{"id":1022,"date":"2026-02-07T13:42:13","date_gmt":"2026-02-07T13:42:13","guid":{"rendered":"https:\/\/spyworld.world\/?p=1022"},"modified":"2026-02-07T13:45:45","modified_gmt":"2026-02-07T13:45:45","slug":"how-to-hack-someones-phone-2026-remote-methods","status":"publish","type":"post","link":"https:\/\/spyworld.world\/es\/how-to-hack-someones-phone-2026-remote-methods\/","title":{"rendered":"How to &#8216;Hack&#8217; a Phone Remotely in 2026 \u2013 Legal &amp; Safe Methods Explained"},"content":{"rendered":"<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\" alt=\"how to hack someones phone 2026\" class=\"wp-image-858\" style=\"aspect-ratio:1.4992820977858385;width:532px;height:auto\" srcset=\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png 1024w, https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13-300x200.png 300w, https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13-768x512.png 768w, https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13-18x12.png 18w, https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13-600x400.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><p><strong>Updated February 2026<\/strong> \u2013 The search for &#8220;how to hack someone&#8217;s phone&#8221; 2026 is one of the most common queries in 2026. Most online tutorials are either scams, malware traps, or methods that were patched years ago.How to hack someones phone 2026<\/p>\n\n<p>The reality: true unauthorized &#8220;hacking&#8221; (breaking into a locked phone with zero access) is nearly impossible for regular people in 2026 due to strong encryption, 2FA, biometric locks, and rapid security updates. However, there are still **legal and semi-legal remote methods** that work effectively \u2014 especially when using cloud backups, linked devices, or authorized access points.<\/p>\n\n<h2>What Actually Works in 2026 (Remote &#038; Legal Methods)<\/h2>\n\n<h3>1. Linked Devices \u2013 The Official Mirror Method<\/h3>\n<p>Most major apps allow linking a second device to view messages, calls, media, and activity in real-time.<\/p>\n<ul>\n  <li>WhatsApp, Telegram, Instagram, Snapchat, Discord, Facebook Messenger all support this<\/li>\n  <li>Steps: On target phone \u2192 Settings \u2192 Linked Devices \u2192 Link a Device \u2192 Scan QR code from your phone\/computer<\/li>\n  <li>After initial link, no further notification is sent to the target<\/li>\n<\/ul>\n\n<h3>2. Cloud Backup Sync (iCloud \/ Google Drive)<\/h3>\n<p>If the phone has automatic backups enabled, you can access chat history, photos, call logs, and voice messages via restore.<\/p>\n<ul>\n  <li>iPhone: Settings \u2192 Chats \u2192 Chat Backup \u2192 iCloud<\/li>\n  <li>Android: Settings \u2192 Chats \u2192 Chat Backup \u2192 Google Drive<\/li>\n  <li>Tools like Dr.Fone or iMyFone can extract data from backup files without full phone restore<\/li>\n<\/ul>\n\n<h3>3. Notification History &#038; Previews (Android Only)<\/h3>\n<p>Android saves notification content \u2014 including incoming WhatsApp\/Snapchat messages \u2014 even if later deleted.<\/p>\n<ul>\n  <li>Settings \u2192 Notifications \u2192 Notification History \u2192 Enable<\/li>\n  <li>Read previews of messages, calls, and voice notes<\/li>\n<\/ul>\n\n<h3>4. Data Request &#038; Export (Built-in App Features)<\/h3>\n<p>Apps like Instagram, Facebook, and Telegram let you request your own data archive.<\/p>\n<ul>\n  <li>Instagram: Profile \u2192 Your Activity \u2192 Download Your Information \u2192 Messages<\/li>\n  <li>Telegram: Settings \u2192 Export Telegram Data<\/li>\n  <li>Facebook: Settings \u2192 Your Facebook Information \u2192 Download Your Information<\/li>\n<\/ul>\n\n<h2>Important Legal &#038; Safety Warning<\/h2>\n<div class=\"disclaimer\" style=\"background:#1a1a1a; padding:1.5rem; border-radius:8px; margin:2rem 0;\">\n  <strong>\u26a0\ufe0f Legal Warning:<\/strong> Unauthorized access to someone else\u2019s phone, messages, accounts, or data is illegal in most countries (Computer Misuse Act UK, CFAA USA, Criminal Code Canada, PDPA Singapore, etc.).  \n  This article is for educational purposes only.  \n  We do NOT provide, teach, or assist with illegal hacking, spyware, or unauthorized access.  \n  SpyWorld only offers legitimate remote evidence collection for authorized, consenting cases.\n<\/div>\n\n<h2>Need Professional &#038; Discreet Help?<\/h2>\n<p>If you require remote evidence recovery or consultation (deleted messages, activity logs, chat history) across WhatsApp, Snapchat, Instagram, Telegram, and more \u2014 contact us confidentially.