{"id":1069,"date":"2026-05-02T06:52:30","date_gmt":"2026-05-02T06:52:30","guid":{"rendered":"https:\/\/melhoresdicas.net\/en\/?p=1069"},"modified":"2026-05-02T06:53:33","modified_gmt":"2026-05-02T06:53:33","slug":"how-to-create-and-store-strong-passwords-without-forgetting-them","status":"publish","type":"post","link":"https:\/\/melhoresdicas.net\/en\/how-to-create-and-store-strong-passwords-without-forgetting-them\/","title":{"rendered":"How to Create and Store Strong Passwords (Without Forgetting Them)"},"content":{"rendered":"<div id=\"model-response-message-contentr_bef7017da326281c\" class=\"markdown markdown-main-panel stronger enable-updated-hr-color\" dir=\"ltr\" aria-live=\"off\" aria-busy=\"false\">\n<p data-path-to-node=\"1\">In the modern digital landscape, your password is the only thing standing between a cybercriminal and your most sensitive information. Whether it is your bank account, your social media presence, or your private emails, the strength of your login credentials determines your level of <a href=\"https:\/\/melhoresdicas.net\/en\/category\/online-safety\/\">safety<\/a>.<\/p>\n<p data-path-to-node=\"2\">However, we face a common human dilemma: a password that is easy for a computer to guess is easy for us to remember, while a password that is impossible for a computer to crack is often impossible for us to memorize. This leads many to take dangerous shortcuts, like using &#8220;123456&#8221; or the name of a pet across every single website they visit.<\/p>\n<p data-path-to-node=\"3\">This guide will walk you through the science of password security, teaching you how to create &#8220;unhackable&#8221; credentials and, more importantly, how to manage them so you never have to click that &#8220;Forgot Password&#8221; button again.<\/p>\n<h2 data-path-to-node=\"5\">Why Your Current Password Might Be a Security Risk<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1042\" src=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-1024x1024.png\" alt=\"What to Say If You\u2019re Looking for a Serious Relationship\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-1024x1024.png 1024w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-300x300.png 300w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-150x150.png 150w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-768x768.png 768w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9-1536x1536.png 1536w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/04\/Gemini_Generated_Image_k8i9o1k8i9o1k8i9.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p data-path-to-node=\"6\">Most people believe their passwords are secure because they include a capital letter or a single number. Unfortunately, modern hacking techniques have evolved far beyond simple guessing. Hackers today use sophisticated software that can test millions of combinations per second.<\/p>\n<h3 data-path-to-node=\"7\">The Danger of Common Patterns<\/h3>\n<p data-path-to-node=\"8\">If your password follows a predictable pattern\u2014such as your birth year, your child\u2019s name, or a sequence like &#8220;Qwerty&#8221;\u2014you are at high risk. Cybercriminals use &#8220;dictionary attacks&#8221; that cross-reference common words and phrases found in leaked databases. If you use &#8220;Password2024!&#8221;, a bot can crack that in less than a minute.<\/p>\n<h3 data-path-to-node=\"9\">The Ripple Effect of Password Reuse<\/h3>\n<p data-path-to-node=\"10\">The biggest mistake you can make is using the same password for multiple accounts. If a minor website you used five years ago gets breached, hackers will take your email and password from that site and try them on Amazon, PayPal, and Gmail. This is known as &#8220;credential stuffing,&#8221; and it is one of the most common ways people lose access to their financial lives.<\/p>\n<h2 data-path-to-node=\"12\">The Anatomy of a Truly Strong Password<\/h2>\n<p data-path-to-node=\"13\">To understand how to create a strong password, we must look at <b data-path-to-node=\"13\" data-index-in-node=\"63\">entropy<\/b>. In cybersecurity, entropy refers to the randomness and unpredictability of a string of characters. The higher the entropy, the harder it is for a machine to guess.<\/p>\n<h3 data-path-to-node=\"14\">Length Over Complexity<\/h3>\n<p data-path-to-node=\"15\">For a long time, the advice was to use short passwords with many symbols (e.g., <code data-path-to-node=\"15\" data-index-in-node=\"80\">P@$$w0rd!<\/code>). Research now shows that <b data-path-to-node=\"15\" data-index-in-node=\"116\">length is more important than complexity<\/b>. A 20-character password made of simple words is much harder to crack than an 8-character password with symbols.<\/p>\n<h3 data-path-to-node=\"16\">Avoiding &#8220;Leaked&#8221; Information<\/h3>\n<p data-path-to-node=\"17\">Never include:<\/p>\n<ul data-path-to-node=\"18\">\n<li>\n<p data-path-to-node=\"18,0,0\">Your name or usernames.