{"id":2114,"date":"2025-06-09T19:47:25","date_gmt":"2025-06-09T19:47:25","guid":{"rendered":"https:\/\/elink.cat\/blog\/?p=2114"},"modified":"2025-06-18T14:11:13","modified_gmt":"2025-06-18T14:11:13","slug":"la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers","status":"publish","type":"post","link":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/","title":{"rendered":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lectura: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minuts<\/span><\/span><p class=\"p2\">Fa nom\u00e9s uns mesos, pensar que qualsevol persona sense coneixements t\u00e8cnics pogu\u00e9s crear codi malici\u00f3s sonava a ci\u00e8ncia-ficci\u00f3. Per\u00f2 aix\u00f2 ja \u00e9s una realitat. El recent fenomen conegut com <i>vibe hacking<\/i>, explicat per <a href=\"https:\/\/www.wired.com\/story\/youre-not-ready-for-ai-hacker-agents\/\"><i>Wired<\/i><\/a>, ens mostra com la IA ha canviat radicalment les regles del joc en el m\u00f3n del cibercrim.<\/p>\n<h3><b>El cibercrim s\u2019ha democratitzat<\/b><\/h3>\n<p class=\"p1\">Abans, crear un malware efectiu o detectar vulnerabilitats complexes era feina de grups ben organitzats o individus molt qualificats. Ara, amb eines com WormGPT o FraudGPT, qualsevol persona pot generar missatges de phishing cre\u00efbles o scripts d\u2019atac simplement escrivint una descripci\u00f3 a un xat. L\u2019acc\u00e9s \u00e9s barat (com ja vam veure amb Xanthorox), i el risc \u00e9s alt\u00edssim.<\/p>\n<p class=\"p1\">Aquest fenomen rep el nom de <strong><i>vibe hacking<\/i><\/strong>: una nova generaci\u00f3 de delinq\u00fcents digitals guiats per l\u2019est\u00e8tica i la facilitat d\u2019\u00fas, no per l\u2019experi\u00e8ncia t\u00e8cnica. El <i>vibe hacking<\/i> no busca nom\u00e9s aprofitar-se de vulnerabilitats t\u00e8cniques, sin\u00f3 jugar amb les emocions, la confian\u00e7a i la percepci\u00f3 dels usuaris. Utilitza eines generatives per crear missatges o entorns digitals \u2014webs, v\u00eddeos, perfils falsos o \u00e0udios\u2014 que transmeten una sensaci\u00f3 de familiaritat, urg\u00e8ncia o autoritat, fent m\u00e9s f\u00e0cil que la v\u00edctima caigui en l\u2019engany. Per exemple, un correu aparentment informal que sembla d\u2019un company de feina, per\u00f2 que inclou un enlla\u00e7 malici\u00f3s, o una trucada amb veu sint\u00e8tica que imita la veu d&#8217;alg\u00fa de la feina o d&#8217;un familiar.<\/p>\n<p class=\"p1\">Aquesta manipulaci\u00f3 emocional i est\u00e8tica \u00e9s molt m\u00e9s efica\u00e7 que els atacs cl\u00e0ssics, perqu\u00e8 no es basa tant en vulnerar sistemes com en vulnerar persones. I com que les eines per fer-ho s\u00f3n cada vegada m\u00e9s accessibles, l\u2019escletxa entre cibercriminals i ciutadans comuns es fa m\u00e9s estreta, fent molt m\u00e9s dif\u00edcil detectar qui hi ha realment darrere d\u2019un atac.<\/p>\n<h3><b>Agents d\u2019IA al servei del delicte<\/b><\/h3>\n<p class=\"p2\">No nom\u00e9s s\u00f3n usuaris sense experi\u00e8ncia els que s\u2019hi aprofiten. Tamb\u00e9 hi ha hackers avan\u00e7ats que estan fent servir <span class=\"s2\"><b>agents aut\u00f2noms d\u2019IA<\/b><\/span>, com els anomenats <span class=\"s2\"><b>XBOW<\/b><\/span>, per automatitzar l\u2019explotaci\u00f3 de vulnerabilitats, cercar punts febles a escala massiva o fins i tot generar nous atacs de tipus zero-day.<\/p>\n<p class=\"p2\">Aquests agents poden actuar de forma cont\u00ednua, sense descans, i millorar-se a si mateixos mentre aprenen del sistema que ataquen. \u00c9s com tenir un ex\u00e8rcit de hackers digitals treballant dia i nit, i amb un cost pr\u00e0cticament zero.<\/p>\n<h3><b>La resposta: una nova ciberseguretat<\/b><\/h3>\n<p class=\"p2\">Aquest escenari no nom\u00e9s exigeix millors firewalls o antivirus. Cal una transformaci\u00f3 radical de com pensem la seguretat digital. Les empreses han de comen\u00e7ar a adoptar tamb\u00e9 IA defensiva: sistemes que monitoritzin en temps real, que puguin detectar patrons estranys abans que l\u2019amena\u00e7a es concreti i que reaccionin de manera aut\u00f2noma.<\/p>\n<p class=\"p2\">Tamb\u00e9 cal invertir en <span class=\"s2\"><b>formaci\u00f3 i conscienciaci\u00f3<\/b><\/span>, tant a nivell corporatiu com institucional. Si la ciberdelinq\u00fc\u00e8ncia es democratitza, la cultura de la ciberseguretat tamb\u00e9 ho hauria de fer.