{"id":1015,"date":"2024-01-17T16:15:21","date_gmt":"2024-01-17T19:15:21","guid":{"rendered":"https:\/\/blog.cantalupe.com.ar\/?p=1015"},"modified":"2024-07-25T11:48:25","modified_gmt":"2024-07-25T14:48:25","slug":"dkim-y-spf-dos-protocolos-clave","status":"publish","type":"post","link":"https:\/\/blog.cantalupe.com.ar\/en\/dkim-y-spf-dos-protocolos-clave\/","title":{"rendered":"DKIM and SPF: two key protocols"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1015\" class=\"elementor elementor-1015\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f2aaa9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f2aaa9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ff8e43\" data-id=\"3ff8e43\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dac4eb elementor-widget elementor-widget-text-editor\" data-id=\"8dac4eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today's digital world, the security of email communication is crucial. With the rise of cyber threats, implementing robust measures to protect the integrity and authenticity of emails becomes essential. Two key protocols for achieving this are DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework). That's why in this blog, we will delve into how these protocols work together to strengthen domain authentication and prevent phishing.<\/p><h4>What is DKIM?<\/h4><p>DKIM, known as DomainKeys Identified Mail, is an email authentication protocol that uses asymmetric cryptography to verify the legitimate origin of messages. It works by adding a unique key to the email header through digital signature. Upon receiving the message, the destination server can verify this signature using the sender domain's public key, ensuring that the message hasn't been altered in transit and comes from a trustworthy source.<\/p><h4>Advantages of DKIM:<\/h4><h6>Integrity of content:<\/h6><p>DKIM ensures the immutability of the message content during transmission.<\/p><h6>Autenticaci\u00f3n del remitente:<\/h6><p>Allows recipients to verify the authenticity of the email, ensuring it comes from a legitimate domain and not from a malicious sender.<\/p><h6>Spam reduction:<\/h6><p>By authenticating messages, DKIM aids email service providers in identifying and filtering unwanted or potential phishing emails.<\/p><h4>What is SPF?<\/h4><p>The Sender Policy Framework (SPF) emerges as another essential protocol for email authentication. SPF enables domain owners to specify which servers are authorized to send emails on their behalf. This is achieved through publishing SPF records on the domain name server (DNS).<\/p><h4>Advantages of SPF:<\/h4><h6>Prevention of identity spoofing:<\/h6><p>SPF prevents malicious senders from sending falsified emails on behalf of a specific domain.<\/p><h6>Spam reduction:<\/h6><p>By clearly indicating legitimate servers, SPF helps recipients identify and filter spam messages and potential phishing attempts.<\/p><h6>Improvement of delivery:<\/h6><p>By authenticating emails, SPF contributes to more effective message delivery, avoiding them being marked as suspicious or unauthenticated.<\/p><h4>The importance of combining DKIM and SPF:<\/h4><p>A pesar de que DKIM y SPF poseen fortalezas individuales, su integraci\u00f3n proporciona una capa adicional de seguridad. Mientras DKIM se enfoca en la autenticidad del contenido del mensaje, SPF se centra en la autenticidad del servidor emisor. Al aplicar ambos protocolos, se establece una barrera m\u00e1s s\u00f3lida contra el phishing y otros ataques cibern\u00e9ticos.<\/p><p><strong>Furthermore, starting from January 2024, Gmail and Yahoo Mail have implemented the request for DKIM and SPF authentication in domains, thus enhancing the security and reliability of email delivery<\/strong><\/p><h4>In conclusion:<\/h4><p>Email authentication is a fundamental pillar for preserving the integrity and trust in digital communications. The joint implementation of DKIM and SPF not only enhances the security of emails but also contributes to building a safer and more reliable online ecosystem. By adopting these practices, domain owners and end-users can significantly reduce the risk of falling victim to cyber attacks, ensuring a safer email experience.<\/p><p dir=\"ltr\"><a href=\"https:\/\/cantalupe.com.ar\/contacto\">Contact us to learn more!<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>En el mundo digital actual, la seguridad de la comunicaci\u00f3n por correo electr\u00f3nico es esencial. Con el aumento de amenazas cibern\u00e9ticas, es crucial implementar medidas robustas para proteger la integridad y autenticidad de los correos electr\u00f3nicos. Dos protocolos clave para lograr esto son DKIM (DomainKeys Identified Mail) y SPF (Sender [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1019,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[12,119,1],"tags":[83,81,84,82,85],"class_list":["post-1015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branding","category-seguridad","category-tecnologia","tag-amenazas-ciberneticas","tag-autenticacion-de-correo-electronico","tag-dkim-domainkeys-identified-mail","tag-seguridad-digital","tag-spf-sender-policy-framework"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DKIM y SPF: dos protocolos clave - Cantalupe Blog<\/title>\n<meta name=\"description\" content=\"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cantalupe.com.ar\/en\/dkim-y-spf-dos-protocolos-clave\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DKIM y SPF: dos protocolos clave\" \/>\n<meta property=\"og:description\" content=\"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cantalupe.com.ar\/en\/dkim-y-spf-dos-protocolos-clave\/\" \/>\n<meta property=\"og:site_name\" content=\"Cantalupe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T19:15:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T14:48:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1268\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"cantalupe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cantalupe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/\"},\"author\":{\"name\":\"cantalupe\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/person\\\/6f3ec15d039f6bfd8dd1e7e6f689bb0e\"},\"headline\":\"DKIM y SPF: dos protocolos clave\",\"datePublished\":\"2024-01-17T19:15:21+00:00\",\"dateModified\":\"2024-07-25T14:48:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DKIM-y-SPF.webp\",\"keywords\":[\"Amenazas