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"18,1,0\">Your date of birth or your family&#8217;s birthdays.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"18,2,0\">Your phone number or address.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"18,3,0\">The name of the service (e.g., do not put &#8220;Facebook&#8221; in your Facebook password).<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"20\">Advanced Techniques for Creating Memorable Passwords<\/h2>\n<p data-path-to-node=\"21\">You don\u2019t need to be a genius to remember a complex password. You just need a system. Here are two of the most effective methods used by security experts.<\/p>\n<h3 data-path-to-node=\"22\">1. The Diceware Method (Passphrases)<\/h3>\n<p data-path-to-node=\"23\">Instead of a &#8220;password,&#8221; create a &#8220;passphrase.&#8221; This involves choosing four or five random, unrelated words and stringing them together.<\/p>\n<ul data-path-to-node=\"24\">\n<li>\n<p data-path-to-node=\"24,0,0\"><b data-path-to-node=\"24,0,0\" data-index-in-node=\"0\">Example:<\/b> <code data-path-to-node=\"24,0,0\" data-index-in-node=\"9\">Correct-Battery-Staple-Horse<\/code><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"24,1,0\"><b data-path-to-node=\"24,1,0\" data-index-in-node=\"0\">Why it works:<\/b> It is easy for a human to visualize, but the sheer length makes it mathematically improbable for a computer to guess via brute force.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"24,2,0\"><b data-path-to-node=\"24,2,0\" data-index-in-node=\"0\">Pro Tip:<\/b> Add a space or a hyphen between the words to increase security even further.<\/p>\n<\/li>\n<\/ul>\n<h3 data-path-to-node=\"25\">2. The Sentence-Acronym Method<\/h3>\n<p data-path-to-node=\"26\">Think of a sentence that is unique to your life but not publicly known. Then, take the first letter of every word and mix in some numbers and symbols.<\/p>\n<ul data-path-to-node=\"27\">\n<li>\n<p data-path-to-node=\"27,0,0\"><b data-path-to-node=\"27,0,0\" data-index-in-node=\"0\">Sentence:<\/b> &#8220;I bought my first blue car in 1998 for five thousand dollars!&#8221;<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"27,1,0\"><b data-path-to-node=\"27,1,0\" data-index-in-node=\"0\">Resulting Password:<\/b> <code data-path-to-node=\"27,1,0\" data-index-in-node=\"20\">Ibm1bcI98f$5tD!<\/code><\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"27,2,0\"><b data-path-to-node=\"27,2,0\" data-index-in-node=\"0\">Why it works:<\/b> To an outsider, the result looks like gibberish. To you, it\u2019s a story you can\u2019t forget.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"29\">How to Use a Password Manager: The Only Storage Solution You Need<\/h2>\n<p data-path-to-node=\"30\">If you follow the rule of having a unique, 15+ character password for every single account, you will eventually have hundreds of passwords. It is physically impossible to remember them all. This is where a <b data-path-to-node=\"30\" data-index-in-node=\"206\">Password Manager<\/b> becomes essential.<\/p>\n<h3 data-path-to-node=\"31\">What is a Password Manager?<\/h3>\n<p data-path-to-node=\"32\">A password manager is a digital vault that stores all your login credentials in an encrypted format. You only have to remember one &#8220;Master Password&#8221; to unlock the vault. When you visit a website, the manager automatically fills in your username and password for you.<\/p>\n<h3 data-path-to-node=\"33\">Top Benefits of Using a Manager<\/h3>\n<ul data-path-to-node=\"34\">\n<li>\n<p data-path-to-node=\"34,0,0\"><b data-path-to-node=\"34,0,0\" data-index-in-node=\"0\">Generation:<\/b> It can create random strings like <code data-path-to-node=\"34,0,0\" data-index-in-node=\"46\">xk9!Lp#2mQ99z<\/code> for you instantly.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"34,1,0\"><b data-path-to-node=\"34,1,0\" data-index-in-node=\"0\">Syncing:<\/b> Your passwords are available on your phone, laptop, and tablet.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"34,2,0\"><b data-path-to-node=\"34,2,0\" data-index-in-node=\"0\">Security Alerts:<\/b> Many managers will tell you if one of your passwords has been leaked in a data breach.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"34,3,0\"><b data-path-to-node=\"34,3,0\" data-index-in-node=\"0\">Zero-Knowledge Encryption:<\/b> The best managers are designed so that even the company providing the service cannot see your passwords.<\/p>\n<\/li>\n<\/ul>\n<h3 data-path-to-node=\"35\">Recommended Types of Managers<\/h3>\n<ol start=\"1\" data-path-to-node=\"36\">\n<li>\n<p data-path-to-node=\"36,0,0\"><b data-path-to-node=\"36,0,0\" data-index-in-node=\"0\">Cloud-Based (Best for most people):<\/b> Services like Bitwarden, 1Password, or Dashlane offer great ease of use across devices.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"36,1,0\"><b data-path-to-node=\"36,1,0\" data-index-in-node=\"0\">Local-Based (For the tech-savvy):<\/b> Tools like KeePass store your vault strictly on your own device, giving you total control.