{"id":1184,"date":"2026-05-06T08:41:37","date_gmt":"2026-05-06T08:41:37","guid":{"rendered":"https:\/\/melhoresdicas.net\/en\/?p=1184"},"modified":"2026-05-07T10:01:32","modified_gmt":"2026-05-07T10:01:32","slug":"how-browser-extensions-can-put-your-privacy-at-risk","status":"publish","type":"post","link":"https:\/\/melhoresdicas.net\/en\/how-browser-extensions-can-put-your-privacy-at-risk\/","title":{"rendered":"How Browser Extensions Can Put Your Privacy at Risk"},"content":{"rendered":"<div id=\"model-response-message-contentr_d1221b3a1ca90ba8\" class=\"markdown markdown-main-panel stronger enable-updated-hr-color\" dir=\"ltr\" aria-live=\"off\" aria-busy=\"false\">\n<p data-path-to-node=\"1\">We use them every day without a second thought. Whether it\u2019s a tool that finds discount codes while you shop, a dark mode enabler for your favorite websites, or a sophisticated AI assistant that helps you write emails, browser extensions have become an essential part of the modern web experience. They promise to make our lives easier, more productive, and more enjoyable with just a single click.<\/p>\n<p data-path-to-node=\"2\">However, beneath the surface of these &#8220;mini-apps&#8221; lies a complex and often unregulated ecosystem that can compromise your digital life. While most extensions are legitimate, the architecture of how they function creates a massive security loophole. In 2026, as our browsers become the primary portal for everything from banking to professional collaboration, understanding the risks associated with these tools is no longer optional\u2014it is a digital necessity.<\/p>\n<p data-path-to-node=\"3\">This comprehensive guide explores the multifaceted privacy risks of browser extensions, the &#8220;sleeper agents&#8221; hiding in your toolbar, and how you can reclaim your privacy without sacrificing functionality.<\/p>\n<h2 data-path-to-node=\"5\">The Hidden Infrastructure: How Extensions Interact with Your Data<\/h2>\n<p data-path-to-node=\"6\">To understand why extensions are risky, you first need to understand how they live inside your browser. Unlike a standalone app on your computer, a browser extension acts as a &#8220;middleman&#8221; between you and the websites you visit.<\/p>\n<p data-path-to-node=\"7\">When you install an extension, you often grant it the permission to <b data-path-to-node=\"7\" data-index-in-node=\"68\">&#8220;read and change all your data on the websites you visit.&#8221;<\/b> To a layperson, this might sound like a technical formality. In reality, it is the digital equivalent of giving a stranger a key to your house and permission to look over your shoulder while you open your mail.<\/p>\n<p data-path-to-node=\"8\">Because extensions run within the context of the webpage, they can see exactly what you see. If you are logged into your bank account, a malicious extension could technically &#8220;read&#8221; your balance. If you are typing a password, it can &#8220;log&#8221; your keystrokes. This &#8220;Man-in-the-Browser&#8221; positioning makes extensions one of the most effective tools for silent data exfiltration.<\/p>\n<h2 data-path-to-node=\"10\">From &#8220;Free&#8221; to &#8220;Product&#8221;: The Economics of Extension Data Harvesting<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1204\" src=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-1024x1024.png\" alt=\"\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-1024x1024.png 1024w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-300x300.png 300w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-150x150.png 150w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-768x768.png 768w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9-1536x1536.png 1536w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_qku91zqku91zqku9.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p data-path-to-node=\"11\">We have all heard the saying: <i data-path-to-node=\"11\" data-index-in-node=\"30\">&#8220;If you aren&#8217;t paying for the product, you are the product.&#8221;<\/i> This is nowhere more true than in the world of browser extensions. Developing and maintaining a high-quality extension costs time and money. If an extension is free and doesn&#8217;t show ads, how is the developer staying afloat?