{"id":30939,"date":"2025-01-31T11:02:38","date_gmt":"2025-01-31T16:02:38","guid":{"rendered":"https:\/\/knowledgeflow.org\/?post_type=resource&#038;p=30939"},"modified":"2025-02-19T10:48:59","modified_gmt":"2025-02-19T15:48:59","slug":"please-share-a-viral-scam-in-disguise","status":"publish","type":"resource","link":"https:\/\/knowledgeflow.org\/es\/resource\/please-share-a-viral-scam-in-disguise\/","title":{"rendered":"Por favor, comparte: una estafa viral disfrazada"},"content":{"rendered":"<h1 class=\"wp-block-heading\">Por favor, comparte: una estafa viral disfrazada<\/h1>\n\n\n\n<p>Internet est\u00e1 lleno de mensajes que instan a la gente a <strong>\"\u00a1Por favor, comparte!\"<\/strong> Ya se trate de un ni\u00f1o desaparecido, de una mascota perdida o de alguien que lo necesita desesperadamente, estas publicaciones <strong>jugar con las emociones<\/strong> para propagarse r\u00e1pidamente. Pero detr\u00e1s de muchas de estas publicaciones virales, <strong>los estafadores est\u00e1n al acecho, esperando para aprovecharse de tu buena voluntad<\/strong>.<\/p>\n\n\n\n<p>Estas estafas no son s\u00f3lo desinformaci\u00f3n inofensiva. <strong>manipular la confianza, robar informaci\u00f3n personal e incluso conducir a sitios peligrosos de phishing<\/strong>. Vamos a desglosar c\u00f3mo funciona esta estafa y, lo m\u00e1s importante, <strong>c\u00f3mo puede protegerse.<\/strong><\/p>\n\n\n<style>.kb-row-layout-id30939_bde671-57 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id30939_bde671-57 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id30939_bde671-57 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}.kb-row-layout-id30939_bde671-57 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id30939_bde671-57 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id30939_bde671-57 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id30939_bde671-57 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column30939_ab9423-94 > .kt-inside-inner-col,.kadence-column30939_ab9423-94 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_ab9423-94 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_ab9423-94 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_ab9423-94 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_ab9423-94 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_ab9423-94{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_ab9423-94 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_ab9423-94 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_ab9423-94\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"1024\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-740x1024.png\" alt=\"\" class=\"wp-image-31017\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-740x1024.png 740w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-600x831.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-217x300.png 217w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-768x1063.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4-9x12.png 9w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-4.png 924w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_ade26e-48 > .kt-inside-inner-col,.kadence-column30939_ade26e-48 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_ade26e-48 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_ade26e-48 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_ade26e-48 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_ade26e-48 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_ade26e-48{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_ade26e-48 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_ade26e-48 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_ade26e-48\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3.jpg\" alt=\"\" class=\"wp-image-30983\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3.jpg 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3-600x313.jpg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3-300x157.jpg 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3-768x401.jpg 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Tyler-Griffin-Missing-Boy-Scam_Example-Facebook-posts_1_20221117-1024x535-3-18x9.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo funciona la estafa?<\/strong><\/h2>\n\n\n\n<p>Estafadores <strong>inventar historias<\/strong> para hacer que sus publicaciones se vuelvan virales, sabiendo que es m\u00e1s probable que la gente comparta contenido emocional o urgente sin verificarlo. As\u00ed es como lo hacen:<\/p>\n\n\n<style>.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr) minmax(0, 1fr);}.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 1024px){.