{"id":5287,"date":"2025-09-05T13:20:00","date_gmt":"2025-09-05T11:20:00","guid":{"rendered":"https:\/\/fragmentix.com\/?p=5287"},"modified":"2025-09-08T10:00:52","modified_gmt":"2025-09-08T08:00:52","slug":"what-is-secret-sharing","status":"publish","type":"post","link":"https:\/\/fragmentix.com\/es\/what-is-secret-sharing\/","title":{"rendered":"\u00bfQu\u00e9 es Secret Sharing? - Explicaci\u00f3n del esquema de Shamir y su importancia para la seguridad de los datos"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\"><strong>Secret Sharing<\/strong>: <strong>The Technology Powering fragmentiX (Part 1)<\/strong><\/h5>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction: What Secret Sharing Really Means in Cryptography<\/strong><\/h2>\n\n\n\n<p>In the realm of cryptography, few concepts are as deceptively named as <strong>secret sharing<\/strong>. At first glance, it might sound like a cousin of the more familiar <strong>shared secret<\/strong>. But despite the similar phrasing, these two ideas serve very different purposes.<\/p>\n\n\n\n<p>A shared secret is typically a single value known to multiple parties, used to establish secure communication. In contrast, secret sharing is a technique for splitting a secret into multiple parts, or shares, such that only a designated subset of those shares can reconstruct the original secret. Crucially, no individual share reveals any information about the secret on its own.<\/p>\n\n\n\n<p>Unlike encryption schemes, which rely on keys to lock and unlock data, secret sharing is a keyless cryptographic method \u2013 eliminating the need for a single trusted entity to control a key. This makes it especially powerful in scenarios where centralized control is a liability, and resilience against compromise is paramount.<\/p>\n\n\n\n<p>The concept was formalized in the late 1970s by Adi Shamir <a id=\"_ftnref1\" href=\"#_ftn1\">[1]<\/a> and George Blakley. Since then, secret sharing has found applications far beyond secure storage: from safeguarding nuclear launch codes and cryptocurrency wallets to enabling secure multi-party computation and threshold-based authentication systems.<\/p>\n\n\n\n<p>At fragmentiX, we harness the power of secret sharing to build secure, distributed cloud storage systems \u2013 ensuring that your data remains protected even if parts of the system fail or are compromised. In the sections that follow, we\u2019ll explore how secret sharing works, starting with the classic Shamir\u2019s scheme in the first part of this blog post, and then dive into extensions that make it even more robust and versatile in a second part.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Shamir\u2019s Secret Sharing: An Intuitive Example<\/strong><\/h2>\n\n\n\n<p>Imagine a medical research institute working on a revolutionary medical treatment. The formula is a closely guarded secret \u2013 not just for intellectual property reasons, but to prevent premature leaks or misuse. To protect it, the institute decides to split the formula among several trusted researchers located in different countries.<\/p>\n\n\n\n<p>But they don\u2019t simply divide the document into chunks. That would be risky as each chunk might still contain clues. Instead, they use Shamir\u2019s Secret Sharing, a method rooted in threshold cryptography, where a secret is divided into <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><\/math> shares, and a predefined threshold <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> of those shares is needed to reconstruct it.<\/p>\n\n\n\n<p>Importantly, any subset of fewer than <em>k<\/em> shares reveals absolutely nothing about the original secret \u2013 a level of protection so strong that even an adversary with unlimited computational power cannot extract any information from insufficient shares. This exceptional level of protection falls under the category of <strong>information-theoretic security<\/strong> (ITS). It\u2019s the same kind of guarantee offered by the One-Time Pad, the textbook example of unbreakable encryption that achieves ITS when used correctly. While the One-Time Pad is rarely practical due to its stringent requirements, Shamir\u2019s Secret Sharing also offers ITS under more flexible conditions, making it suitable for wider range of real-world applications. Importantly, this level of security is not threatened by advances in cryptoanalysis or computing, including quantum computers.<\/p>\n\n\n\n<p>Another powerful feature: it doesn\u2019t matter which shares are available. If the institute creates 10 shares and sets the threshold at 7, then any 7 of those 10 researchers can come together and reconstruct the secret formula. Even if 3 shares are lost, the secret remains recoverable. This makes Shamir\u2019s scheme not only secure but also highly fault-tolerant.