<\/p>\n<p data-path-to-node=\"12\">The answer is often <b data-path-to-node=\"12\" data-index-in-node=\"20\">data monetization<\/b>. Many developers sell your browsing history\u2014anonymized or not\u2014to data brokers. These brokers crave the granular details of your online behavior:<\/p>\n<ul data-path-to-node=\"13\">\n<li>\n<p data-path-to-node=\"13,0,0\">What products you look at but don\u2019t buy.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"13,1,0\">Which news sites you frequent.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"13,2,0\">How long you spend on specific social media profiles.<\/p>\n<\/li>\n<\/ul>\n<p data-path-to-node=\"14\">In a massive 2026 security audit, researchers discovered over 300 Chrome extensions that were actively leaking user data to third-party brokers. These extensions had been downloaded over 37 million times. The most disturbing part? Many of these were not &#8220;malware&#8221; in the traditional sense; they were simply functioning as designed\u2014harvesting data that the users had technically &#8220;permitted&#8221; them to take during installation.<\/p>\n<h2 data-path-to-node=\"16\">AI Extensions in 2026: The New Frontier of Privacy Risks<\/h2>\n<p data-path-to-node=\"17\">As we move deeper into 2026, AI-powered browser extensions have become the fastest-growing category in web stores. Tools that summarize articles, draft replies, or translate text in real-time are incredibly seductive. However, recent reports from security firms like LayerX indicate that <b data-path-to-node=\"17\" data-index-in-node=\"288\">AI extensions are 60% more likely to have security vulnerabilities<\/b> than standard ones.<\/p>\n<p data-path-to-node=\"18\">The risk with AI extensions is twofold:<\/p>\n<ol start=\"1\" data-path-to-node=\"19\">\n<li>\n<p data-path-to-node=\"19,0,0\"><b data-path-to-node=\"19,0,0\" data-index-in-node=\"0\">Direct Data Leakage:<\/b> When you use an AI tool to &#8220;summarize this page,&#8221; the extension often sends the entire content of that page to an external server (an LLM provider). If that page contains sensitive corporate data or personal medical info, that data is now living on a third-party server you don&#8217;t control.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"19,1,0\"><b data-path-to-node=\"19,1,0\" data-index-in-node=\"0\">Expanded Permissions:<\/b> AI extensions frequently request &#8220;scripting&#8221; and &#8220;cookie access&#8221; permissions. This allows them to inject code into pages or even steal session tokens, which could lead to account takeovers.<\/p>\n<\/li>\n<\/ol>\n<p data-path-to-node=\"20\">Many &#8220;fake&#8221; AI extensions have recently emerged, posing as official tools for Gemini, ChatGPT, or Grok. These &#8220;wrappers&#8221; often do nothing more than steal your login credentials or harvest your conversations for identity theft.<\/p>\n<h2 data-path-to-node=\"22\">The &#8220;Sleeper Agent&#8221; Threat: When Trusted Extensions Go Rogue<\/h2>\n<p data-path-to-node=\"23\">One of the most dangerous aspects of browser extensions is that a &#8220;good&#8221; extension can turn &#8220;bad&#8221; overnight. This is known in the cybersecurity world as a <b data-path-to-node=\"23\" data-index-in-node=\"155\">Sleeper Agent<\/b> attack or a supply-chain takeover.<\/p>\n<p data-path-to-node=\"24\">Here is how it typically happens:<\/p>\n<ol start=\"1\" data-path-to-node=\"25\">\n<li>\n<p data-path-to-node=\"25,0,0\">A developer creates a popular, helpful extension (like a simple weather tracker).<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"25,1,0\">The extension gains 100,000+ users and a 5-star rating.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"25,2,0\">The original developer, tired of maintaining the free tool, sells the extension to a third party for a significant sum.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"25,3,0\">The new owners push an &#8220;update&#8221; that includes malicious tracking code.<\/p>\n<\/li>\n<\/ol>\n<p data-path-to-node=\"26\">Because browsers often update extensions automatically in the background, you would never know that your trusted weather tool is now a spy. This happened famously with &#8220;The Great Suspender&#8221; a few years ago and continues to be a primary tactic for cybercriminals in 2026. The trust you placed in the original developer is essentially sold to the highest bidder.