{"id":7558,"date":"2025-01-27T15:13:57","date_gmt":"2025-01-27T14:13:57","guid":{"rendered":"https:\/\/www.esferize.com\/hacktivismo-definicion-y-casos-reales\/"},"modified":"2025-01-31T12:43:10","modified_gmt":"2025-01-31T11:43:10","slug":"hacktivism-definition-and-real-cases","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/","title":{"rendered":"Hacktivism: Definition and real cases"},"content":{"rendered":"<p>Hacktivism, a fusion of the words \u2018<strong>hacker<\/strong>\u2019 and \u2018<strong>activism<\/strong>\u2019, refers to the <strong>use of technological skills to carry out protest actions for political, social or ideological purposes<\/strong>. In the digital age, this form of activism has gained notoriety for harnessing the tools of hacking to challenge power structures, expose injustices or defend rights.<\/p>\n<p>From massive information leaks to attacks on platforms seen as oppressive, <strong>hacktivism redefines how we understand protest in an interconnected world<\/strong>.<\/p>\n<p>In this article we explore what hacktivism really means, its definition and real cases that have made it a key form of activism in the digital age.<\/p>\n<h2>Definition of hacktivism<\/h2>\n<p>Hacktivism is much more than the act of hacking into computer systems. It is about using these technical skills for a <strong>conscious purpose<\/strong>, whether it is to expose abuses of authority, advocate for freedom of expression or fight against internet censorship. Hacktivists use denial of service (DDoS) attacks, website defacement and confidential data leaks (doxing). With these tactics, they turn their skills into<strong> tools for social change<\/strong>.<\/p>\n<p>For example, the Anonymous collective has carried out multiple attacks targeting organisations that they claim violate ethical principles or fundamental freedoms, highlighting the impact of this form of protest.<\/p>\n<h2>Real cases of hacktivism<\/h2>\n<p>Hacktivism has left an important mark on contemporary history. Its impact is prominent in debates about transparency, digital surveillance and civil disobedience. Below, we explore some real cases that exemplify its impact:<\/p>\n<h3>Anonymous and the WikiLeaks blockades (2010)<\/h3>\n<p>One of the best known cases of hacktivism occurred when companies such as Visa, Mastercard and PayPal suspended donations to WikiLeaks following the publication of classified US documents. In response, the Anonymous collective carried out massive DDoS attacks against these companies&#8217; platforms in <strong>an attempt to restore what they saw as a right to freedom of information<\/strong>. <a href=\"https:\/\/www.comunicacion21.com\/de-wikileaks-a-openleaks-la-crisis-de-los-medios-y-las-nuevas-plataformas-de-informacion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read more about the impact of WikiLeaks.<\/a><\/p>\n<h3>Hacking Hacking Team (2015)<\/h3>\n<p>In 2015, hacktivists leaked more than 400 GB of data from Hacking Team, a company known for providing espionage tools to authoritarian regimes. This action revealed the use of its technology <strong>to persecute political opponents and violate human rights<\/strong>, generating global pressure on the company.<\/p>\n<h3>Occupy Wall Street and digital protest (2011)<\/h3>\n<p>During the Occupy Wall Street movement, which denounced global economic inequality, hacktivists played a central role. <strong>From defacing websites to leaking internal information from financial institutions<\/strong>, these digital acts strengthened the movement&#8217;s visibility and amplified its message of struggle against the richest 1%.<\/p>\n<h3><strong>The Syrian Electronic Army (SEA)<\/strong><\/h3>\n<p>In the midst of the Syrian civil war, the Syrian Electronic Army group used hacktivism to actively promote pro-Syrian regime messages and<strong> attack Western media outlets<\/strong> such as The New York Times and Forbes. This case demonstrates that hacktivism can be harnessed for a variety of purposes within geopolitical conflicts.<\/p>\n<h3><strong>Edward Snowden and mass surveillance (2013)<\/strong><\/h3>\n<p>Although not technically a hacktivist, Edward Snowden is a paradigmatic example of digital resistance. <strong>His leaks about the NSA&#8217;s mass surveillance programmes<\/strong> inspired numerous hacktivist groups to fight for privacy and civil liberties.<\/p>\n<h2>An evolving ethical debate<\/h2>\n<p>Hacktivism challenges the traditional lines between <strong>activism, justice and crime<\/strong>. On the one hand, it is considered a <strong>legitimate form of civil disobedience<\/strong>. This is especially relevant in a society dominated by corporations and governments. On the other hand, there are those who <strong>question its legitimacy<\/strong>, warning that this practice can cause <strong>collateral damage<\/strong> and affect individuals or systems that are not directly related to the causes it promotes.<\/p>\n<p>One example is Anonymous&#8217; attacks on critical digital systems. These actions can disrupt essential services and generate an ethical dilemma: how far is it valid to go in the name of justice?