$background_color = get_theme_mod( 'background_color' ); if ( ! $background_color ) { $background_color_arr = get_theme_support( 'custom-background' ); $background_color = $background_color_arr[0]['default-color']; } $editor_color_palette[] = array( 'name' => __( 'Background Color', 'twentytwenty' ), 'slug' => 'background', 'color' => '#' . $background_color, ); // If we have accent colors, add them to the block editor palette. if ( $editor_color_palette ) { add_theme_support( 'editor-color-palette', $editor_color_palette ); } // Block Editor Font Sizes. add_theme_support( 'editor-font-sizes', array( array( 'name' => _x( 'Small', 'Name of the small font size in the block editor', 'twentytwenty' ), 'shortName' => _x( 'S', 'Short name of the small font size in the block editor.', 'twentytwenty' ), 'size' => 18, 'slug' => 'small', ), array( 'name' => _x( 'Regular', 'Name of the regular font size in the block editor', 'twentytwenty' ), 'shortName' => _x( 'M', 'Short name of the regular font size in the block editor.', 'twentytwenty' ), 'size' => 21, 'slug' => 'normal', ), array( 'name' => _x( 'Large', 'Name of the large font size in the block editor', 'twentytwenty' ), 'shortName' => _x( 'L', 'Short name of the large font size in the block editor.', 'twentytwenty' ), 'size' => 26.25, 'slug' => 'large', ), array( 'name' => _x( 'Larger', 'Name of the larger font size in the block editor', 'twentytwenty' ), 'shortName' => _x( 'XL', 'Short name of the larger font size in the block editor.', 'twentytwenty' ), 'size' => 32, 'slug' => 'larger', ), ) ); add_theme_support( 'editor-styles' ); // If we have a dark background color then add support for dark editor style. // We can determine if the background color is dark by checking if the text-color is white. if ( '#ffffff' === strtolower( twentytwenty_get_color_for_area( 'content', 'text' ) ) ) { add_theme_support( 'dark-editor-style' ); } } add_action( 'after_setup_theme', 'twentytwenty_block_editor_settings' ); /** * Overwrite default more tag with styling and screen reader markup. * * @param string $html The default output HTML for the more tag. * @return string */ function twentytwenty_read_more_tag( $html ) { return preg_replace( '/(.*)<\/a>/iU', sprintf( '
$2 "%1$s"
', get_the_title( get_the_ID() ) ), $html ); } add_filter( 'the_content_more_link', 'twentytwenty_read_more_tag' ); /** * Enqueues scripts for customizer controls & settings. * * @since Twenty Twenty 1.0 * * @return void */ function twentytwenty_customize_controls_enqueue_scripts() { $theme_version = wp_get_theme()->get( 'Version' ); // Add main customizer js file. wp_enqueue_script( 'twentytwenty-customize', get_template_directory_uri() . '/assets/js/customize.js', array( 'jquery' ), $theme_version, false ); // Add script for color calculations. wp_enqueue_script( 'twentytwenty-color-calculations', get_template_directory_uri() . '/assets/js/color-calculations.js', array( 'wp-color-picker' ), $theme_version, false ); // Add script for controls. wp_enqueue_script( 'twentytwenty-customize-controls', get_template_directory_uri() . '/assets/js/customize-controls.js', array( 'twentytwenty-color-calculations', 'customize-controls', 'underscore', 'jquery' ), $theme_version, false ); wp_localize_script( 'twentytwenty-customize-controls', 'twentyTwentyBgColors', twentytwenty_get_customizer_color_vars() ); } add_action( 'customize_controls_enqueue_scripts', 'twentytwenty_customize_controls_enqueue_scripts' ); /** * Enqueue scripts for the customizer preview. * * @since Twenty Twenty 1.0 * * @return void */ function twentytwenty_customize_preview_init() { $theme_version = wp_get_theme()->get( 'Version' ); wp_enqueue_script( 'twentytwenty-customize-preview', get_theme_file_uri( '/assets/js/customize-preview.js' ), array( 'customize-preview', 'customize-selective-refresh', 'jquery' ), $theme_version, true ); wp_localize_script( 'twentytwenty-customize-preview', 'twentyTwentyBgColors', twentytwenty_get_customizer_color_vars() ); wp_localize_script( 'twentytwenty-customize-preview', 