{"id":12464,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/posts\/7237\/revisions\/12464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/media\/7238"}],"wp:attachment":[{"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/media?parent=7237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/categories?post=7237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pt\/wp-json\/wp\/v2\/tags?post=7237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}