{"id":891,"date":"2020-02-12T20:07:15","date_gmt":"2020-02-12T20:07:15","guid":{"rendered":"http:\/\/34.227.63.65\/?p=891"},"modified":"2020-02-12T20:07:15","modified_gmt":"2020-02-12T20:07:15","slug":"carding-y-bineros-que-son","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/informatic-security\/carding-and-bineros-what-are\/","title":{"rendered":"\u25b7 Carding and Bineros What is it, are they hackers, credit card hackers?"},"content":{"rendered":"<p style=\"text-align: justify;\">The carding and the bins, we explain you what is carding, the so called bins, if they are hackers, what is exactly and what are they. Have you ever wondered how computer criminals can obtain economic benefits, surely you have heard someone close to you say \"I HAVE BEEN CLONED MY CREDIT CARD\" or that news where they capture criminal groups engaged in this same practice. Practitioners of the <strong>Carding and bineros are called<\/strong>. We will show you what carding and binders are.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><ins style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins><\/p>\n<h2 style=\"text-align: justify;\">Computer offender:<\/h2>\n<p style=\"text-align: justify;\">A person who engages in illegal activities using computers locally or over the Internet. Computer literate<\/p>\n<p><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><img decoding=\"async\" style=\"color: #333333;\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/05\/10\/12\/41\/hacker-2300772_960_720.jpg\" alt=\"Carding and bins, Security\" \/><br \/><\/ins><\/p>\n<h3 style=\"text-align: justify;\">\u00a0<\/h3>\n<h2 style=\"text-align: justify;\">Script Kiddie:<\/h2>\n<p style=\"text-align: justify;\">is an inexperienced computer scientist who disrupts computer systems using automated tools in order to feed his ego.<\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\"><img decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2016\/03\/31\/17\/51\/boy-1293959_960_720.png\" alt=\"Child, Cartoons, Computer, Desktop, Keyboard\" \/><\/p>\n<h2 style=\"text-align: center;\">Carding and the bins.<\/h2>\n<h3 style=\"text-align: justify;\">Carding<\/h3>\n<p style=\"text-align: justify;\">Carding is a practice within the cybercrime that consists of illegally obtaining the precise data of a credit or debit card, for the unauthorized use of their monetary funds, the codes that manage the cards are dominated BIN there are called the \"Bineros\".<\/p>\n<p><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2016\/08\/10\/15\/01\/credit-card-1583534_960_720.jpg\" alt=\"Credit Card, Money, Bank Account, Bank, Bank\" width=\"575\" height=\"383\" \/><\/p>\n<h3 style=\"text-align: justify;\">Bineros<\/h3>\n<p style=\"text-align: justify;\">Biners are script kiddie, all they do is use software and computer programs already made by other people, they don't hack by their own means, which makes carding a dirtier practice since all the binner does is use these programs.<\/p>\n<h2 style=\"text-align: justify;\">Why do they practice carding?<\/h2>\n<p style=\"text-align: justify;\">They do it to make purchases and subscriptions with line services, commonly of low value so that you notice the economic dismantling made, sure you have heard \"Accounts of such an application are sold\" are the bins that are dedicated to introduce their Bin to accounts created wholesale that are blocked in most cases, after a time use.<\/p>\n<p><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><\/p>\n<p style=\"text-align: justify;\">This is a serious and shameless computer crime since they steal from people who have no idea that their card is being used by another individual.<\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2018\/10\/26\/11\/14\/tv-3774381_960_720.jpg\" alt=\"Tv, Man, Watch, Bedroom, Office, Modern\" \/><\/p>\n<h2 style=\"text-align: justify;\">And the law against carding?<\/h2>\n<p style=\"text-align: justify;\">When banks detect suspicious activity, they proceed to block the card, which is the most common, although carding is classified as a cybercrime, many countries in Latin America do not punish many of these and it does not help that many cases are minors who are engaged in these cases.<\/p>\n<p><ins style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins><\/p>\n<h2 style=\"text-align: justify;\">How to protect yourself from carding and bins?<\/h2>\n<ul style=\"text-align: justify;\">\n<li>Make online purchases on secure sites that handle https.<\/li>\n<li>Do not give your card number to private individuals by phone calls or other means of communication.<\/li>\n<li>Keep track of your card's movements.<\/li>\n<li>If you find out that you are a victim of carding, notify your bank and take the appropriate legal action.