{"id":6365,"date":"2025-05-27T10:00:37","date_gmt":"2025-05-27T10:00:37","guid":{"rendered":"https:\/\/www.urudata.com\/?p=6365"},"modified":"2026-01-08T16:53:36","modified_gmt":"2026-01-08T16:53:36","slug":"analizando-datos-sensibles","status":"publish","type":"post","link":"https:\/\/urudata.com\/en\/analizando-datos-sensibles\/","title":{"rendered":"Analyzing Sensitive Data"},"content":{"rendered":"<p>Although we create a secure environment when analyzing our clients' data \u2014 both from a technological standpoint (data encrypted at rest and in transit, hardened devices, perimeter security, and DLP tools, among others) and a legal one (NDAs with the company and involved technicians) \u2014 there are additional science- and technology-based measures that provide extra layers of security, and those are the ones we propose to review in this article.<br><br>The advice is to always remember the city of Gondor and its \"rings of defense\": if one barrier is breached, there must be another containment barrier ready to stop the attack or leak.<br><br>The great promise for protecting this type of data is \u201chomomorphic encryption\u201d (encryption that allows performing operations on encrypted data and then decrypting the result), but it is far from being usable beyond some specific cases with algorithms that are only partially homomorphic. Therefore, we don\u2019t use it nor waste time trying to use it.<br><br>The first practical case I want to discuss with you is differential privacy. Suppose we are analyzing very sensitive data, like a non-anonymous survey, or data that can be deanonymized with a correlation database.<br><br>A small correlation database, as simple as an old bank statement or phone data (in my case, I worked a long time with tokenized phone data), are good candidates for deanonymizing data. Just creating a recognizable pattern in the data is enough; for example, calling a number every 2 hours and hanging up after the first 5 seconds \u2014 doing this four times creates a pattern that surely allows individualizing that number in a tokenized (anonymized) database and from there triggering a network effect (who the person calls the most, and so on).<br><br>So, just tokenizing and adding some entropy to the data is not enough, but fortunately, we can apply differential privacy.<br>Let\u2019s suppose a very simple case: survey analysis. Suppose the worst case \u2014 the surveys, although made anonymous, have been deanonymized. How do we protect ourselves?<br><br>We will protect the question \u201cDo I feel comfortable with my boss?\u201d, which has yes or no answers. So, we take the survey data and leave half of it as it is. For the other half, for each answer, we flip a coin: if it\u2019s heads, we leave the data as is; if it\u2019s tails, we invert the value.<\/p>\n\n\n\n<p>This way, someone studying the survey knows that 75% of the data is true and 25% is inverted. The statistical result remains significant, but if someone takes a survey, deanonymizes it, and says \u201cThis answer is Pablo\u2019s!!\u201d they won\u2019t know my real answer, since the data is true with a 75% probability and false with a 25% probability. In this way, we have protected the privacy of the person who completed the survey.<br><br>Now, let\u2019s analyze another technique, and for that, let\u2019s take this to the extreme: suppose two rival companies competing \u2014 say, two local banks \u2014 competing but facing a shared challenge: stopping credit card fraud. It is obvious that if someone has data from both banks, they can train a better fraud detection algorithm, and the customers of both banks would be happier, freer, and would trust both banks more (this is a clear indicator that what we want to do is ethical since it increases customers\u2019 trust in banks and their well-being and freedom).<br><br>So, how can we train a fraud detection algorithm between Bank A and Bank B when they don\u2019t trust each other even a little?<br><br>We previously talked about encryption at rest (encrypted disk) and in transit (encrypted transport with TLS, Transport Layer Security), but there is a third type of encryption: encryption of the computer\u2019s memory and graphics card, known as encrypted processing, technically called a \u201csecure enclave.\u201d<br><br>The process works like this:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An algorithm is created, for example, training a machine learning model that reads files and produces a trained model.<\/li>\n\n\n\n<li>That algorithm (the entire working environment) is digitally signed.<\/li>\n\n\n\n<li>Specialists from both banks review and approve the environment and are assured it cannot be altered because any alteration invalidates the digital signature.