'twentyTwentyPreviewEls', twentytwenty_get_elements_array() ); wp_add_inline_script( 'twentytwenty-customize-preview', sprintf( 'wp.customize.selectiveRefresh.partialConstructor[ %1$s ].prototype.attrs = %2$s;', wp_json_encode( 'cover_opacity' ), wp_json_encode( twentytwenty_customize_opacity_range() ) ) ); } add_action( 'customize_preview_init', 'twentytwenty_customize_preview_init' ); /** * Get accessible color for an area. * * @since Twenty Twenty 1.0 * * @param string $area The area we want to get the colors for. * @param string $context Can be 'text' or 'accent'. * @return string Returns a HEX color. */ function twentytwenty_get_color_for_area( $area = 'content', $context = 'text' ) { // Get the value from the theme-mod. $settings = get_theme_mod( 'accent_accessible_colors', array( 'content' => array( 'text' => '#000000', 'accent' => '#cd2653', 'secondary' => '#6d6d6d', 'borders' => '#dcd7ca', ), 'header-footer' => array( 'text' => '#000000', 'accent' => '#cd2653', 'secondary' => '#6d6d6d', 'borders' => '#dcd7ca', ), ) ); // If we have a value return it. if ( isset( $settings[ $area ] ) && isset( $settings[ $area ][ $context ] ) ) { return $settings[ $area ][ $context ]; } // Return false if the option doesn't exist. return false; } /** * Returns an array of variables for the customizer preview. * * @since Twenty Twenty 1.0 * * @return array */ function twentytwenty_get_customizer_color_vars() { $colors = array( 'content' => array( 'setting' => 'background_color', ), 'header-footer' => array( 'setting' => 'header_footer_background_color', ), ); return $colors; } /** * Get an array of elements. * * @since Twenty Twenty 1.0 * * @return array */ function twentytwenty_get_elements_array() { // The array is formatted like this: // [key-in-saved-setting][sub-key-in-setting][css-property] = [elements]. $elements = array( 'content' => array( 'accent' => array( 'color' => array( '.color-accent', '.color-accent-hover:hover', '.color-accent-hover:focus', ':root .has-accent-color', '.has-drop-cap:not(:focus):first-letter', '.wp-block-button.is-style-outline', 'a' ), 'border-color' => array( 'blockquote', '.border-color-accent', '.border-color-accent-hover:hover', '.border-color-accent-hover:focus' ), 'background-color' => array( 'button', '.button', '.faux-button', '.wp-block-button__link', '.wp-block-file .wp-block-file__button', 'input[type="button"]', 'input[type="reset"]', 'input[type="submit"]', '.bg-accent', '.bg-accent-hover:hover', '.bg-accent-hover:focus', ':root .has-accent-background-color', '.comment-reply-link' ), 'fill' => array( '.fill-children-accent', '.fill-children-accent *' ), ), 'background' => array( 'color' => array( ':root .has-background-color', 'button', '.button', '.faux-button', '.wp-block-button__link', '.wp-block-file__button', 'input[type="button"]', 'input[type="reset"]', 'input[type="submit"]', '.wp-block-button', '.comment-reply-link', '.has-background.has-primary-background-color:not(.has-text-color)', '.has-background.has-primary-background-color *:not(.has-text-color)', '.has-background.has-accent-background-color:not(.has-text-color)', '.has-background.has-accent-background-color *:not(.has-text-color)' ), 'background-color' => array( ':root .has-background-background-color' ), ), 'text' => array( 'color' => array( 'body', '.entry-title a', ':root .has-primary-color' ), 'background-color' => array( ':root .has-primary-background-color' ), ), 'secondary' => array( 'color' => array( 'cite', 'figcaption', '.wp-caption-text', '.post-meta', '.entry-content .wp-block-archives li', '.entry-content .wp-block-categories li', '.entry-content .wp-block-latest-posts li', '.wp-block-latest-comments__comment-date', '.wp-block-latest-posts__post-date', '.wp-block-embed figcaption', '.wp-block-image figcaption', '.wp-block-pullquote cite', '.comment-metadata', '.comment-respond .comment-notes', '.comment-respond .logged-in-as', '.pagination .dots', '.entry-content hr:not(.has-background)', 'hr.styled-separator', ':root .has-secondary-color' ), 'background-color' => array( ':root .has-secondary-background-color' ), ), 