<\/p>\n<h3><b>Una cursa que acaba de comen\u00e7ar<\/b><\/h3>\n<p class=\"p2\">El 2024 hem vist com la IA es consolidava com a eina productiva en moltes ind\u00fastries. El 2025, per\u00f2, sembla que ser\u00e0 l\u2019any en qu\u00e8 la lluita pel control d\u2019aquesta tecnologia marcar\u00e0 una frontera clara entre innovaci\u00f3 i risc. La cursa entre atacants i defensors ser\u00e0 constant, i les empreses que no s\u2019hi adaptin, senzillament, quedaran exposades.<\/p>\n<p class=\"p2\">La IA no \u00e9s ni bona ni dolenta. \u00c9s potent. I com tota eina poderosa, pot transformar o destruir, segons qui la fa servir i amb quin prop\u00f2sit. Ara m\u00e9s que mai, el m\u00f3n empresarial necessita estar preparat per aquest nou escenari, on el cibercrim \u00e9s m\u00e9s accessible i autom\u00e0tic que mai.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lectura: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minuts<\/span><\/span>Fa nom\u00e9s uns mesos, pensar que qualsevol persona sense coneixements t\u00e8cnics pogu\u00e9s crear codi malici\u00f3s sonava a ci\u00e8ncia-ficci\u00f3. Per\u00f2 aix\u00f2 ja \u00e9s una realitat. El recent fenomen conegut com vibe<\/p>\n","protected":false},"author":1,"featured_media":2118,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","breadcrumbs_single_post":"","page_title_panel":"","breadcrumbs_single_page":"","single_page_alignment":"","single_page_margin":"","page_structure_type":"","content_style_source":"","content_style":"","blog_post_streched_ed":"","blog_page_streched_ed":"","has_transparent_header":"","disable_transparent_header":"","vertical_spacing_source":"","content_area_spacing":"","single_post_content_background":"","single_page_content_background":"","single_post_boxed_content_spacing":"","single_page_boxed_content_spacing":"","single_post_content_boxed_radius":"","single_page_content_boxed_radius":"","disable_featured_image":"","disable_post_tags":"","disable_author_box":"","disable_posts_navigation":"","disable_comments":"","disable_related_posts":"","disable_header":"","disable_footer":"","footnotes":""},"categories":[28],"tags":[],"class_list":["post-2114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risc-i-etica","rishi-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat\" \/>\n<meta property=\"og:description\" content=\"Temps de lectura:  2 minutsFa nom\u00e9s uns mesos, pensar que qualsevol persona sense coneixements t\u00e8cnics pogu\u00e9s crear codi malici\u00f3s sonava a ci\u00e8ncia-ficci\u00f3. Per\u00f2 aix\u00f2 ja \u00e9s una realitat. El recent fenomen conegut com vibe\" \/>\n<meta property=\"og:url\" content=\"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Elinkcat\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-09T19:47:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T14:11:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u00d2scar Junyent\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u00d2scar Junyent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/\"},\"author\":{\"name\":\"\u00d2scar Junyent\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/person\\\/13577ee4b0279d498b46e86c8798afe2\"},\"headline\":\"La nova amena\u00e7a: quan la IA es posa al servei dels hackers\",\"datePublished\":\"2025-06-09T19:47:25+00:00\",\"dateModified\":\"2025-06-18T14:11:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/vibe-hacking.jpeg\",\"articleSection\":[\"Riscos, \u00e8tica i ciberseguretat\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/\",\"name\":\"La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/vibe-hacking.jpeg\",\"datePublished\":\"2025-06-09T19:47:25+00:00\",\"dateModified\":\"2025-06-18T14:11:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/vibe-hacking.jpeg\",\"contentUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/vibe-hacking.jpeg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La nova amena\u00e7a: quan la IA es posa al servei dels hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\",\"name\":\"Blog Elinkcat\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/elink.cat\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#organization\",\"name\":\"Blog Elinkcat\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-elinkcat-default-light-bg.png\",\"contentUrl\":\"https:\\\/\\\/elink.cat\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-elinkcat-default-light-bg.png\",\"width\":1278,\"height\":127,\"caption\":\"Blog