{"id":2685,"date":"2026-03-20T11:53:25","date_gmt":"2026-03-20T14:53:25","guid":{"rendered":"https:\/\/hackerrangers.com\/?p=2685"},"modified":"2026-03-20T11:53:25","modified_gmt":"2026-03-20T14:53:25","slug":"codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros","status":"publish","type":"post","link":"https:\/\/hackerrangers.com\/es\/awareness\/codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros\/","title":{"rendered":"C\u00f3digos QR: \u00bfqu\u00e9 son, c\u00f3mo funcionan y cu\u00e1les son sus peligros?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Es pr\u00e1cticamente imposible que, en los \u00faltimos a\u00f1os, no te hayas encontrado con un C\u00f3digo QR, aunque sea, en alg\u00fan momento de tu vida. Hablamos de esas im\u00e1genes bidimensionales, formadas por tres grandes cubos en los extremos y una serie de cuadrados m\u00e1s peque\u00f1os en su interior. Cuando se los lee con un tel\u00e9fono inteligente, pueden revelar el enlace a una p\u00e1gina web o iniciar la descarga de otro contenido para que puedas consumirlo en tu dispositivo m\u00f3vil, por ejemplo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En primer lugar, cabe recordar que esta no es una tecnolog\u00eda nueva:\u2014fue creada en 1994 por Masahiro Hara, un empleado de Denso Wave, una empresa japonesa de automatizaci\u00f3n industrial que forma parte del Grupo Toyota. Inicialmente, los c\u00f3digos QR (sigla para Quick Response, en ingl\u00e9s, o Respuesta R\u00e1pida en espa\u00f1ol) se dise\u00f1aron exclusivamente para uso industrial, como un est\u00e1ndar m\u00e1s moderno para catalogar componentes automotores en comparaci\u00f3n con los viejos y buenos c\u00f3digos de barras tradicionales.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La idea de Masahiro era crear un protocolo de decodificaci\u00f3n de datos que pudiera transportar una mayor cantidad de informaci\u00f3n y que pudiera leerse con m\u00e1s facilidad, ya que los est\u00e1ndares adoptados en la industria hasta ese momento eran bastante limitados: requer\u00edan un esc\u00e1ner espec\u00edfico para ser interpretados y solo se pod\u00edan escanear horizontalmente. Los c\u00f3digos QR, en cambio, eran mucho m\u00e1s flexibles y, pronto, Denso Wave se dio cuenta de que hasta una c\u00e1mara de baja resoluci\u00f3n en un tel\u00e9fono m\u00f3vil podr\u00eda leerlos.<\/span><\/p>\n<h2><b>Pr\u00e1cticos pero peligrosos<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Aun as\u00ed, los c\u00f3digos QR nunca se hab\u00edan utilizado con tanta intensidad como ahora. Tras la crisis del nuevo coronavirus (SARS-CoV-2), muchos restaurantes, para evitar la circulaci\u00f3n de cartas f\u00edsicas, comenzaron a poner a disposici\u00f3n sus men\u00fas digitalmente. Para tener acceso a ellos, el cliente ten\u00eda que leer el c\u00f3digo respectivo, que, generalmente, estaba pegado a la mesa. En Brasil, el nuevo m\u00e9todo de pago del Banco Central de Brasil (BCB), llamado PIX, tambi\u00e9n ayud\u00f3 a popularizar los c\u00f3digos QR, que se utilizan para agilizar la transferencia de valores entre cuentas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El problema es que, hoy en d\u00eda, cualquiera puede crear un c\u00f3digo QR en cuesti\u00f3n de segundos utilizando herramientas gratuitas disponibles en la web; y esto incluye a los ciberdelincuentes. Al darse cuenta de que los usuarios de internet hab\u00edan adoptado esta tecnolog\u00eda a gran escala, los delincuentes digitales no perdieron el tiempo y comenzaron a hacer circular c\u00f3digos maliciosos que pueden llevar al internauta a una p\u00e1gina de phishing o incluso forzar la descarga autom\u00e1tica de malware en su tel\u00e9fono m\u00f3vil.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adem\u00e1s, debido a su alta capacidad de almacenamiento de datos \u2014mucho mayor que la de los c\u00f3digos de barras comunes\u2014 los c\u00f3digos QR pueden almacenar Identificadores Uniformes de Recursos (Uniform Resource Identifier o URI). Estos son una especie de \"comando\" que hace que tu tel\u00e9fono inteligente responda seg\u00fan lo que se le ordene, incluyendo la transmisi\u00f3n de tu geolocalizaci\u00f3n por medio de una aplicaci\u00f3n, el env\u00edo de un SMS o incluso la incorporaci\u00f3n de un contacto a tu agenda telef\u00f3nica.<\/span><\/p>\n<h2><b>Consejos b\u00e1sicos<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Aunque son pr\u00e1cticos en muchos sentidos, debido al aumento de los delitos cibern\u00e9ticos que se perpetran mediante la tecnolog\u00eda, debemos tener mucho cuidado con los c\u00f3digos QR. Pi\u00e9nsalo dos veces antes de escanear un c\u00f3digo impreso en un folleto cualquiera que encontraste en el piso o en el banco de la plaza, por ejemplo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Afortunadamente, la mayor\u00eda de las aplicaciones de lectores de c\u00f3digos QR marcan la URL, URI o una vista previa del conjunto de informaci\u00f3n contenida en esa imagen antes de darte la opci\u00f3n de leerla. Es en este momento que debes analizar cuidadosamente el enlace que se abre o el comando que se ejecuta. Presta mucha atenci\u00f3n para no caer en trampas. Y, para terminar, cuando se trate de pagos digitales con PIX, aseg\u00farate siempre de estar transfiriendo el valor a la cuenta correcta antes de finalizar la transacci\u00f3n.