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\">VIDEO OF THE CARDING AND THE BINEROS\u00a0<\/h2>\n<p>https:\/\/www.youtube.com\/watch?v=trxyRcppndY<\/p>\n<p>Source: <a href=\"https:\/\/www.20minutos.es\/noticia\/4325449\/0\/que-es-el-carding-y-por-que-debes-tener-mucho-cuidado\/\">20minutos<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>El carding y los bineros o bins, te explicamos que es el carding los llamados bineros, si son hackers, que es exactamente y que son. Alguna vez te has preguntado como los delincuentes inform\u00e1ticos pueden obtener beneficios econ\u00f3micos, de seguro has escuchado alguna persona cercana a ti decir \u00abME HAN CLONADO LA TARJETA DE CR\u00c9DITO\u00bb [&hellip;]<\/p>","protected":false},"author":2,"featured_media":893,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/informatic-security\/carding-and-bineros-what-are\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"El carding y los bineros o bins, te explicamos que es el carding los llamados bineros, si son hackers, que es exactamente y que son. Alguna vez te has preguntado como los delincuentes inform\u00e1ticos pueden obtener beneficios econ\u00f3micos, de seguro has escuchado alguna persona cercana a ti decir \u00abME HAN CLONADO LA TARJETA DE CR\u00c9DITO\u00bb [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/informatic-security\/carding-and-bineros-what-are\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-12T20:07:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"filetechn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"filetechn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/\"},\"author\":{\"name\":\"filetechn\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\"},\"headline\":\"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito\",\"datePublished\":\"2020-02-12T20:07:15+00:00\",\"dateModified\":\"2020-02-12T20:07:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/\"},\"wordCount\":495,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg\",\"articleSection\":[\"Seguridad inform\u00e1tica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/\",\"url\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/\",\"name\":\"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg\",\"datePublished\":\"2020-02-12T20:07:15+00:00\",\"dateModified\":\"2020-02-12T20:07:15+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg\",\"width\":760,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\",\"name\":\"filetechn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"caption\":\"filetechn\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/filetechn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/informatic-security\/carding-and-bineros-what-are\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"El carding y los bineros o bins, te explicamos que es el carding los llamados bineros, si son hackers, que es exactamente y que son. Alguna vez te has preguntado como los delincuentes inform\u00e1ticos pueden obtener beneficios econ\u00f3micos, de seguro has escuchado alguna persona cercana a ti decir \u00abME HAN CLONADO LA TARJETA DE CR\u00c9DITO\u00bb [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/informatic-security\/carding-and-bineros-what-are\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2020-02-12T20:07:15+00:00","og_image":[{"width":760,"height":531,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg","type":"image\/jpeg"}],"author":"filetechn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"filetechn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/"},"author":{"name":"filetechn","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b"},"headline":"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito","datePublished":"2020-02-12T20:07:15+00:00","dateModified":"2020-02-12T20:07:15+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/"},"wordCount":495,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg","articleSection":["Seguridad inform\u00e1tica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/","url":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/","name":"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg","datePublished":"2020-02-12T20:07:15+00:00","dateModified":"2020-02-12T20:07:15+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/02\/Carding-y-bineros-son-hackers.jpg","width":760,"height":531},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/carding-y-bineros-que-son\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"\u25b7 Carding y Bineros \u00bfQu\u00e9 es? \u00bfSon hackers? tarjetas de cr\u00e9dito"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b","name":"filetechn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","caption":"filetechn"},"url":"http:\/\/34.227.63.65\/en\/author\/filetechn\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/891"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=891"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/891\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/893"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=891"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}