Elinkcat\"},\"image\":{\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/elink.cat\\\/blog\\\/#\\\/schema\\\/person\\\/13577ee4b0279d498b46e86c8798afe2\",\"name\":\"\u00d2scar Junyent\",\"sameAs\":[\"https:\\\/\\\/elink.cat\\\/blog\"],\"url\":\"https:\\\/\\\/elink.cat\\\/blog\\\/author\\\/ojunyentelink-cat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/","og_locale":"ca_ES","og_type":"article","og_title":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat","og_description":"Temps de lectura:  2 minutsFa nom\u00e9s uns mesos, pensar que qualsevol persona sense coneixements t\u00e8cnics pogu\u00e9s crear codi malici\u00f3s sonava a ci\u00e8ncia-ficci\u00f3. Per\u00f2 aix\u00f2 ja \u00e9s una realitat. El recent fenomen conegut com vibe","og_url":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/","og_site_name":"Blog Elinkcat","article_published_time":"2025-06-09T19:47:25+00:00","article_modified_time":"2025-06-18T14:11:13+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg","type":"image\/jpeg"}],"author":"\u00d2scar Junyent","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u00d2scar Junyent","Est. reading time":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#article","isPartOf":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/"},"author":{"name":"\u00d2scar Junyent","@id":"https:\/\/elink.cat\/blog\/#\/schema\/person\/13577ee4b0279d498b46e86c8798afe2"},"headline":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers","datePublished":"2025-06-09T19:47:25+00:00","dateModified":"2025-06-18T14:11:13+00:00","mainEntityOfPage":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/"},"wordCount":659,"publisher":{"@id":"https:\/\/elink.cat\/blog\/#organization"},"image":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg","articleSection":["Riscos, \u00e8tica i ciberseguretat"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/","url":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/","name":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers - Blog Elinkcat","isPartOf":{"@id":"https:\/\/elink.cat\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#primaryimage"},"image":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg","datePublished":"2025-06-09T19:47:25+00:00","dateModified":"2025-06-18T14:11:13+00:00","breadcrumb":{"@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#primaryimage","url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg","contentUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2025\/06\/vibe-hacking.jpeg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/elink.cat\/blog\/la-nova-amenaca-quan-la-ia-es-posa-al-servei-dels-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/elink.cat\/blog\/"},{"@type":"ListItem","position":2,"name":"La nova amena\u00e7a: quan la IA es posa al servei dels hackers"}]},{"@type":"WebSite","@id":"https:\/\/elink.cat\/blog\/#website","url":"https:\/\/elink.cat\/blog\/","name":"Blog Elinkcat","description":"","publisher":{"@id":"https:\/\/elink.cat\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/elink.cat\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/elink.cat\/blog\/#organization","name":"Blog Elinkcat","url":"https:\/\/elink.cat\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/elink.cat\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/01\/cropped-elinkcat-default-light-bg.png","contentUrl":"https:\/\/elink.cat\/blog\/wp-content\/uploads\/2024\/01\/cropped-elinkcat-default-light-bg.png","width":1278,"height":127,"caption":"Blog Elinkcat"},"image":{"@id":"https:\/\/elink.cat\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/elink.cat\/blog\/#\/schema\/person\/13577ee4b0279d498b46e86c8798afe2","name":"\u00d2scar Junyent","sameAs":["https:\/\/elink.cat\/blog"],"url":"https:\/\/elink.cat\/blog\/author\/ojunyentelink-cat\/"}]}},"_links":{"self":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":3,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"predecessor-version":[{"id":2117,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions\/2117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/media\/2118"}],"wp:attachment":[{"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elink.cat\/blog\/wp-json\/wp\/v2\/tags?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}