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"36,2,0\"><b data-path-to-node=\"36,2,0\" data-index-in-node=\"0\">Browser Managers:<\/b> While Chrome and Safari have built-in managers, dedicated apps are generally considered more secure and versatile.<\/p>\n<\/li>\n<\/ol>\n<h2 data-path-to-node=\"38\">Multi-Factor Authentication (MFA): Your Second Line of Defense<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1086\" src=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-1024x1024.png\" alt=\"How to Create and Store Strong Passwords (Without Forgetting Them)\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-1024x1024.png 1024w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-300x300.png 300w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-150x150.png 150w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-768x768.png 768w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k-1536x1536.png 1536w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_se3kf4se3kf4se3k.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p data-path-to-node=\"39\">Even the strongest password can be stolen through phishing or a sophisticated hack. This is why <b data-path-to-node=\"39\" data-index-in-node=\"96\">Multi-Factor Authentication (MFA)<\/b> is mandatory for any important account.<\/p>\n<p data-path-to-node=\"40\">MFA requires you to provide two forms of identification before granting access. This usually consists of:<\/p>\n<ol start=\"1\" data-path-to-node=\"41\">\n<li>\n<p data-path-to-node=\"41,0,0\">Something you <b data-path-to-node=\"41,0,0\" data-index-in-node=\"14\">know<\/b> (your password).<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"41,1,0\">Something you <b data-path-to-node=\"41,1,0\" data-index-in-node=\"14\">have<\/b> (your phone or a security key).<\/p>\n<\/li>\n<\/ol>\n<h3 data-path-to-node=\"42\">SMS vs. Authenticator Apps<\/h3>\n<ul data-path-to-node=\"43\">\n<li>\n<p data-path-to-node=\"43,0,0\"><b data-path-to-node=\"43,0,0\" data-index-in-node=\"0\">SMS Codes:<\/b> These are better than nothing, but they can be intercepted through &#8220;SIM swapping&#8221; attacks.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"43,1,0\"><b data-path-to-node=\"43,1,0\" data-index-in-node=\"0\">Authenticator Apps (Google Authenticator, Authy):<\/b> These generate a rotating code every 30 seconds on your device. They are much more secure than SMS.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"43,2,0\"><b data-path-to-node=\"43,2,0\" data-index-in-node=\"0\">Hardware Keys (YubiKey):<\/b> A physical USB device you must plug into your computer to log in. This is the &#8220;gold standard&#8221; for security.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"45\">Common Myths About Password Security<\/h2>\n<table data-path-to-node=\"46\">\n<thead>\n<tr>\n<td><strong>Myth<\/strong><\/td>\n<td><strong>Reality<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span data-path-to-node=\"46,1,0,0\"><b data-path-to-node=\"46,1,0,0\" data-index-in-node=\"0\">&#8220;I&#8217;m not famous, so hackers won&#8217;t target me.&#8221;<\/b><\/span><\/td>\n<td><span data-path-to-node=\"46,1,1,0\">Most hacks are performed by automated bots that target everyone indiscriminately.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"46,2,0,0\"><b data-path-to-node=\"46,2,0,0\" data-index-in-node=\"0\">&#8220;Changing my password every 30 days makes me safer.&#8221;<\/b><\/span><\/td>\n<td><span data-path-to-node=\"46,2,1,0\">Frequent changes often lead people to choose weaker passwords. Only change it if you suspect a breach.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"46,3,0,0\"><b data-path-to-node=\"46,3,0,0\" data-index-in-node=\"0\">&#8220;Writing passwords in a notebook is a terrible idea.&#8221;<\/b><\/span><\/td>\n<td><span data-path-to-node=\"46,3,1,0\">For many elderly or non-tech users, a physical notebook kept in a locked drawer at home is actually safer than using the same weak password everywhere.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 data-path-to-node=\"48\">What to Do if Your Password Is Stolen<\/h2>\n<p data-path-to-node=\"49\">If you receive an alert that your credentials have been compromised, you must act fast.<\/p>\n<ol start=\"1\" data-path-to-node=\"50\">\n<li>\n<p data-path-to-node=\"50,0,0\"><b data-path-to-node=\"50,0,0\" data-index-in-node=\"0\">Change the Master Password:<\/b> If your email or password manager is compromised, change that first.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"50,1,0\"><b data-path-to-node=\"50,1,0\" data-index-in-node=\"0\">Enable MFA Immediately:<\/b> If you haven&#8217;t already, turn it on to lock the hackers out.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"50,2,0\"><b data-path-to-node=\"50,2,0\" data-index-in-node=\"0\">Check &#8220;Have I Been Pwned&#8221;:<\/b> Visit this reputable website to see which of your accounts were involved in a leak.