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr) minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id30939_bb4f6f-e4 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id30939_bb4f6f-e4 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-left-half kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column30939_f0e610-67 > .kt-inside-inner-col,.kadence-column30939_f0e610-67 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_f0e610-67 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_f0e610-67 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_f0e610-67 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_f0e610-67 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_f0e610-67{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_f0e610-67 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_f0e610-67 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_f0e610-67\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\"><strong>Paso 1: Crear una historia falsa<\/strong><\/h3>\n\n\n\n<p>Estafadores <strong>robar una foto de internet<\/strong>-a veces de un <strong>caso real de personas desaparecidas<\/strong>, a <strong>mascota perdida<\/strong>o incluso un <strong>noticia totalmente ajena<\/strong>-y emparejarlo con un <strong>desgarradora petici\u00f3n de ayuda.<\/strong><\/p>\n\n\n\n<p>Estos puestos suelen <strong>carecen de detalles concretos<\/strong> como <strong>informes policiales, nombres de ciudades o contactos oficiales<\/strong>haci\u00e9ndolos <strong>f\u00e1cil de copiar y pegar<\/strong> en diferentes lugares. Por ejemplo, el <strong>mismo ni\u00f1o desaparecido<\/strong> pueden aparecer en un post afirmando que fueron vistos por \u00faltima vez en <strong>Kewaunee<\/strong>mientras que otra versi\u00f3n afirma que desaparecieron en <strong>Evansville<\/strong>-se\u00f1al inequ\u00edvoca de que la historia es inventada.<\/p>\n\n\n\n<p>Por <strong>evitar detalles espec\u00edficos de la ubicaci\u00f3n<\/strong>los estafadores lo hacen <strong>mayor facilidad para reutilizar el mismo puesto en distintas regiones<\/strong>garantizando <strong>m\u00e1ximo alcance y credibilidad.<\/strong><\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col,.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_0b7ee4-ef{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_0b7ee4-ef > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_0b7ee4-ef\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"559\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/missing-kid-scam-4.webp\" alt=\"\" class=\"wp-image-31007\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/missing-kid-scam-4.webp 442w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/missing-kid-scam-4-237x300.webp 237w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/missing-kid-scam-4-9x12.webp 9w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_956c6d-c3 > .kt-inside-inner-col,.kadence-column30939_956c6d-c3 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_956c6d-c3 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_956c6d-c3 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_956c6d-c3 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_956c6d-c3 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_956c6d-c3{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_956c6d-c3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_956c6d-c3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_956c6d-c3\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"471\" height=\"732\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-3.png\" alt=\"\" class=\"wp-image-31008\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-3.png 471w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-3-193x300.png 193w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/image-3-8x12.png 8w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Paso 2: Ganar confianza y compromiso<\/strong><\/h3>\n\n\n\n<p>Una vez que el mensaje falso est\u00e1 arriba, los estafadores <strong>manipular el compromiso<\/strong> para extenderlo a\u00fan m\u00e1s. En <strong>instar a la gente a interactuar<\/strong> con el puesto utilizando <strong>frases cargadas de emoci\u00f3n como<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\"\u00a1Bump this post!\"<\/strong> - Un truco para mantenerlo activo en las redes sociales.<\/li>\n\n\n\n<li><strong>\"\u00a1Inunden nuestros feeds para ayudar a encontrarlos!\"<\/strong> - Un empuj\u00f3n psicol\u00f3gico para que la gente act\u00fae r\u00e1pido.<\/li>\n\n\n\n<li><strong>\"\u00a1Por favor, ayuda, s\u00f3lo lleva un segundo!\"<\/strong> - Reforzar la idea de que compartir es una acci\u00f3n peque\u00f1a pero significativa.<\/li>\n<\/ul>\n\n\n\n<p>A medida que m\u00e1s gente <strong>me gusta, comentar y compartir<\/strong>El <strong>crece la ilusi\u00f3n de credibilidad<\/strong>. Alguien puede pensar, <em>\"Si miles de personas participan, debe ser real\".<\/em> Pero mirando m\u00e1s de cerca, podemos ver <strong>se denuncia la desaparici\u00f3n del mismo ni\u00f1o en m\u00faltiples lugares.<\/strong><\/p>\n\n\n\n<p>Este <strong>repetici\u00f3n en distintos lugares<\/strong> es un <strong>clara bandera roja<\/strong>-los informes reales de personas desaparecidas tendr\u00edan <strong>detalles coherentes y fuentes oficiales<\/strong>no <strong>ruegos gen\u00e9ricos de copiar y pegar<\/strong>.