<\/p>\n<p>Hacktivism is much more than a digital phenomenon: it is a <strong>form of protest that has redefined the relationship between technology, social justice and power<\/strong>. Through iconic cases, it is clear that this practice will continue to be a <strong>contentious issue<\/strong> as technologies and conflicts between privacy and security evolve. It is therefore crucial to understand how hacktivism <strong>shapes the dynamics of protest in the 21st century<\/strong> and what implications it has for <a href=\"https:\/\/www.esferize.com\/en\/cybersecurity-in-2025\/\">the future of digital dissent<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacktivism, a fusion of the words \u2018hacker\u2019 and \u2018activism\u2019, refers  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":7553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[225,228],"tags":[1830,1827,1828,564,1822,1820,1829],"class_list":["post-7558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security-on-the-internet","tag-activism","tag-activismo-en","tag-anonymous-en","tag-hacker-en","tag-hacktivism","tag-hacktivismo-en","tag-wikileaks-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacktivism: Definition and real cases - Esferize<\/title>\n<meta name=\"description\" content=\"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktivism: Definition and real cases - Esferize\" \/>\n<meta property=\"og:description\" content=\"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T14:13:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-31T11:43:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"Hacktivism: Definition and real cases\",\"datePublished\":\"2025-01-27T14:13:57+00:00\",\"dateModified\":\"2025-01-31T11:43:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/\"},\"wordCount\":680,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Hacktivismo.jpg\",\"keywords\":[\"activism\",\"activismo\",\"anonymous\",\"hacker\",\"hacktivism\",\"Hacktivismo\",\"wikileaks\"],\"articleSection\":[\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/\",\"name\":\"Hacktivism: Definition and real cases - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Hacktivismo.jpg\",\"datePublished\":\"2025-01-27T14:13:57+00:00\",\"dateModified\":\"2025-01-31T11:43:10+00:00\",\"description\":\"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Hacktivismo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Hacktivismo.jpg\",\"width\":1920,\"height\":1281,\"caption\":\"Hacktivismo: Definici\u00f3n y casos reales\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/hacktivism-definition-and-real-cases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacktivism: Definition and real cases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktivism: Definition and real cases - Esferize","description":"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/","og_locale":"en_US","og_type":"article","og_title":"Hacktivism: Definition and real cases - Esferize","og_description":"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.","og_url":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/","og_site_name":"Esferize","article_published_time":"2025-01-27T14:13:57+00:00","article_modified_time":"2025-01-31T11:43:10+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg","type":"image\/jpeg"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"Hacktivism: Definition and real cases","datePublished":"2025-01-27T14:13:57+00:00","dateModified":"2025-01-31T11:43:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/"},"wordCount":680,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg","keywords":["activism","activismo","anonymous","hacker","hacktivism","Hacktivismo","wikileaks"],"articleSection":["Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/","url":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/","name":"Hacktivism: Definition and real cases - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg","datePublished":"2025-01-27T14:13:57+00:00","dateModified":"2025-01-31T11:43:10+00:00","description":"Hacktivism: definition and real cases. Learn about this phenomenon through examples such as Anonymous and WikiLeaks.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2025\/01\/Hacktivismo.jpg","width":1920,"height":1281,"caption":"Hacktivismo: Definici\u00f3n y casos reales"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/hacktivism-definition-and-real-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hacktivism: Definition and real cases"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/7558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=7558"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/7558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/7553"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=7558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=7558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=7558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}