<\/p>\n<h2 data-path-to-node=\"28\">Manifest V3: How the New Standard Changes Your <a href=\"https:\/\/melhoresdicas.net\/en\/category\/online-safety\/\">Online Safety<\/a><\/h2>\n<p data-path-to-node=\"29\">You may have seen headlines about Google Chrome\u2019s transition to <b data-path-to-node=\"29\" data-index-in-node=\"64\">Manifest V3<\/b>. While this transition sparked controversy\u2014particularly regarding its impact on ad-blockers\u2014it was primarily designed to address the very security flaws we&#8217;ve discussed.<\/p>\n<h3 data-path-to-node=\"30\">Key Privacy Improvements in Manifest V3:<\/h3>\n<ul data-path-to-node=\"31\">\n<li>\n<p data-path-to-node=\"31,0,0\"><b data-path-to-node=\"31,0,0\" data-index-in-node=\"0\">Removal of Remotely Hosted Code:<\/b> In the past, an extension could &#8220;call home&#8221; and download new, unvetted code from a server. This was a massive security hole. Manifest V3 requires all code to be bundled within the extension itself, making it subject to the Chrome Web Store\u2019s review process.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"31,1,0\"><b data-path-to-node=\"31,1,0\" data-index-in-node=\"0\">Declarative Net Request API:<\/b> This limits the ability of extensions to &#8220;intercept&#8221; every single piece of data moving between your browser and the web. While it made ad-blocking more complex, it significantly reduced the chance of an extension acting as a &#8220;middleman&#8221; for your passwords and private messages.<\/p>\n<\/li>\n<\/ul>\n<p data-path-to-node=\"32\">While Manifest V3 isn&#8217;t a silver bullet, it represents a major step toward a more secure browser architecture. However, even with these safeguards, the user remains the final line of defense.<\/p>\n<h2 data-path-to-node=\"34\">High-Risk Permissions: Deciphering the Browser\u2019s Warning Labels<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1098\" src=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-1024x1024.png\" alt=\"Learn how to protect your privacy and avoid being tracked online\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-1024x1024.png 1024w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-300x300.png 300w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-150x150.png 150w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-768x768.png 768w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo-1536x1536.png 1536w, https:\/\/melhoresdicas.net\/en\/wp-content\/uploads\/2026\/05\/Gemini_Generated_Image_y9qo9py9qo9py9qo.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p data-path-to-node=\"35\">When you click &#8220;Add to Chrome&#8221; or &#8220;Add to Firefox,&#8221; a pop-up appears listing what the extension can do. Most people click &#8220;Add&#8221; without reading. To protect your privacy, you must learn to recognize high-risk permissions:<\/p>\n<ol start=\"1\" data-path-to-node=\"36\">\n<li>\n<p data-path-to-node=\"36,0,0\"><b data-path-to-node=\"36,0,0\" data-index-in-node=\"0\">&#8220;Read and change all your data on all websites&#8221;:<\/b> This is the &#8220;God Mode&#8221; of permissions. Unless the extension is an ad-blocker or a security suite, it probably doesn&#8217;t need this.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"36,1,0\"><b data-path-to-node=\"36,1,0\" data-index-in-node=\"0\">&#8220;Read your browsing history&#8221;:<\/b> This allows the extension to see every URL you&#8217;ve visited. This is pure gold for data brokers and advertisers.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"36,2,0\"><b data-path-to-node=\"36,2,0\" data-index-in-node=\"0\">&#8220;Manage your downloads&#8221;:<\/b> A malicious extension with this permission could potentially download malware onto your computer without your consent.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"36,3,0\"><b data-path-to-node=\"36,3,0\" data-index-in-node=\"0\">&#8220;Capture screenshots&#8221;:<\/b> This is often used by productivity tools, but in the wrong hands, it can be used to steal sensitive information displayed on your screen, like bank balances or private chats.<\/p>\n<\/li>\n<\/ol>\n<h2 data-path-to-node=\"38\">Red Flags to Watch Out For Before Clicking &#8220;Add to Chrome&#8221;<\/h2>\n<p data-path-to-node=\"39\">Before you install your next extension, perform a 30-second &#8220;sanity check.