{"id":126196,"date":"2026-04-15T17:07:52","date_gmt":"2026-04-15T17:07:52","guid":{"rendered":"http:\/\/69dfa1fa8350d07df2bc1798"},"modified":"2026-04-15T17:07:52","modified_gmt":"2026-04-15T17:07:52","slug":"openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber","status":"publish","type":"post","link":"https:\/\/sarmiento24h.com\/?p=126196","title":{"rendered":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/16:9\/w_1280,c_limit\/GettyImages-2265991537.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>OpenAI anunci\u00f3 el martes la siguiente fase de su estrategia de ciberseguridad y un nuevo modelo dise\u00f1ado espec\u00edficamente para ser utilizado por defensores digitales: <strong>GPT-5.4-Cyber<\/strong>.<\/p>\n<p>La noticia llega tras el anuncio la semana pasada por parte de su competidor Anthropic de que su nuevo modelo <a href=\"https:\/\/es.wired.com\/articulos\/anthropic-se-alia-con-sus-rivales-para-evitar-que-la-ia-lo-hackee-todo\">Claude Mythos Preview<\/a> solo se publicar\u00e1 en privado por ahora porque, seg\u00fan la empresa, podr\u00eda ser explotado por hackers y agentes malintencionados. Anthropic tambi\u00e9n anunci\u00f3 la creaci\u00f3n de una coalici\u00f3n industrial, que incluye a competidores como Google, centrada en el impacto de los avances de la IA generativa en la ciberseguridad.<\/p>\n<p>El martes, OpenAI pareci\u00f3 intentar diferenciar su mensaje adoptando un tono menos catastrofista y promocionando sus actuales barreras y defensas, al tiempo que insinuaba la necesidad de protecciones m\u00e1s avanzadas a largo plazo.<\/p>\n<p>\u00abCreemos que la clase de barreras que se utilizan hoy en d\u00eda reducen suficientemente el riesgo cibern\u00e9tico como para apoyar un amplio despliegue de los modelos actuales\u00bb, escribi\u00f3 la empresa en un blog. \u00abEsperamos que las versiones de estas barreras sean suficientes para los pr\u00f3ximos modelos m\u00e1s potentes, mientras que los modelos expl\u00edcitamente entrenados y hechos m\u00e1s permisivos para el trabajo de ciberseguridad requieren despliegues m\u00e1s restrictivos y controles apropiados. A largo plazo, para garantizar la suficiencia continua de la seguridad de la IA en ciberseguridad, tambi\u00e9n esperamos la necesidad de defensas m\u00e1s expansivas para los futuros modelos, cuyas capacidades superar\u00e1n r\u00e1pidamente incluso a los mejores modelos construidos a prop\u00f3sito de hoy en d\u00eda.\u00bb<\/p>\n<h2>Tres pilares para la seguridad<\/h2>\n<p>La empresa afirma que se ha centrado en tres pilares para su enfoque de ciberseguridad. El primero consiste en los llamados sistemas de validaci\u00f3n \u00abconozca a su cliente\u00bb para permitir un acceso controlado a los nuevos modelos lo m\u00e1s amplio y \u00abdemocratizado\u00bb posible. \u00abDise\u00f1amos mecanismos que evitan decidir arbitrariamente qui\u00e9n obtiene acceso para un uso leg\u00edtimo y qui\u00e9n no\u00bb, escribi\u00f3 la empresa el martes. OpenAI est\u00e1 combinando un modelo en el que se asocia con determinadas organizaciones en lanzamientos limitados con un sistema automatizado introducido en febrero, conocido como Trusted Access for Cyber (TAC).<\/p>\n<p>El segundo componente de la estrategia consiste en un \u00abdespliegue iterativo\u00bb, es decir, un proceso de lanzamiento \u00abcuidadoso\u00bb y posterior perfeccionamiento de las nuevas capacidades para que la empresa pueda obtener informaci\u00f3n y comentarios del mundo real. La entrada del blog destaca especialmente \u00abla resistencia a los <em>jailbreaks<\/em> y otros ataques de adversarios, y la mejora de las capacidades defensivas\u00bb. Por \u00faltimo, el tercer foco se centra en las inversiones que, seg\u00fan la empresa, apoyan la seguridad del <em>software<\/em> y otras defensas digitales a medida que prolifera la IA generativa.<\/p>\n<p>OpenAI se\u00f1ala que la iniciativa encaja en sus esfuerzos de seguridad m\u00e1s amplios, incluido un agente de IA de seguridad de aplicaciones lanzado el mes pasado conocido como Codex Security, un programa de subvenciones de ciberseguridad que comenz\u00f3 en 2023, una donaci\u00f3n reciente a la Fundaci\u00f3n Linux para apoyar la seguridad de c\u00f3digo abierto y el \u00abMarco de preparaci\u00f3n\u00bb que est\u00e1 destinado a evaluar y defenderse contra \u00abda\u00f1os graves de las capacidades de IA fronterizas.\u00bb<\/p>\n<p>Las aseveraciones de Anthropic la semana pasada sobre que unos modelos de IA m\u00e1s capaces requieren un ajuste de cuentas en materia de ciberseguridad han suscitado controversia entre los expertos en seguridad. Algunos dicen que la preocupaci\u00f3n es exagerada y podr\u00eda alimentar una nueva ola de sentimiento anti-hacker, consolidando a\u00fan m\u00e1s el poder de las gigantes tecnol\u00f3gicas. Otros, sin embargo, subrayan que las vulnerabilidades y deficiencias de las defensas de seguridad actuales son bien conocidas y que realmente podr\u00edan ser explotadas con mayor rapidez e intensidad por una gama a\u00fan m\u00e1s amplia de malos actores en la era de la <a href=\"https:\/\/es.wired.com\/articulos\/las-matematicas-de-los-agentes-de-ia-no-cuadran\">IA ag\u00e9ntica<\/a>.<\/p>\n<p><em>Art\u00edculo originalmente publicado en<\/em> <a href=\"https:\/\/www.wired.com\/story\/in-the-wake-of-anthropics-mythos-openai-has-a-new-cybersecurity-model-and-strategy\/\">WIRED<\/a><em>. Adaptado por Mauricio Serfatty Godoy.