'borders' => array( 'border-color' => array( 'pre', 'fieldset', 'input', 'textarea', 'table', 'table *', 'hr' ), 'background-color' => array( 'caption', 'code', 'code', 'kbd', 'samp', '.wp-block-table.is-style-stripes tbody tr:nth-child(odd)', ':root .has-subtle-background-background-color' ), 'border-bottom-color' => array( '.wp-block-table.is-style-stripes' ), 'border-top-color' => array( '.wp-block-latest-posts.is-grid li' ), 'color' => array( ':root .has-subtle-background-color' ), ), ), 'header-footer' => array( 'accent' => array( 'color' => array( 'body:not(.overlay-header) .primary-menu > li > a', 'body:not(.overlay-header) .primary-menu > li > .icon', '.modal-menu a', '.footer-menu a, .footer-widgets a', '#site-footer .wp-block-button.is-style-outline', '.wp-block-pullquote:before', '.singular:not(.overlay-header) .entry-header a', '.archive-header a', '.header-footer-group .color-accent', '.header-footer-group .color-accent-hover:hover' ), 'background-color' => array( '.social-icons a', '#site-footer button:not(.toggle)', '#site-footer .button', '#site-footer .faux-button', '#site-footer .wp-block-button__link', '#site-footer .wp-block-file__button', '#site-footer input[type="button"]', '#site-footer input[type="reset"]', '#site-footer input[type="submit"]' ), ), 'background' => array( 'color' => array( '.social-icons a', 'body:not(.overlay-header) .primary-menu ul', '.header-footer-group button', '.header-footer-group .button', '.header-footer-group .faux-button', '.header-footer-group .wp-block-button:not(.is-style-outline) .wp-block-button__link', '.header-footer-group .wp-block-file__button', '.header-footer-group input[type="button"]', '.header-footer-group input[type="reset"]', '.header-footer-group input[type="submit"]' ), 'background-color' => array( '#site-header', '.footer-nav-widgets-wrapper', '#site-footer', '.menu-modal', '.menu-modal-inner', '.search-modal-inner', '.archive-header', '.singular .entry-header', '.singular .featured-media:before', '.wp-block-pullquote:before' ), ), 'text' => array( 'color' => array( '.header-footer-group', 'body:not(.overlay-header) #site-header .toggle', '.menu-modal .toggle' ), 'background-color' => array( 'body:not(.overlay-header) .primary-menu ul' ), 'border-bottom-color' => array( 'body:not(.overlay-header) .primary-menu > li > ul:after' ), 'border-left-color' => array( 'body:not(.overlay-header) .primary-menu ul ul:after' ), ), 'secondary' => array( 'color' => array( '.site-description', 'body:not(.overlay-header) .toggle-inner .toggle-text', '.widget .post-date', '.widget .rss-date', '.widget_archive li', '.widget_categories li', '.widget cite', '.widget_pages li', '.widget_meta li', '.widget_nav_menu li', '.powered-by-wordpress', '.to-the-top', '.singular .entry-header .post-meta', '.singular:not(.overlay-header) .entry-header .post-meta a' ), ), 'borders' => array( 'border-color' => array( '.header-footer-group pre', '.header-footer-group fieldset', '.header-footer-group input', '.header-footer-group textarea', '.header-footer-group table', '.header-footer-group table *', '.footer-nav-widgets-wrapper', '#site-footer', '.menu-modal nav *', '.footer-widgets-outer-wrapper', '.footer-top' ), 'background-color' => array( '.header-footer-group table caption', 'body:not(.overlay-header) .header-inner .toggle-wrapper::before' ), ), ), ); /** * Filters Twenty Twenty theme elements * * @since Twenty Twenty 1.0 * * @param array Array of elements */ return apply_filters( 'twentytwenty_get_elements_array', $elements ); } {"id":175,"date":"2025-05-28T00:46:11","date_gmt":"2025-05-27T19:46:11","guid":{"rendered":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/?p=175"},"modified":"2025-11-09T01:47:37","modified_gmt":"2025-11-08T20:47:37","slug":"how-mobile-security-protects-your-online-accounts","status":"publish","type":"post","link":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/2025\/05\/28\/how-mobile-security-protects-your-online-accounts\/","title":{"rendered":"How Mobile Security Protects Your Online Accounts"},"content":{"rendered":"
\n