&#8221; Look for these red flags:<\/p>\n<ul data-path-to-node=\"40\">\n<li>\n<p data-path-to-node=\"40,0,0\"><b data-path-to-node=\"40,0,0\" data-index-in-node=\"0\">Vague Privacy Policies:<\/b> If the extension doesn&#8217;t have a clear, easy-to-read privacy policy, avoid it. In 2026, only about 28% of enterprise-used extensions have adequate privacy documentation.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"40,1,0\"><b data-path-to-node=\"40,1,0\" data-index-in-node=\"0\">Low User Count \/ High Rating:<\/b> Be wary of extensions with only a few hundred users but dozens of glowing 5-star reviews. These reviews are often faked to lure in victims.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"40,2,0\"><b data-path-to-node=\"40,2,0\" data-index-in-node=\"0\">Requests Irrelevant Permissions:<\/b> Why does a &#8220;Calculator&#8221; extension need to read your browsing history? If the permissions don&#8217;t match the functionality, it\u2019s a trap.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"40,3,0\"><b data-path-to-node=\"40,3,0\" data-index-in-node=\"0\">Anonymous Developers:<\/b> Check the developer&#8217;s name. Do they have a website? Do they have other reputable tools? If the developer is &#8220;John Doe&#8221; with zero digital footprint, think twice.<\/p>\n<\/li>\n<\/ul>\n<h2 data-path-to-node=\"42\">Case Study: The 2026 Data Broker Scandal<\/h2>\n<p data-path-to-node=\"43\">In early 2026, a team of independent researchers uncovered a massive operation involving over 280 extensions posing as &#8220;PDF Converters&#8221; and &#8220;Video Downloaders.&#8221; These extensions were found to be transmitting &#8220;Search Engine Results Pages&#8221; (SERPs) directly to servers in Eastern Europe.<\/p>\n<p data-path-to-node=\"44\">By capturing your search results, these extensions knew exactly what you were looking for\u2014whether it was medical advice, legal help, or financial planning. This data was then packaged and sold to &#8220;gray market&#8221; advertisers. This case highlighted that even &#8220;official&#8221; web stores struggle to keep up with the sheer volume of sophisticated, data-hungry extensions being uploaded daily.<\/p>\n<h2 data-path-to-node=\"46\">Security Checklist: How to Audit and Secure Your Browser Today<\/h2>\n<p data-path-to-node=\"47\">The best way to stay safe isn&#8217;t to stop using extensions entirely, but to manage them with a &#8220;Zero Trust&#8221; mindset. Follow this checklist to secure your browser:<\/p>\n<ol start=\"1\" data-path-to-node=\"48\">\n<li>\n<p data-path-to-node=\"48,0,0\"><b data-path-to-node=\"48,0,0\" data-index-in-node=\"0\">The &#8220;Audit of Ten&#8221;:<\/b> Open your extension manager (<code data-path-to-node=\"48,0,0\" data-index-in-node=\"49\">chrome:\/\/extensions<\/code> or <code data-path-to-node=\"48,0,0\" data-index-in-node=\"72\">about:addons<\/code>). If you have more than 10 extensions, you are likely over-exposed. Remove anything you haven&#8217;t used in the last 30 days.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"48,1,0\"><b data-path-to-node=\"48,1,0\" data-index-in-node=\"0\">Check Site Access:<\/b> Most modern browsers allow you to limit <i data-path-to-node=\"48,1,0\" data-index-in-node=\"59\">when<\/i> an extension can run. Instead of &#8220;On all sites,&#8221; change the setting to <b data-path-to-node=\"48,1,0\" data-index-in-node=\"135\">&#8220;On click&#8221;<\/b> for tools you only use occasionally. This prevents the extension from &#8220;watching&#8221; you when you aren&#8217;t using it.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"48,2,0\"><b data-path-to-node=\"48,2,0\" data-index-in-node=\"0\">Use &#8220;Incognito&#8221; Wisely:<\/b> By default, extensions are disabled in Incognito\/Private mode. Keep it that way. Use Incognito for sensitive tasks like banking to ensure no extension can &#8220;oversee&#8221; the session.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"48,3,0\"><b data-path-to-node=\"48,3,0\" data-index-in-node=\"0\">Update Manually (When Possible):<\/b> While auto-updates are convenient, checking the &#8220;What&#8217;s New&#8221; section of an extension update can sometimes tip you off to a change in ownership or a sudden request for new permissions.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"48,4,0\"><b data-path-to-node=\"48,4,0\" data-index-in-node=\"0\">Look for the &#8220;Featured&#8221; Badge:<\/b> In the Chrome Web Store, look for the &#8220;Featured&#8221; badge or the &#8220;Verified&#8221; icon. These aren&#8217;t perfect, but they indicate that the developer has met a higher standard of security and transparency.