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI anunci\u00f3 el martes la siguiente fase&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":126197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[46],"tags":[],"class_list":["post-126196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sarmiento24h.com\/?p=126196\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h\" \/>\n<meta property=\"og:description\" content=\"OpenAI anunci\u00f3 el martes la siguiente fase&#046;&#046;&#046;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sarmiento24h.com\/?p=126196\" \/>\n<meta property=\"og:site_name\" content=\"Sarmiento24h\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/s24hnoticias\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T17:07:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/16:9\/w_1280,c_limit\/GettyImages-2265991537.jpg\" \/>\n<meta name=\"author\" content=\"sarmiento24h@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:site\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"sarmiento24h@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196\"},\"author\":{\"name\":\"sarmiento24h@gmail.com\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\"},\"headline\":\"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber\",\"datePublished\":\"2026-04-15T17:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196\"},\"wordCount\":678,\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg\",\"articleSection\":[\"Tecnologia\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196\",\"name\":\"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg\",\"datePublished\":\"2026-04-15T17:07:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#primaryimage\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=126196#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sarmiento24h.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"name\":\"Sarmiento24h\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sarmiento24h.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\",\"name\":\"Sarmiento24h\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"width\":1220,\"height\":324,\"caption\":\"Sarmiento24h\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/s24hnoticias\",\"https:\\\/\\\/x.com\\\/sarmiento24h\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\",\"name\":\"sarmiento24h@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152\",\"caption\":\"sarmiento24h@gmail.com\"},\"sameAs\":[\"https:\\\/\\\/sarmiento24h.com\"],\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sarmiento24h.com\/?p=126196","og_locale":"es_ES","og_type":"article","og_title":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h","og_description":"OpenAI anunci\u00f3 el martes la siguiente fase&#46;&#46;&#46;","og_url":"https:\/\/sarmiento24h.com\/?p=126196","og_site_name":"Sarmiento24h","article_publisher":"https:\/\/facebook.com\/s24hnoticias","article_published_time":"2026-04-15T17:07:52+00:00","og_image":[{"url":"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/16:9\/w_1280,c_limit\/GettyImages-2265991537.jpg","type":"","width":"","height":""}],"author":"sarmiento24h@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@sarmiento24h","twitter_site":"@sarmiento24h","twitter_misc":{"Escrito por":"sarmiento24h@gmail.com","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sarmiento24h.com\/?p=126196#article","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/?p=126196"},"author":{"name":"sarmiento24h@gmail.com","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d"},"headline":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber","datePublished":"2026-04-15T17:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=126196"},"wordCount":678,"publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=126196#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/04\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg","articleSection":["Tecnologia"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/sarmiento24h.com\/?p=126196","url":"https:\/\/sarmiento24h.com\/?p=126196","name":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber - Sarmiento24h","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=126196#primaryimage"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=126196#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/04\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg","datePublished":"2026-04-15T17:07:52+00:00","breadcrumb":{"@id":"https:\/\/sarmiento24h.com\/?p=126196#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sarmiento24h.com\/?p=126196"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/?p=126196#primaryimage","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/04\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/04\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/sarmiento24h.com\/?p=126196#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sarmiento24h.com\/"},{"@type":"ListItem","position":2,"name":"OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber"}]},{"@type":"WebSite","@id":"https:\/\/sarmiento24h.com\/#website","url":"https:\/\/sarmiento24h.com\/","name":"Sarmiento24h","description":"","publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sarmiento24h.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sarmiento24h.com\/#organization","name":"Sarmiento24h","url":"https:\/\/sarmiento24h.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","width":1220,"height":324,"caption":"Sarmiento24h"},"image":{"@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/s24hnoticias","https:\/\/x.com\/sarmiento24h"]},{"@type":"Person","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d","name":"sarmiento24h@gmail.com","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152","url":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1775948152","caption":"sarmiento24h@gmail.com"},"sameAs":["https:\/\/sarmiento24h.com"],"url":"https:\/\/sarmiento24h.com\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/04\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-5-4-cyber.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/126196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=126196"}],"version-history":[{"count":0,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/126196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/media\/126197"}],"wp:attachment":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=126196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=126196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=126196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}