cibern\u00e9ticas\",\"Autenticaci\u00f3n de correo electr\u00f3nico\",\"DKIM (DomainKeys Identified Mail)\",\"Seguridad digital\",\"SPF (Sender Policy Framework)\"],\"articleSection\":[\"Branding\",\"Seguridad\",\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/\",\"name\":\"DKIM y SPF: dos protocolos clave - Cantalupe Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DKIM-y-SPF.webp\",\"datePublished\":\"2024-01-17T19:15:21+00:00\",\"dateModified\":\"2024-07-25T14:48:25+00:00\",\"description\":\"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DKIM-y-SPF.webp\",\"contentUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DKIM-y-SPF.webp\",\"width\":1268,\"height\":664},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/dkim-y-spf-dos-protocolos-clave\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DKIM y SPF: dos protocolos clave\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#website\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\",\"name\":\"Cantalupe Blog\",\"description\":\"Tecnolog\u00eda que Potencia Empresas\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#organization\",\"name\":\"Cantalupe Blog\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logoCantalupe.jpeg\",\"contentUrl\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logoCantalupe.jpeg\",\"width\":1364,\"height\":266,\"caption\":\"Cantalupe Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/agenciacantalupe\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/#\\\/schema\\\/person\\\/6f3ec15d039f6bfd8dd1e7e6f689bb0e\",\"name\":\"cantalupe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g\",\"caption\":\"cantalupe\"},\"sameAs\":[\"http:\\\/\\\/blog.cantalupe.com.ar\"],\"url\":\"https:\\\/\\\/blog.cantalupe.com.ar\\\/en\\\/author\\\/cantalupe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DKIM y SPF: dos protocolos clave - Cantalupe Blog","description":"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cantalupe.com.ar\/en\/dkim-y-spf-dos-protocolos-clave\/","og_locale":"en_US","og_type":"article","og_title":"DKIM y SPF: dos protocolos clave","og_description":"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.","og_url":"https:\/\/blog.cantalupe.com.ar\/en\/dkim-y-spf-dos-protocolos-clave\/","og_site_name":"Cantalupe Blog","article_published_time":"2024-01-17T19:15:21+00:00","article_modified_time":"2024-07-25T14:48:25+00:00","og_image":[{"width":1268,"height":664,"url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp","type":"image\/webp"}],"author":"cantalupe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cantalupe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#article","isPartOf":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/"},"author":{"name":"cantalupe","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/person\/6f3ec15d039f6bfd8dd1e7e6f689bb0e"},"headline":"DKIM y SPF: dos protocolos clave","datePublished":"2024-01-17T19:15:21+00:00","dateModified":"2024-07-25T14:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/blog.cantalupe.com.ar\/#organization"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp","keywords":["Amenazas cibern\u00e9ticas","Autenticaci\u00f3n de correo electr\u00f3nico","DKIM (DomainKeys Identified Mail)","Seguridad digital","SPF (Sender Policy Framework)"],"articleSection":["Branding","Seguridad","Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/","url":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/","name":"DKIM y SPF: dos protocolos clave - Cantalupe Blog","isPartOf":{"@id":"https:\/\/blog.cantalupe.com.ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#primaryimage"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp","datePublished":"2024-01-17T19:15:21+00:00","dateModified":"2024-07-25T14:48:25+00:00","description":"DKIM y SPF, dos protocolos que trabajan en conjunto para fortalecer la autenticaci\u00f3n de dominios y prevenir el phishing.","breadcrumb":{"@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#primaryimage","url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp","contentUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2024\/01\/DKIM-y-SPF.webp","width":1268,"height":664},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cantalupe.com.ar\/dkim-y-spf-dos-protocolos-clave\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blog.cantalupe.com.ar\/"},{"@type":"ListItem","position":2,"name":"DKIM y SPF: dos protocolos clave"}]},{"@type":"WebSite","@id":"https:\/\/blog.cantalupe.com.ar\/#website","url":"https:\/\/blog.cantalupe.com.ar\/","name":"Cantalupe Blog","description":"Technology that Empowers Businesses","publisher":{"@id":"https:\/\/blog.cantalupe.com.ar\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cantalupe.com.ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cantalupe.com.ar\/#organization","name":"Cantalupe Blog","url":"https:\/\/blog.cantalupe.com.ar\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2023\/02\/logoCantalupe.jpeg","contentUrl":"https:\/\/blog.cantalupe.com.ar\/wp-content\/uploads\/2023\/02\/logoCantalupe.jpeg","width":1364,"height":266,"caption":"Cantalupe Blog"},"image":{"@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/agenciacantalupe\/"]},{"@type":"Person","@id":"https:\/\/blog.cantalupe.com.ar\/#\/schema\/person\/6f3ec15d039f6bfd8dd1e7e6f689bb0e","name":"cantalupe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/279de26d027816c4c304b434760fc132ada62f929d27f7228ad76d42003274ca?s=96&d=mm&r=g","caption":"cantalupe"},"sameAs":["http:\/\/blog.cantalupe.com.ar"],"url":"https:\/\/blog.cantalupe.com.ar\/en\/author\/cantalupe\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/comments?post=1015"}],"version-history":[{"count":8,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1015\/revisions"}],"predecessor-version":[{"id":1027,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/posts\/1015\/revisions\/1027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/media\/1019"}],"wp:attachment":[{"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/media?parent=1015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/categories?post=1015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cantalupe.com.ar\/en\/wp-json\/wp\/v2\/tags?post=1015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}