<\/p>\n\n<div class=\"cta\" style=\"background:#1a73e8; color:white; padding:1.5rem; text-align:center; border-radius:8px; margin:30px 0; font-weight:bold;\">\n  <a href=\"https:\/\/spyworld.world\/es\/contactus\/\" style=\"color:white;\">Free Confidential Consultation \u2192<\/a>\n<\/div>\n\n<h2>Related Articles<\/h2>\n<ul>\n  <li><a href=\"https:\/\/spyworld.world\/es\/catch-cheating-spouse-remotely-uk-2026\/\">Catch Cheating Spouse Remotely in the UK 2026<\/a><\/li>\n  <li><a href=\"https:\/\/spyworld.world\/es\/catch-cheating-spouse-remotely-australia-2026\/\">Catch Cheating Spouse Remotely in Australia 2026<\/a><\/li>\n  <li><a href=\"https:\/\/spyworld.world\/es\/how-to-recover-deleted-messages-on-any-app-2026\/\">How to Recover Deleted Messages on Any App in 2026<\/a><\/li>\n  <li><a href=\"https:\/\/spyworld.world\/es\/remote-whatsapp-deleted-messages-recovery-2026\/\">Remote WhatsApp Deleted Messages Recovery 2026<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Updated February 2026 \u2013 The search for &#8220;how to hack someone&#8217;s phone&#8221; 2026 is one of the most common queries in 2026. Most online tutorials are either scams, malware traps, or methods that were patched years ago.How to hack someones phone 2026 The reality: true unauthorized &#8220;hacking&#8221; (breaking into a locked phone with zero access) [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1022","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>how to hack someones phone 2026<\/title>\n<meta name=\"description\" content=\"how to hack someones phone 2026? Discover legal &amp; safe remote methods: cloud sync, linked devices, backups &amp; more. No jailbreak needed\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/spyworld.world\/es\/how-to-hack-someones-phone-2026-remote-methods\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"how to hack someones phone 2026\" \/>\n<meta property=\"og:description\" content=\"how to hack someones phone 2026? Discover legal &amp; safe remote methods: cloud sync, linked devices, backups &amp; more. No jailbreak needed\" \/>\n<meta property=\"og:url\" content=\"https:\/\/spyworld.world\/es\/how-to-hack-someones-phone-2026-remote-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"Spyworld\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-07T13:42:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-07T13:45:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Spyworld Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spyworld Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/\"},\"author\":{\"name\":\"Spyworld Team\",\"@id\":\"https:\/\/spyworld.world\/#\/schema\/person\/ab71cfc51dda3f724dcb6d7b7767177a\"},\"headline\":\"How to &#8216;Hack&#8217; a Phone Remotely in 2026 \u2013 Legal &amp; Safe Methods Explained\",\"datePublished\":\"2026-02-07T13:42:13+00:00\",\"dateModified\":\"2026-02-07T13:45:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/\"},\"wordCount\":425,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/spyworld.world\/#organization\"},\"image\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/\",\"url\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/\",\"name\":\"how to hack someones phone 2026\",\"isPartOf\":{\"@id\":\"https:\/\/spyworld.world\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\",\"datePublished\":\"2026-02-07T13:42:13+00:00\",\"dateModified\":\"2026-02-07T13:45:45+00:00\",\"description\":\"how to hack someones phone 2026? Discover legal & safe remote methods: cloud sync, linked devices, backups & more. No jailbreak needed\",\"breadcrumb\":{\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage\",\"url\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\",\"contentUrl\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/spyworld.world\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to &#8216;Hack&#8217; a Phone Remotely in 2026 \u2013 Legal &amp; Safe Methods Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/spyworld.world\/#website\",\"url\":\"https:\/\/spyworld.world\/\",\"name\":\"Spyworld\",\"description\":\"Hire a Hacker...\",\"publisher\":{\"@id\":\"https:\/\/spyworld.world\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/spyworld.world\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/spyworld.world\/#organization\",\"name\":\"Spyworld\",\"url\":\"https:\/\/spyworld.world\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/spyworld.world\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/01\/cover-1.png\",\"contentUrl\":\"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/01\/cover-1.png\",\"width\":3500,\"height\":1440,\"caption\":\"Spyworld\"},\"image\":{\"@id\":\"https:\/\/spyworld.world\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/spyworld.world\/#\/schema\/person\/ab71cfc51dda3f724dcb6d7b7767177a\",\"name\":\"Spyworld Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/spyworld.world\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2eb93beb1109f64d3ac3f0ed05f9fcea81d95af1ce085360559d44a7ea98a9b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2eb93beb1109f64d3ac3f0ed05f9fcea81d95af1ce085360559d44a7ea98a9b5?s=96&d=mm&r=g\",\"caption\":\"Spyworld