<\/p>\n\n\n\n<p>This flexibility and fault tolerance make Shamir\u2019s scheme ideal for secure distributed systems, where data integrity and availability must coexist with strict confidentiality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical Explanation: The Mathematics Behind Shamir\u2019s Secret Sharing<\/strong><\/h2>\n\n\n\n<p>At the heart of Shamir\u2019s Secret Sharing lies a beautifully simple idea: a polynomial of degree <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><mo>&#8211;<\/mo><mn>1<\/mn><\/math> is uniquely determined by <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> distinct points. For example, a line (a degree 1 polynomial) can be reconstructed from any two distinct points, while a parabola (degree 2) requires three points. This principle forms the backbone of the scheme.<\/p>\n\n\n\n<p>To encode a secret, we embed it as the constant term of an otherwise randomly generated polynomial of degree <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k-1<\/mi><\/math> over a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Finite_field\" target=\"_blank\" rel=\"noopener\">finite field<\/a>. To use visual analogy: think of the secret as the point where the graph of the polynomial intersects the y-axis \u2013 that is, the value of the polynomial at <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>x=0<\/mi><\/math>. We then evaluate this polynomial at <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><\/math> distinct non-zero points to produce <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><\/math> shares.<\/p>\n\n\n\n<p>As a result, any <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> of these shares can be used to reconstruct the original polynomial and thus the secret using interpolation techniques. But fewer than <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> shares reveal absolutely nothing. This isn\u2019t just computational difficulty, it\u2019s a mathematical guarantee.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"225\" src=\"https:\/\/fragmentix.com\/wp-content\/uploads\/2025\/09\/3-out-of-4-treshhold-scheme-1-1024x225.png\" alt=\"\" class=\"wp-image-5334\" srcset=\"https:\/\/fragmentix.com\/wp-content\/uploads\/2025\/09\/3-out-of-4-treshhold-scheme-1-980x216.png 980w, https:\/\/fragmentix.com\/wp-content\/uploads\/2025\/09\/3-out-of-4-treshhold-scheme-1-480x106.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><figcaption class=\"wp-element-caption\"><em>Figure 1: <\/em>Example of a 3-out-of-4 threshold scheme<\/figcaption><\/figure>\n\n\n\n<p>In Figure 1 the secret is the y-coordinate of the point S where the parabola intersects the y-axis. Four points on a parabola represent the four shares <em>(A, B, C, D)<\/em>. Any three of these are sufficient to uniquely determine the secret. Two points leave the parabola \u2013 and therefore the secret \u2013 undetermined. Note that in this simplified example we visualize a polynomial over the real number field instead of a finite field.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step by step:<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. Defining the secret and parameters<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Let the secret be a number in a finite field (e.g. a finite field with <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><msup><mn>2<\/mn><mn>8<\/mn><\/msup><\/math> elements which can represent all possible values of a byte).<\/li>\n\n\n\n<li>Choose a threshold <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> (minimum number of shares needed to reconstruct the secret).<\/li>\n\n\n\n<li>Choose the total number of shares <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><\/math>, where <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><mo>\u2265<\/mo><mi>k<\/mi><\/math>.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. Constructing the polynomial<\/strong><\/h4>\n\n\n\n<p>To encode the secret, we construct a random polynomial <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mrow><mi>f<\/mi><mo form=\"prefix\" stretchy=\"false\">(<\/mo><mi>x<\/mi><mo form=\"postfix\" stretchy=\"false\">)<\/mo><\/mrow><\/math> of degree <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><mo>&#8211;<\/mo><mn>1<\/mn><\/math>:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" display=\"block\"><mrow><mi>f<\/mi><mo form=\"prefix\" stretchy=\"false\">(<\/mo><mi>x<\/mi><mo form=\"postfix\" stretchy=\"false\">)<\/mo><mo>=<\/mo><msub><mi>a<\/mi><mn>0<\/mn><\/msub><mo>+<\/mo><msub><mi>a<\/mi><mn>1<\/mn><\/msub><mi>x<\/mi><mo>+<\/mo><msub><mi>a<\/mi><mn>2<\/mn><\/msub><msup><mi>x<\/mi><mn>2<\/mn><\/msup><mo>+<\/mo><mo>\u22ef<\/mo><mo>+<\/mo><msub><mi>a<\/mi><mrow><mi>k<\/mi><mo>\u2212<\/mo><mn>1<\/mn><\/mrow><\/msub><msup><mi>x<\/mi><mrow><mi>k<\/mi><mo>\u2212<\/mo><mn>1<\/mn><\/mrow><\/msup><\/mrow><\/math><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The constant term <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><msub><mi>a<\/mi><mn>0<\/mn><\/msub><\/math> is the secret.