<\/p>\n\n\n<style>.kb-row-layout-id30939_62abb3-14 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id30939_62abb3-14 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id30939_62abb3-14 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id30939_62abb3-14 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id30939_62abb3-14 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id30939_62abb3-14 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id30939_62abb3-14 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column30939_c674dd-b4 > .kt-inside-inner-col,.kadence-column30939_c674dd-b4 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_c674dd-b4 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_c674dd-b4 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_c674dd-b4 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_c674dd-b4 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_c674dd-b4{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_c674dd-b4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_c674dd-b4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_c674dd-b4\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"816\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-1024x816.png\" alt=\"\" class=\"wp-image-31015\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-1024x816.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-600x478.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-300x239.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-768x612.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2-15x12.png 15w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/91dfa8dbbadb853d42e1f030b898b57a-2.png 1036w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_f6df7f-6b > .kt-inside-inner-col,.kadence-column30939_f6df7f-6b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_f6df7f-6b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_f6df7f-6b > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_f6df7f-6b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_f6df7f-6b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_f6df7f-6b{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_f6df7f-6b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_f6df7f-6b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_f6df7f-6b\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"835\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-1024x835.png\" alt=\"\" class=\"wp-image-31016\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-1024x835.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-600x489.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-300x245.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-768x627.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2-15x12.png 15w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-31-at-2.47.33\u202fPM-2.png 1319w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Paso 3: Cambiar a una estafa<\/strong><\/h3>\n\n\n\n<p>Una vez que el post ha ganado suficiente atenci\u00f3n, los estafadores <strong>sustituir el mensaje original<\/strong> con su verdadero objetivo:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Sustituci\u00f3n del mensaje original por un enlace falso para recaudar fondos<\/strong>enga\u00f1ando a la gente para que done a una estafa.<\/li>\n\n\n\n<li><strong>A\u00f1adir enlaces phishing<\/strong>que conducen a los usuarios a sitios web falsos que roban las credenciales de inicio de sesi\u00f3n.<\/li>\n\n\n\n<li><strong>Publicidad fraudulenta<\/strong> que requieren que las personas faciliten informaci\u00f3n personal.<\/li>\n<\/ul>\n\n\n\n<p>Lo que empez\u00f3 como un <strong>sincera petici\u00f3n de ayuda<\/strong> es ahora un <strong>trampa<\/strong> dise\u00f1ados para enga\u00f1ar y explotar a usuarios confiados. Algunos estafadores tambi\u00e9n <strong>vender p\u00e1ginas virales<\/strong> despu\u00e9s de ganar suficientes seguidores, utilizando su nueva audiencia para empujar <strong>m\u00e1s estafas<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Paso 4: Recopilaci\u00f3n de informaci\u00f3n personal<\/strong><\/h3>\n\n\n\n<p>Estafadores <strong>seguir de cerca los comentarios<\/strong> en sus puestos falsos, reuni\u00e9ndose:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Localizaciones (sobre todo de personas que dicen \"estoy en esta zona, \u00a1estar\u00e9 atento!\")<\/li>\n\n\n\n<li>Datos personales (nombres, lugares de trabajo o v\u00ednculos familiares)<\/li>\n\n\n\n<li>Objetivos vulnerables (personas que suelen participar en mensajes emocionales)<\/li>\n<\/ul>\n\n\n\n<p>Las secciones de comentarios son minas de oro para los estafadores. La gente suele compartir su ubicaci\u00f3n, n\u00fameros de tel\u00e9fono o incluso experiencias personales, lo que les convierte en objetivos potenciales para futuras estafas.<\/p>\n\n\n\n<p>Este <strong>ayuda a los estafadores a elaborar una lista de v\u00edctimas potenciales<\/strong>que pueden utilizar para <strong>futuras estafas de phishing, robos de identidad o ataques de ingenier\u00eda social<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo puedo protegerme?<\/strong><\/h2>\n\n\n<style>.kb-row-layout-id30939_2a819e-e3 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id30939_2a819e-e3 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id30939_2a819e-e3 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}.kb-row-layout-id30939_2a819e-e3 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id30939_2a819e-e3 > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id30939_2a819e-e3 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id30939_2a819e-e3 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-left-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col,.