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"50,3,0\"><b data-path-to-node=\"50,3,0\" data-index-in-node=\"0\">Audit Your Financials:<\/b> Look for unauthorized charges on your credit cards or bank accounts.<\/p>\n<\/li>\n<\/ol>\n<h2 data-path-to-node=\"52\">Digital Hygiene: A Checklist for a Secure Year<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1083\" src=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-1024x1024.png\" alt=\"Digital Hygiene: A Checklist for a Secure Year\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-1024x1024.png 1024w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-300x300.png 300w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-150x150.png 150w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-768x768.png 768w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez-1536x1536.png 1536w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_5kez9o5kez9o5kez.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p data-path-to-node=\"53\">To keep your online life secure, perform this &#8220;digital checkup&#8221; once every six months:<\/p>\n<ul data-path-to-node=\"54\">\n<li>\n<p data-path-to-node=\"54,0,0\">[ ] <b data-path-to-node=\"54,0,0\" data-index-in-node=\"4\">Delete Unused Accounts:<\/b> If you don&#8217;t use a service anymore, delete the account entirely. This reduces your &#8220;attack surface.&#8221;<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"54,1,0\">[ ] <b data-path-to-node=\"54,1,0\" data-index-in-node=\"4\">Update Your Recovery Email:<\/b> Ensure your backup email and phone number are current.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"54,2,0\">[ ] <b data-path-to-node=\"54,2,0\" data-index-in-node=\"4\">Review App Permissions:<\/b> Check which apps have access to your Google or Facebook accounts and remove the ones you don&#8217;t recognize.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"54,3,0\">[ ] <b data-path-to-node=\"54,3,0\" data-index-in-node=\"4\">Update Your Software:<\/b> Security patches for your OS and browser often fix vulnerabilities that hackers use to steal passwords.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"56\">The Future of Passwords: Are We Moving to &#8220;Passkeys&#8221;?<\/h2>\n<p data-path-to-node=\"57\">The tech industry is slowly moving toward a password-less future using a technology called <b data-path-to-node=\"57\" data-index-in-node=\"91\">Passkeys<\/b>. Instead of typing a string of text, you use your phone\u2019s biometric data (FaceID or Fingerprint) to verify your identity.<\/p>\n<p data-path-to-node=\"58\">Major companies like Google, Apple, and Microsoft are already implementing this. While it might take a few years to become the standard, it promises a future where we no longer have to worry about &#8220;creating&#8221; or &#8220;forgetting&#8221; anything.<\/p>\n<h2 data-path-to-node=\"60\">Final Thoughts on Online Safety<\/h2>\n<p data-path-to-node=\"61\">Security is not a one-time event; it is a habit. By spending just 30 minutes today setting up a password manager and creating unique passphrases for your primary accounts (Email, Bank, Social Media), you are making yourself a much harder target for cybercriminals.<\/p>\n<p data-path-to-node=\"62\">Remember: <b data-path-to-node=\"62\" data-index-in-node=\"10\">Complexity is for computers, but length and strategy are for humans.<\/b> Take control of your digital keys today, and you\u2019ll never have to deal with the stress of a hacked account or a forgotten password again.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the modern digital landscape, your password is the only thing standing between a cybercriminal and your most sensitive information. Whether it is your bank account, your social media presence, or your private emails, the strength of your login credentials determines your level of safety. However, we face a common human dilemma: a password that &hellip;<\/p>\n","protected":false},"author":2,"featured_media":1085,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[130,124,426,402,427],"class_list":["post-1069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online-safety","tag-password","tag-passwords","tag-safe-storage","tag-security","tag-storage"],"_links":{"self":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/comments?post=1069"}],"version-history":[{"count":4,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1069\/revisions"}],"predecessor-version":[{"id":1089,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1069\/revisions\/1089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/media\/1085"}],"wp:attachment":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/media?parent=1069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/categories?post=1069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/tags?post=1069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}