In our increasingly digital world, mobile devices have become our primary gateway to the internet, enabling instant access to banking, shopping, social media, and entertainment platforms. As reliance on smartphones grows, so does the importance of robust mobile security measures to safeguard our online accounts from threats. Understanding how mobile security functions and implementing best practices can significantly reduce the risk of unauthorized access, financial loss, and identity theft.<\/p>\n

Table of Contents<\/h2>\n
\n1. Introduction to Mobile Security and Its Importance in Protecting Online Accounts<\/a>
\n
2. Fundamental Concepts of Mobile Security<\/a>
\n
3. How Mobile Security Prevents Unauthorized Access<\/a>
\n
4. The Role of Mobile Security in Regulatory Compliance and User Protection<\/a>
\n
5. Modern Verification Methods and Their Impact on Account Security<\/a>
\n
6. Enhancing Security Through User Education and Best Practices<\/a>
\n
7. Advanced Topics in Mobile Security: Emerging Technologies and Challenges<\/a>
\n
8. Non-Obvious Aspects of Mobile Security That Add Depth<\/a>
\n
9. Conclusion: Building a Holistic Approach to Protecting Your Online Accounts on Mobile Devices<\/a>\n<\/div>\n

1. Introduction to Mobile Security and Its Importance in Protecting Online Accounts<\/h2>\n

a. Defining mobile security in the digital age<\/h3>\n

Mobile security encompasses the measures and protocols designed to protect smartphones and tablets from cyber threats, data breaches, and unauthorized access. In the digital age, it involves safeguarding sensitive information stored on devices, such as login credentials, financial details, and personal data, through a combination of hardware protections, software defenses, and user practices.<\/p>\n

b. The increasing dependence on mobile devices for online access<\/h3>\n

Studies show that over 60% of internet traffic now originates from mobile devices, emphasizing their central role in daily activities. From mobile banking to social networking, our reliance on smartphones means that any security lapse can have serious repercussions. For example, a compromised device can lead to unauthorized transactions or identity theft, highlighting the need for effective security measures.<\/p>\n

c. Overview of common threats to online account security<\/h3>\n

Cybercriminals target mobile users through various tactics including phishing attacks, malicious apps, malware, and device theft. Phishing emails or messages can trick users into revealing passwords, while malicious apps may covertly access sensitive data. Additionally, unsecured Wi-Fi networks and outdated software magnify vulnerabilities, making it crucial to understand and address these threats proactively.<\/p>\n

2. Fundamental Concepts of Mobile Security<\/h2>\n

a. Authentication mechanisms: passwords, biometrics, and multi-factor authentication<\/h3>\n

Authentication verifies user identity before granting access. Traditional passwords are increasingly supplemented or replaced by biometric methods such as fingerprint scans or facial recognition, which offer greater security and convenience. Multi-factor authentication (MFA) combines two or more methods\u2014like a password plus a fingerprint\u2014to create a layered defense, significantly reducing the risk of unauthorized access.<\/p>\n

b. Data encryption and secure communication protocols<\/h3>\n

Encryption transforms sensitive data into unreadable formats during transmission and storage. Protocols like TLS (Transport Layer Security) secure data exchanges between your device and servers, shielding your information from eavesdropping. For example, whenever you log into an online banking app, encryption ensures your credentials remain confidential.<\/p>\n

c. The role of device security features (e.g., lock screens, app permissions)<\/h3>\n