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_1d54fe-e3{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_1d54fe-e3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_1d54fe-e3\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\"><strong>Verificar antes de compartir<\/strong><\/h3>\n\n\n\n<p>Antes de pulsar \"Compartir\", t\u00f3mate un momento para <strong>verificaci\u00f3n de hechos<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Busque la noticia en Internet. Si realmente ha desaparecido un ni\u00f1o o un animal de compa\u00f1\u00eda, aparecer\u00e1 en <strong>sitios web de noticias, p\u00e1ginas de la polic\u00eda o bases de datos oficiales de personas desaparecidas<\/strong>.<\/li>\n\n\n\n<li>Busque una fuente oficial. Si hay <strong>ning\u00fan enlace con las fuerzas del orden, un art\u00edculo de prensa o una organizaci\u00f3n que se ocupe del caso<\/strong>S\u00e9 esc\u00e9ptico.<\/li>\n\n\n\n<li>B\u00fasqueda inversa de im\u00e1genes. Los estafadores suelen robar fotos de <strong>casos antiguos de personas desaparecidas, noticias no relacionadas o incluso im\u00e1genes de archivo<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>Los estafadores no solo falsifican los avisos de ni\u00f1os desaparecidos, tambi\u00e9n hacen lo mismo con las mascotas desaparecidas. Si no hay informaci\u00f3n clara sobre el propietario ni contactos veterinarios locales, es probable que se trate de una estafa.<\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col,.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_3ecc27-d4{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_3ecc27-d4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_3ecc27-d4\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"716\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/autism-dog.png\" alt=\"\" class=\"wp-image-30986\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/autism-dog.png 636w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/autism-dog-600x675.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/autism-dog-266x300.png 266w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/autism-dog-11x12.png 11w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id30939_7470ff-82 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id30939_7470ff-82 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id30939_7470ff-82 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}.kb-row-layout-id30939_7470ff-82 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id30939_7470ff-82 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr);}}@media all and (max-width: 767px){.kb-row-layout-id30939_7470ff-82 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id30939_7470ff-82 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-right-golden kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column30939_122f63-b7 > .kt-inside-inner-col,.kadence-column30939_122f63-b7 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_122f63-b7 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_122f63-b7 > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_122f63-b7 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_122f63-b7 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_122f63-b7{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_122f63-b7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_122f63-b7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_122f63-b7\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"782\" height=\"1024\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-782x1024.png\" alt=\"\" class=\"wp-image-30991\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-782x1024.png 782w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-600x785.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-229x300.png 229w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-768x1005.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-1173x1536.png 1173w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-1564x2048.png 1564w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download-9x12.png 9w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/download.png 1760w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column30939_391b31-3a > .kt-inside-inner-col,.kadence-column30939_391b31-3a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column30939_391b31-3a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column30939_391b31-3a > .kt-inside-inner-col{flex-direction:column;}.kadence-column30939_391b31-3a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column30939_391b31-3a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column30939_391b31-3a{position:relative;}@media all and (max-width: 1024px){.kadence-column30939_391b31-3a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column30939_391b31-3a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column30939_391b31-3a\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\"><strong>Busque se\u00f1ales de alarma<\/strong><\/h3>\n\n\n\n<p>Siguen muchos puestos de estafa <strong>un patr\u00f3n similar<\/strong>por lo que aprender a detectar las se\u00f1ales de alarma puede ayudarte a <strong>identificarlos al instante<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>No hay polic\u00eda ni informaci\u00f3n de contacto<\/strong><\/li>\n\n\n\n<li><strong>Detalles imprecisos (por ejemplo, sin ubicaci\u00f3n, sin apellido)<\/strong><\/li>\n\n\n\n<li><strong>Comentarios desactivados<\/strong><\/li>\n\n\n\n<li><strong>Urgencia excesiva, pidi\u00e9ndole \"BUMP\" o \"FLOOD FEEDS\".