<\/li>\n\n\n\n<li>The coefficients <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mrow><msub><mi>a<\/mi><mn>1<\/mn><\/msub><mo separator=\"true\">,<\/mo><msub><mi>a<\/mi><mn>2<\/mn><\/msub><mo separator=\"true\">,<\/mo><mo>\u2026<\/mo><mo separator=\"true\">,<\/mo><msub><mi>a<\/mi><mrow><mi>k<\/mi><mo>\u2212<\/mo><mn>1<\/mn><\/mrow><\/msub><\/mrow><\/math> are chosen uniformly at random from the finite field.<\/li>\n\n\n\n<li>The randomness of these coefficients is critical \u2013 it ensures that the polynomial is unpredictable and that the scheme achieves information-theoretic security.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3. Generating shares<\/strong><\/h4>\n\n\n\n<p>Each share <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><msub><mi>s<\/mi><mi>i<\/mi><\/math> is a point on the polynomial:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" display=\"block\"><mrow><msub><mi>s<\/mi><mi>i<\/mi><\/msub><mo>=<\/mo><mo form=\"prefix\" stretchy=\"false\">(<\/mo><msub><mi>x<\/mi><mi>i<\/mi><\/msub><mo separator=\"true\">,<\/mo> <mi>f<\/mi><mo form=\"prefix\" stretchy=\"false\">(<\/mo><msub><mi>x<\/mi><mi>i<\/mi><\/msub><mo form=\"postfix\" stretchy=\"false\">)<\/mo><mo form=\"postfix\" stretchy=\"false\">)<\/mo><\/mrow><\/math><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Choose distinct, non-zero values <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mrow><msub><mi>x<\/mi><mn>1<\/mn><\/msub><mo separator=\"true\">,<\/mo><msub><mi>x<\/mi><mn>2<\/mn><\/msub><mo separator=\"true\">,<\/mo><mo>\u2026<\/mo><mo separator=\"true\">,<\/mo><msub><mi>x<\/mi><mi>n<\/mi><\/msub><\/mrow><\/math> in the finite field.<\/li>\n\n\n\n<li>Evaluate the polynomial at each <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><msub><mi>x<\/mi><mi>i<\/mi><\/msub><\/math> to get the corresponding <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mrow><mi>f<\/mi><mo form=\"prefix\" stretchy=\"false\">(<\/mo><msub><mi>x<\/mi><mi>i<\/mi><\/msub><mo form=\"postfix\" stretchy=\"false\">)<\/mo><\/mrow><\/math>.<\/li>\n<\/ul>\n\n\n\n<p>These pairs <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mrow><mo form=\"prefix\" stretchy=\"false\">(<\/mo><msub><mi>x<\/mi><mi>i<\/mi><\/msub><mo separator=\"true\">,<\/mo><mi>f<\/mi><mo form=\"prefix\" stretchy=\"false\">(<\/mo><msub><mi>x<\/mi><mi>i<\/mi><\/msub><mo form=\"postfix\" stretchy=\"false\">)<\/mo><mo form=\"postfix\" stretchy=\"false\">)<\/mo><\/mrow><\/math> are distributed to participants. Each share looks like random data on its own and reveals nothing about the secret unless combined with enough other shares.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4. Reconstructing the Secret<\/strong> <\/h4>\n\n\n\n<p>To recover the secret <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><msub><mi>a<\/mi><mn>0<\/mn><\/msub><\/math>, any group of <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> participants can use their shares to reconstruct the secret using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Lagrange_polynomial\" target=\"_blank\" rel=\"noopener\">Lagrange interpolation<\/a>:<\/p>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\">\n<math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" display=\"block\">\n <semantics>\n  <mrow>\n   <mrow>\n    <msub>\n     <mi>a<\/mi>\n     <mn>0<\/mn>\n    <\/msub>\n    <mo stretchy=\"false\">=<\/mo>\n    <mrow>\n     <mo stretchy=\"false\">\u2211<\/mo>\n     <mi>f<\/mi>\n    <\/mrow>\n   <\/mrow>\n   <mrow>\n    <mo fence=\"true\" form=\"prefix\" stretchy=\"false\">(<\/mo>\n    <mrow>\n     <msub>\n      <mi>x<\/mi>\n      <mi>i<\/mi>\n     <\/msub>\n    <\/mrow>\n    <mo fence=\"true\" form=\"postfix\" stretchy=\"false\">)<\/mo>\n   <\/mrow>\n   <mrow>\n    <munder>\n     <mo stretchy=\"false\">\u220f<\/mo>\n     <mrow>\n      <mi>j<\/mi>\n      <mo stretchy=\"false\">\u2260<\/mo>\n      <mi>i<\/mi>\n     <\/mrow>\n    <\/munder>\n    <mfrac>\n     <msub>\n      <mi>x<\/mi>\n      <mi>i<\/mi>\n     <\/msub>\n     <mrow>\n      <msub>\n       <mi>x<\/mi>\n       <mi>j<\/mi>\n      <\/msub>\n      <mo stretchy=\"false\">\u2212<\/mo>\n      <msub>\n       <mi>x<\/mi>\n       <mi>i<\/mi>\n      <\/msub>\n     <\/mrow>\n    <\/mfrac>\n   <\/mrow>\n  <\/mrow>\n  <annotation encoding=\"StarMath 5.0\">a_0 = sum f(x_i) prod from{j&lt;&gt;i} {{x_i} over {x_j &#8211; x_i}} <\/annotation>\n <\/semantics>\n<\/math>\n<script type=\"text\/javascript\" src=\"https:\/\/fragmentix.com\/wp-includes\/js\/dist\/hooks.min.js?ver=4d63a3d491d11ffd8ac6\" id=\"wp-hooks-js\"><\/script>\n<script type=\"text\/javascript\" src=\"https:\/\/fragmentix.com\/wp-includes\/js\/dist\/i18n.min.js?ver=5e580eb46a90c2b997e6\" id=\"wp-i18n-js\"><\/script>\n<script