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>It is practically impossible, over the last few years, that you\u2019ve never come across a single QR Code at some point in your life. We are talking about those two-dimensional square images, formed by large cubes at three of the corners with a series of smaller squares inside. When read by a smartphone, they can [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2686,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[66,76,64,165],"class_list":["post-2685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-awareness","tag-best-practices","tag-cybersecurity","tag-qr-codes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hackerrangers.com\/es\/awareness\/codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.com\/es\/awareness\/codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-20T14:53:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#\\\/schema\\\/person\\\/ddf33a5fa8100f361d6809254f394eea\"},\"headline\":\"QR Codes: What are they, how do they work, and what are their dangers?\",\"datePublished\":\"2026-03-20T14:53:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/QR-Codes.png\",\"keywords\":[\"awareness\",\"best practices\",\"cybersecurity\",\"QR Codes\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/\",\"name\":\"QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/QR-Codes.png\",\"datePublished\":\"2026-03-20T14:53:25+00:00\",\"description\":\"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/QR-Codes.png\",\"contentUrl\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/QR-Codes.png\",\"width\":1500,\"height\":1000,\"caption\":\"QR Codes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/awareness\\\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/hackerrangers.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"QR Codes: What are they, how do they work, and what are their dangers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#website\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hackerrangers.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/hackerrangers.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hackerrangers.com\\\/#\\\/schema\\\/person\\\/ddf33a5fa8100f361d6809254f394eea\",\"name\":\"Hacker Rangers\",\"url\":\"https:\\\/\\\/hackerrangers.com\\\/es\\\/author\\\/hackerrangers\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers","description":"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hackerrangers.com\/es\/awareness\/codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros\/","og_locale":"es_ES","og_type":"article","og_title":"QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers","og_description":"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.","og_url":"https:\/\/hackerrangers.com\/es\/awareness\/codigos-qr-que-son-como-funcionan-y-cuales-son-sus-peligros\/","og_site_name":"Hacker Rangers","article_published_time":"2026-03-20T14:53:25+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.com\/#\/schema\/person\/ddf33a5fa8100f361d6809254f394eea"},"headline":"QR Codes: What are they, how do they work, and what are their dangers?","datePublished":"2026-03-20T14:53:25+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/"},"wordCount":532,"publisher":{"@id":"https:\/\/hackerrangers.com\/#organization"},"image":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png","keywords":["awareness","best practices","cybersecurity","QR Codes"],"articleSection":["Awareness"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/","url":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/","name":"QR Codes: What are they, how do they work, and what are their dangers? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png","datePublished":"2026-03-20T14:53:25+00:00","description":"QR Codes are convenient but risky. Learn how cybercriminals exploit them and discover simple tips to scan safely and avoid phishing.","breadcrumb":{"@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#primaryimage","url":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png","contentUrl":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2026\/03\/QR-Codes.png","width":1500,"height":1000,"caption":"QR Codes"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.com\/awareness\/qr-codes-what-are-they-how-do-they-work-and-what-are-their-dangers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.com\/"},{"@type":"ListItem","position":2,"name":"QR Codes: What are they, how do they work, and what are their dangers?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.com\/#website","url":"https:\/\/hackerrangers.com\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.com\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.com\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.com\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.com\/#\/schema\/person\/ddf33a5fa8100f361d6809254f394eea","name":"Hacker Rangers","url":"https:\/\/hackerrangers.com\/es\/author\/hackerrangers\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/posts\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/posts\/2685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/media\/2686"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/media?parent=2685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/categories?post=2685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.com\/es\/wp-json\/wp\/v2\/tags?post=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}