Team\"},\"sameAs\":[\"https:\/\/spyworld.world\"],\"url\":\"https:\/\/spyworld.world\/es\/author\/jkjkjk47\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"how to hack someones phone 2026","description":"how to hack someones phone 2026? Discover legal & safe remote methods: cloud sync, linked devices, backups & more. No jailbreak needed","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/spyworld.world\/es\/how-to-hack-someones-phone-2026-remote-methods\/","og_locale":"es_ES","og_type":"article","og_title":"how to hack someones phone 2026","og_description":"how to hack someones phone 2026? Discover legal & safe remote methods: cloud sync, linked devices, backups & more. No jailbreak needed","og_url":"https:\/\/spyworld.world\/es\/how-to-hack-someones-phone-2026-remote-methods\/","og_site_name":"Spyworld","article_published_time":"2026-02-07T13:42:13+00:00","article_modified_time":"2026-02-07T13:45:45+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png","type":"image\/png"}],"author":"Spyworld Team","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Spyworld Team","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#article","isPartOf":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/"},"author":{"name":"Spyworld Team","@id":"https:\/\/spyworld.world\/#\/schema\/person\/ab71cfc51dda3f724dcb6d7b7767177a"},"headline":"How to &#8216;Hack&#8217; a Phone Remotely in 2026 \u2013 Legal &amp; Safe Methods Explained","datePublished":"2026-02-07T13:42:13+00:00","dateModified":"2026-02-07T13:45:45+00:00","mainEntityOfPage":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/"},"wordCount":425,"commentCount":0,"publisher":{"@id":"https:\/\/spyworld.world\/#organization"},"image":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png","inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/","url":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/","name":"how to hack someones phone 2026","isPartOf":{"@id":"https:\/\/spyworld.world\/#website"},"primaryImageOfPage":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage"},"image":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png","datePublished":"2026-02-07T13:42:13+00:00","dateModified":"2026-02-07T13:45:45+00:00","description":"how to hack someones phone 2026? Discover legal & safe remote methods: cloud sync, linked devices, backups & more. No jailbreak needed","breadcrumb":{"@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#primaryimage","url":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png","contentUrl":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/12\/image-13.png"},{"@type":"BreadcrumbList","@id":"https:\/\/spyworld.world\/how-to-hack-someones-phone-2026-remote-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/spyworld.world\/"},{"@type":"ListItem","position":2,"name":"How to &#8216;Hack&#8217; a Phone Remotely in 2026 \u2013 Legal &amp; Safe Methods Explained"}]},{"@type":"WebSite","@id":"https:\/\/spyworld.world\/#website","url":"https:\/\/spyworld.world\/","name":"Spyworld","description":"Hire a Hacker...","publisher":{"@id":"https:\/\/spyworld.world\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/spyworld.world\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/spyworld.world\/#organization","name":"Spyworld","url":"https:\/\/spyworld.world\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/spyworld.world\/#\/schema\/logo\/image\/","url":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/01\/cover-1.png","contentUrl":"https:\/\/spyworld.world\/wp-content\/uploads\/2025\/01\/cover-1.png","width":3500,"height":1440,"caption":"Spyworld"},"image":{"@id":"https:\/\/spyworld.world\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/spyworld.world\/#\/schema\/person\/ab71cfc51dda3f724dcb6d7b7767177a","name":"Spyworld Team","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/spyworld.world\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2eb93beb1109f64d3ac3f0ed05f9fcea81d95af1ce085360559d44a7ea98a9b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2eb93beb1109f64d3ac3f0ed05f9fcea81d95af1ce085360559d44a7ea98a9b5?s=96&d=mm&r=g","caption":"Spyworld Team"},"sameAs":["https:\/\/spyworld.world"],"url":"https:\/\/spyworld.world\/es\/author\/jkjkjk47"}]}},"_links":{"self":[{"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/posts\/1022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/comments?post=1022"}],"version-history":[{"count":3,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/posts\/1022\/revisions"}],"predecessor-version":[{"id":1025,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/posts\/1022\/revisions\/1025"}],"wp:attachment":[{"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/media?parent=1022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/categories?post=1022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spyworld.world\/es\/wp-json\/wp\/v2\/tags?post=1022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}