Device security features like PINs, biometric locks, and app permission controls act as first-line defenses. Regularly updating these features and managing app permissions\u2014only granting access to necessary data\u2014reduces vulnerabilities. For instance, restricting location sharing prevents apps from tracking you without consent, preserving privacy and security.<\/p>\n

3. How Mobile Security Prevents Unauthorized Access<\/h2>\n

a. Protecting against phishing and social engineering attacks<\/h3>\n

Phishing campaigns often target mobile users through SMS, email, or social media, aiming to deceive them into revealing login details. Educating users to recognize suspicious messages and avoid clicking unknown links is vital. Modern security solutions also incorporate anti-phishing features that detect and block malicious content.<\/p>\n

b. The importance of secure login practices<\/h3>\n

Secure login practices include using strong, unique passwords and enabling multi-factor authentication. For example, relying solely on SMS-based verification can introduce vulnerabilities, but combining it with biometric authentication enhances security. Many platforms now recommend or require MFA to prevent credential theft.<\/p>\n

c. Examples of mobile security breaches and lessons learned<\/h3>\n

In 2022, a major mobile banking app suffered a breach due to inadequate authentication protocols, leading to unauthorized transactions. The incident underscored the importance of layered security, such as biometric verification and real-time alerts. Such breaches highlight the need for continuous security updates and user awareness.<\/p>\n

4. The Role of Mobile Security in Regulatory Compliance and User Protection<\/h2>\n

a. How regulations like the UK Gambling Commission influence security measures<\/h3>\n

Regulatory bodies such as the UK Gambling Commission mandate strict security standards for online gambling operators. These include secure user authentication, transaction monitoring, and data protection protocols, ensuring that players\u2019 personal and financial information remains safeguarded. Compliance not only protects consumers but also enhances trust and platform integrity.<\/p>\n

b. Mandatory features such as age verification and self-exclusion tools<\/h3>\n

Mobile platforms often incorporate age verification processes\u2014such as ID checks\u2014and self-exclusion tools to promote responsible gaming. These features rely on secure mobile security measures to prevent underage access and allow users to set limits or exclude themselves, aligning with legal requirements and ethical standards.<\/p>\n

c. Ensuring responsible gaming and preventing underage access through mobile security<\/h3>\n

Implementing multi-layered security controls, such as biometric verification combined with identity checks, helps ensure that only authorized users access sensitive services. For example, some platforms integrate age verification with biometric authentication, making it more difficult for minors to bypass restrictions, thus fostering responsible gaming.<\/p>\n

5. Modern Verification Methods and Their Impact on Account Security<\/h2>\n

a. SMS-based verification and its advantages and vulnerabilities<\/h3>\n

SMS verification is widely used due to its simplicity and immediacy. However, it has notable vulnerabilities, such as SIM swapping\u2014where attackers hijack a user\u2019s phone number\u2014and interception of messages over unsecure networks. Despite its convenience, reliance solely on SMS can compromise security.<\/p>\n

b. The use of app-based authenticators and biometric verification<\/h3>\n

App-based authenticators like Google Authenticator or Authy generate time-sensitive codes that provide an extra security layer. Biometric verification offers seamless yet strong protection by using fingerprint or facial recognition. Combining these methods creates a robust defense against unauthorized access.<\/p>\n

c. Case study: Fonix Mobile: a new option<\/a> implementation of verification processes and associated security measures<\/h3>\n

Modern platforms like SMS Casino utilize multi-factor verification, including app-based authenticators and biometric checks, to enhance user security. Incorporating trusted mobile payment solutions such as Fonix Mobile further streamlines verification while maintaining high security standards. This approach demonstrates how integrating multiple layers of verification\u2014along with secure communication channels\u2014protects user accounts effectively.<\/p>\n