<\/li>\n\n\n\n<li>Each bank encrypts its data.<\/li>\n\n\n\n<li>The system starts running and requests the key to access the encrypted data from each bank. They validate the digital signature of the algorithm and verify that it is running in a secure enclave (clouds and secure enclave frameworks have a service known as an \u201cattestation service\u201d that confirms it is running in an encrypted environment). If validated, they provide the key to read their part of the data.<\/li>\n\n\n\n<li>It doesn\u2019t matter if someone has access to the machine\u2019s hypervisor, is the OS admin, or has unrestricted access to the server console; even if they do a memory dump, they will never be able to see what is running inside the secure enclave because all memory and processor access are encrypted.<\/li>\n\n\n\n<li>The algorithm runs, trains, delivers a result, and the entire environment disappears. Thus, when it finishes running, each bank has a better fraud model but has never seen\u2014and will never be able to see\u2014the competitor\u2019s data.<br><br>These models are already widely used in medicine, to send data between countries for diagnostics while eliminating the possibility that the data is not only observed but also never used for any other purpose, since once the diagnostic execution ends, the environment and data are no longer usable.<br><br>Finally, I invite you to rethink your data analytics processes, because beyond common tools, science (as in the case of differential privacy) or technology (as in confidential computing) removes barriers and makes it possible to use data with adequate levels of protection and trust \u2014 even if we don\u2019t trust the party on the other side one bit.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Si bien al analizar datos de nuestros clientes generamos un contexto seguro, tanto tecnol\u00f3gico (datos encriptados en reposo, en la transmisi\u00f3n, equipos con \u201chardening\u201d de seguridad, seguridad perimetral y herramientas de DLP, entre otros), como legal (NDA con la empresa y los t\u00e9cnicos involucrados), existen otras medidas, basadas en ciencia y\/o tecnolog\u00eda que proveen capas [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":6366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-6365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":{"bajada":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Urudata &gt; Analizando datos sensibles<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudata.com\/en\/analizando-datos-sensibles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urudata &gt; Analizando datos sensibles\" \/>\n<meta property=\"og:description\" content=\"Si bien al analizar datos de nuestros clientes generamos un contexto seguro, tanto tecnol\u00f3gico (datos encriptados en reposo, en la transmisi\u00f3n, equipos con \u201chardening\u201d de seguridad, seguridad perimetral y herramientas de DLP, entre otros), como legal (NDA con la empresa y los t\u00e9cnicos involucrados), existen otras medidas, basadas en ciencia y\/o tecnolog\u00eda que proveen capas [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudata.com\/en\/analizando-datos-sensibles\/\" \/>\n<meta property=\"og:site_name\" content=\"Urudata\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/urudatasa\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-27T10:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-08T16:53:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1055\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pablo Garc\u00eda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pablo Garc\u00eda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/\"},\"author\":{\"name\":\"Pablo Garc\u00eda\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/a61afb2bdf6d2a93f173799f5b0f6f90\"},\"headline\":\"Analizando datos sensibles\",\"datePublished\":\"2025-05-27T10:00:37+00:00\",\"dateModified\":\"2026-01-08T16:53:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/\"},\"wordCount\":1108,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/\",\"url\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/\",\"name\":\"Urudata > Analizando datos sensibles\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1\",\"datePublished\":\"2025-05-27T10:00:37+00:00\",\"dateModified\":\"2026-01-08T16:53:36+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/analizando-datos-sensibles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1\",\"width\":2048,\"height\":1055},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"name\":\"Urudata\",\"description\":\"Integramos soluciones innovadoras\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudata.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\",\"name\":\"Urudata\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"width\":512,\"height\":123,\"caption\":\"Urudata\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/urudatasa\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/a61afb2bdf6d2a93f173799f5b0f6f90\",\"name\":\"Pablo Garc\u00eda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g\",\"caption\":\"Pablo Garc\u00eda\"},\"description\":\"Director Investigaci\u00f3n y Desarrollo (I+D)\",\"url\":\"https:\\\/\\\/urudata.com\\\/en\\\/author\\\/pablogarcia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Urudata > Analizando datos sensibles","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudata.com\/en\/analizando-datos-sensibles\/","og_locale":"en_US","og_type":"article","og_title":"Urudata > Analizando datos sensibles","og_description":"Si bien al analizar datos de nuestros clientes generamos un contexto seguro, tanto tecnol\u00f3gico (datos encriptados en reposo, en la transmisi\u00f3n, equipos con \u201chardening\u201d de seguridad, seguridad perimetral y herramientas de DLP, entre otros), como legal (NDA con la empresa y los t\u00e9cnicos involucrados), existen otras medidas, basadas en ciencia y\/o tecnolog\u00eda que proveen capas [&hellip;]","og_url":"https:\/\/urudata.com\/en\/analizando-datos-sensibles\/","og_site_name":"Urudata","article_publisher":"https:\/\/www.facebook.com\/urudatasa","article_published_time":"2025-05-27T10:00:37+00:00","article_modified_time":"2026-01-08T16:53:36+00:00","og_image":[{"width":2048,"height":1055,"url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","type":"image\/jpeg"}],"author":"Pablo Garc\u00eda","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pablo Garc\u00eda","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/#article","isPartOf":{"@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/"},"author":{"name":"Pablo Garc\u00eda","@id":"https:\/\/urudata.com\/#\/schema\/person\/a61afb2bdf6d2a93f173799f5b0f6f90"},"headline":"Analizando datos sensibles","datePublished":"2025-05-27T10:00:37+00:00","dateModified":"2026-01-08T16:53:36+00:00","mainEntityOfPage":{"@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/"},"wordCount":1108,"commentCount":0,"publisher":{"@id":"https:\/\/urudata.com\/#organization"},"image":{"@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudata.com\/analizando-datos-sensibles\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/","url":"https:\/\/urudata.com\/analizando-datos-sensibles\/","name":"Urudata > Analizando datos sensibles","isPartOf":{"@id":"https:\/\/urudata.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/#primaryimage"},"image":{"@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","datePublished":"2025-05-27T10:00:37+00:00","dateModified":"2026-01-08T16:53:36+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudata.com\/analizando-datos-sensibles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/analizando-datos-sensibles\/#primaryimage","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","width":2048,"height":1055},{"@type":"WebSite","@id":"https:\/\/urudata.com\/#website","url":"https:\/\/urudata.com\/","name":"Urudata","description":"Integramos soluciones innovadoras","publisher":{"@id":"https:\/\/urudata.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudata.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudata.com\/#organization","name":"Urudata","url":"https:\/\/urudata.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","width":512,"height":123,"caption":"Urudata"},"image":{"@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/urudatasa"]},{"@type":"Person","@id":"https:\/\/urudata.com\/#\/schema\/person\/a61afb2bdf6d2a93f173799f5b0f6f90","name":"Pablo Garc\u00eda","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23c6f9a7cf6951bc5e7892954d2a789d1703daa1f0fc6d7cf2b926f7c101f285?s=96&d=simple_local_avatar&r=g","caption":"Pablo Garc\u00eda"},"description":"Director of Research and Development (R&amp;D)","url":"https:\/\/urudata.com\/en\/author\/pablogarcia\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Purearts-Promo_Crown0fGondor_015_814bfd60-061d-4f20-a46a-172a68afa9b3-e1748342115933.jpg?fit=2048%2C1055&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/comments?post=6365"}],"version-history":[{"count":10,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6365\/revisions"}],"predecessor-version":[{"id":6378,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6365\/revisions\/6378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media\/6366"}],"wp:attachment":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media?parent=6365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/categories?post=6365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/tags?post=6365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}