<\/p>\n<\/li>\n<\/ol>\n<h2 data-path-to-node=\"50\">Balancing Utility and Safety<\/h2>\n<p data-path-to-node=\"51\">Browser extensions are a double-edged sword. They offer incredible power to customize and enhance our web experience, but that power comes at a significant privacy cost. In an era where &#8220;data is the new oil,&#8221; your browsing habits are a valuable commodity that hackers and brokers are desperate to exploit.<\/p>\n<p data-path-to-node=\"52\">By being mindful of permissions, staying skeptical of &#8220;free&#8221; tools, and performing regular audits of your browser, you can enjoy the benefits of extensions without turning your digital life into an open book. Remember: in the world of online security, <b data-path-to-node=\"52\" data-index-in-node=\"252\">convenience is often the enemy of privacy.<\/b> Choose your tools wisely.<\/p>\n<h3 data-path-to-node=\"54\"><b data-path-to-node=\"54\" data-index-in-node=\"0\">Quick Privacy Check: Does Your Favorite Extension Really Need That Permission?<\/b><\/h3>\n<table data-path-to-node=\"55\">\n<thead>\n<tr>\n<td><strong>Extension Type<\/strong><\/td>\n<td><strong>Expected Permission<\/strong><\/td>\n<td><strong>Red Flag Permission<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span data-path-to-node=\"55,1,0,0\"><b data-path-to-node=\"55,1,0,0\" data-index-in-node=\"0\">Ad Blocker<\/b><\/span><\/td>\n<td><span data-path-to-node=\"55,1,1,0\">Read\/Change Data on All Sites<\/span><\/td>\n<td><span data-path-to-node=\"55,1,2,0\">Manage Downloads<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"55,2,0,0\"><b data-path-to-node=\"55,2,0,0\" data-index-in-node=\"0\">Price Tracker<\/b><\/span><\/td>\n<td><span data-path-to-node=\"55,2,1,0\">Read Data on Specific Shopping Sites<\/span><\/td>\n<td><span data-path-to-node=\"55,2,2,0\">Read Browsing History<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"55,3,0,0\"><b data-path-to-node=\"55,3,0,0\" data-index-in-node=\"0\">Dark Mode<\/b><\/span><\/td>\n<td><span data-path-to-node=\"55,3,1,0\">Read\/Change Data on All Sites<\/span><\/td>\n<td><span data-path-to-node=\"55,3,2,0\">Capture Screenshots<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"55,4,0,0\"><b data-path-to-node=\"55,4,0,0\" data-index-in-node=\"0\">VPN \/ Proxy<\/b><\/span><\/td>\n<td><span data-path-to-node=\"55,4,1,0\">Proxy Settings<\/span><\/td>\n<td><span data-path-to-node=\"55,4,2,0\">Read Your Emails<\/span><\/td>\n<\/tr>\n<tr>\n<td><span data-path-to-node=\"55,5,0,0\"><b data-path-to-node=\"55,5,0,0\" data-index-in-node=\"0\">AI Writing Aid<\/b><\/span><\/td>\n<td><span data-path-to-node=\"55,5,1,0\">Scripting (on specific sites)<\/span><\/td>\n<td><span data-path-to-node=\"55,5,2,0\">Read Data on All Sites<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-path-to-node=\"57\">\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We use them every day without a second thought. Whether it\u2019s a tool that finds discount codes while you shop, a dark mode enabler for your favorite websites, or a sophisticated AI assistant that helps you write emails, browser extensions have become an essential part of the modern web experience. They promise to make our &hellip;<\/p>\n","protected":false},"author":2,"featured_media":1201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[34,36,466,463,465,464,142],"class_list":["post-1184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online-safety","tag-app","tag-apps","tag-browser","tag-browser-extensions","tag-data","tag-extensions","tag-privacy"],"_links":{"self":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/comments?post=1184"}],"version-history":[{"count":5,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1184\/revisions"}],"predecessor-version":[{"id":1227,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/posts\/1184\/revisions\/1227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/media\/1201"}],"wp:attachment":[{"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/media?parent=1184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/categories?post=1184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melhoresdicas.net\/en\/wp-json\/wp\/v2\/tags?post=1184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}