6. Enhancing Security Through User Education and Best Practices<\/h2>\n

a. Recognizing and avoiding common security pitfalls<\/h3>\n

Users often fall prey to phishing scams or reuse weak passwords. Educating users to recognize suspicious messages, avoid sharing login details, and verify website URLs can prevent breaches. For example, being cautious about unsolicited SMS or emails claiming to be from financial institutions helps mitigate social engineering risks.<\/p>\n

b. Regular updates and security patches for mobile apps and OS<\/h3>\n

Keeping devices and apps up to date ensures protection against known vulnerabilities. Cybercriminals frequently exploit outdated software; therefore, enabling automatic updates is a simple yet effective security practice.<\/p>\n

c. Encouraging the use of strong, unique passwords and two-factor authentication<\/h3>\n

Password managers can help generate and store complex passwords, reducing the temptation to reuse or choose weak ones. Combining strong passwords with two-factor authentication creates a layered security approach, significantly reducing the likelihood of unauthorized access.<\/p>\n

7. Advanced Topics in Mobile Security: Emerging Technologies and Challenges<\/h2>\n

a. The role of artificial intelligence and machine learning in threat detection<\/h3>\n

AI and machine learning are increasingly used to identify anomalous behaviors and detect threats in real time. For instance, unusual login patterns or rapid account access attempts can trigger alerts, enabling proactive defenses against cyberattacks.<\/p>\n

b. Challenges posed by evolving cyber threats and mobile malware<\/h3>\n

Cybercriminals develop sophisticated malware that can bypass traditional defenses, such as trojans hidden within seemingly legitimate apps. Continuous vigilance, advanced security tools, and user awareness are essential to combat these evolving threats effectively.<\/p>\n

c. Future trends: biometric advancements, blockchain, and decentralized verification<\/h3>\n

Emerging technologies like biometric authentication enhancements, blockchain-based identity verification, and decentralized security models promise to further strengthen mobile account protection. These innovations aim to provide more secure, transparent, and user-centric security solutions in the coming years.<\/p>\n

8. Non-Obvious Aspects of Mobile Security That Add Depth<\/h2>\n

a. The impact of service fees (e.g., Siru Mobile\u2019s charges) on user trust and security decisions<\/h3>\n

Payment methods like Siru Mobile often include service fees that can influence user perceptions of security and trust. Transparent communication about charges and security protocols helps build confidence and encourages responsible usage.<\/p>\n

b. The importance of privacy controls and data handling policies in mobile apps<\/h3>\n

Effective privacy controls enable users to manage their data sharing preferences, reducing exposure to potential breaches. Clear data handling policies demonstrate a platform\u2019s commitment to user privacy and legal compliance, fostering trust.<\/p>\n

c. Legal and ethical considerations in mobile security enforcement<\/h3>\n

Security measures must balance enforcement with user rights, ensuring compliance with laws like GDPR. Ethical considerations also involve respecting user autonomy while protecting vulnerable populations, such as minors in gambling contexts.<\/p>\n

9. Conclusion: Building a Holistic Approach to Protecting Your Online Accounts on Mobile Devices<\/h2>\n

“Effective mobile security is not a single solution but a combination of technology, user awareness, and ongoing vigilance. Staying informed and proactive is key to safeguarding your digital life.”<\/p><\/blockquote>\n

In summary, protecting your online accounts on mobile devices requires an integrated approach that includes strong authentication methods, encryption, user education, and awareness of emerging threats<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

In our increasingly digital world, mobile devices have become our primary gateway to the internet, enabling instant access to banking, shopping, social media, and entertainment platforms. As reliance on smartphones grows, so does the importance of robust mobile security measures to safeguard our online accounts from threats. Understanding how mobile security functions and implementing best […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/posts\/175"}],"collection":[{"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":1,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/posts\/175\/revisions\/176"}],"wp:attachment":[{"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sistemasseop.qroo.gob.mx\/inclusion\/index.php\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}