type=\"text\/javascript\" id=\"wp-i18n-js-after\">\n\/* <![CDATA[ *\/\nwp.i18n.setLocaleData( { 'text direction\\u0004ltr': [ 'ltr' ] } );\n\/* ]]> *\/\n<\/script>\n<script  async type=\"text\/javascript\" src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/mathjax\/2.7.7\/MathJax.js?config=TeX-MML-AM_CHTML\" id=\"mathjax-js\"><\/script>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security Properties<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Information-theoretic security:<\/strong> Any group with fewer than <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> shares learns nothing about the secret. This is not just computationally hard \u2013 it\u2019s mathematically impossible.<\/li>\n\n\n\n<li><strong>Threshold flexibility: <\/strong>You can choose any <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> and <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>n<\/mi><\/math> to balance security and fault tolerance.<\/li>\n\n\n\n<li><strong>Resilience:<\/strong> It doesn\u2019t matter which shares are lost or unavailable. As long as <math xmlns=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mi>k<\/mi><\/math> valid shares remain, the secret can be recovered.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion: Why Shamir\u2019s Secret Sharing Still Matters Today<\/strong><\/h2>\n\n\n\n<p>Shamir\u2019s Secret Sharing demonstrates how mathematics can transform the way we think about security: instead of locking data behind a single key, it eliminates the need for a single trusted entity and guarantees that no partial information can ever leak. This foundation makes it both powerful and resilient, even in the face of emerging threats.<\/p>\n\n\n\n<p>But as strong as the classic scheme is, real-world systems require more. Large-scale storage brings efficiency concerns, distributed networks introduce the risk of corrupted or malicious shares, and long-term reliability demands mechanisms that go beyond the basics.<\/p>\n\n\n\n<p>In Part 2, we\u2019ll look at exactly how these challenges are addressed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>how Computationally Secure Secret Sharing reduces storage overhead,<\/li>\n\n\n\n<li>how Robust Secret Sharing detects corrupted shares and enables highly resilient self-healing cloud storage<\/li>\n<\/ul>\n\n\n\n<p>Stay tuned \u2013 because the real strength of secret sharing lies not only in its mathematical elegance, but in how it evolves to meet the demands of modern, distributed data security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n\n\n\n<p><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> Adi Shamir. 1979. <em>How to share a secret<\/em>. Commun. ACM 22, 11 (Nov. 1979), 612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Ready to protect your data from future threats?<\/h4>\n\n\n\n<p>\u27a1\ufe0f Get in touch for a&nbsp;<a href=\"https:\/\/fragmentix.com\/contact-us\/\">consultation or demo<\/a>&nbsp;tailored to your infrastructure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Learn how fragmentiX works in detail:<\/h4>\n\n\n\n<p>\u27a1\ufe0f Explore our&nbsp;<a href=\"https:\/\/fragmentix.com\/products\/\">solutions<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n\n\n\n<div class=\"wp-block-mathml-mathmlblock\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secret Sharing: The Technology Powering fragmentiX (Part 1) Introduction: What Secret Sharing Really Means in Cryptography In the realm of cryptography, few concepts are as deceptively named as secret sharing. At first glance, it might sound like a cousin of the more familiar shared secret. But despite the similar phrasing, these two ideas serve very [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":5296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[220,219,69,147,74,60],"class_list":["post-5287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-adi-shamir","tag-cryptography","tag-fragmentix","tag-information-theoretic-security","tag-its","tag-secret-sharing"],"_links":{"self":[{"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/posts\/5287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/comments?post=5287"}],"version-history":[{"count":30,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/posts\/5287\/revisions"}],"predecessor-version":[{"id":5344,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/posts\/5287\/revisions\/5344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/media\/5296"}],"wp:attachment":[{"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/media?parent=5287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/categories?post=5287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fragmentix.com\/es\/wp-json\/wp\/v2\/tags?post=5287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}