<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Los estafadores suelen desactivar los comentarios para que nadie pueda denunciar el fraude. Si un post tiene detalles vagos, lenguaje urgente y no tiene fuentes oficiales, lo mejor es ignorarlo. <strong>No participar<\/strong> con un \"me gusta\", un comentario o comparti\u00e9ndolo, s\u00f3lo contribuir\u00e1 a su difusi\u00f3n.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Informar y educar<\/strong><\/h3>\n\n\n\n<p>Una vez que detectas una estafa, <strong>ayuda a impedir que se propague<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Denunciar el puesto<\/strong> en Facebook u otras plataformas para que pueda ser eliminado.<\/li>\n\n\n\n<li><strong>Avisa a tus amigos y familiares<\/strong> si les ves participando en estas estafas.<\/li>\n\n\n\n<li><strong>Compartir informaci\u00f3n real<\/strong>-dirigir a la gente a fuentes leg\u00edtimas como la <strong>polic\u00eda, organizaciones de personas desaparecidas o art\u00edculos de prensa verificados<\/strong> en su lugar.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>No se apresure a reaccionar<\/strong><\/h3>\n\n\n\n<p>En <strong>mayor error<\/strong> que hace la gente es comprometerse con los mensajes <strong>antes de verificarlos.<\/strong> Incluso algo tan simple como un <strong>un \"me gusta\" o un comentario puede contribuir a la difusi\u00f3n de una estafa.<\/strong><\/p>\n\n\n\n<p>Antes de reaccionar, preg\u00fantese:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00bfTiene este puesto <strong>fuentes oficiales<\/strong> (como informes policiales o art\u00edculos de prensa)?<\/li>\n\n\n\n<li>\u00bfViene de <strong>una organizaci\u00f3n de confianza<\/strong> \u00bfo s\u00f3lo una cuenta al azar?<\/li>\n\n\n\n<li>\u00bfExisten <strong>detalles claros,<\/strong> \u00bfo es s\u00f3lo lenguaje emocional sin detalles concretos?<\/li>\n<\/ul>\n\n\n\n<p>Si algo de esto le preocupa, <strong>no se comprometan.<\/strong> La mejor manera de detener una estafa es <strong>detener su alcance.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-791x1024.png\" alt=\"\" class=\"wp-image-30993\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-791x1024.png 791w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-600x777.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-232x300.png 232w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-768x994.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-1187x1536.png 1187w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1-9x12.png 9w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/01\/test-grace-1.png 1545w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/figure>\n\n\n\n<p>Descargue la siguiente hoja de consejos. No dude en publicarla y compartirla para ayudar a concienciar y proteger a otros de estas estafas.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns30939_bceeda-7f{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns30939_bceeda-7f .kt-button{font-weight:normal;font-style:normal;}.kt-btns30939_bceeda-7f .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns30939_bceeda-7f .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns30939_bceeda-7f\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn30939_b23c7d-dd.kb-button{width:initial;}<\/style><a class=\"kb-button kt-button button kb-btn30939_b23c7d-dd kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/02\/2024-01-28-please-share-scam-tipsheet-en.pdf\"><span class=\"kt-btn-inner-text\">Descargar la hoja de consejos<\/span><\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusi\u00f3n: Pausa antes de compartir<\/strong><\/h2>\n\n\n\n<p>Los estafadores saben que <strong>la gente de buen coraz\u00f3n quiere ayudar<\/strong>y se aprovechan de esa generosidad para <strong>difundir mensajes falsos y robar confianza<\/strong>. La pr\u00f3xima vez que veas un emotivo ruego pidi\u00e9ndote que <strong>\"\u00a1Por favor, comparte!\"<\/strong>t\u00f3mese un momento para <strong>pausa y verifica<\/strong>.<\/p>\n\n\n\n<p>Manteni\u00e9ndose informado y <strong>pensar antes de hacer clic<\/strong>podemos <strong>impedir que los estafadores se aprovechen de nuestra amabilidad<\/strong> y <strong>haz de las redes sociales un espacio m\u00e1s seguro<\/strong>.<\/p>\n\n\n\n<p>Permanezca en <strong>#UnHackable<\/strong> con <strong>\u00a1KnowledgeFlow!<\/strong><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>'Por favor, comparte'-Una estafa viral disfrazada Internet est\u00e1 lleno de mensajes que instan a la gente a \"\u00a1Por favor, comparte!\". Ya se trate de...<\/p>","protected":false},"featured_media":29263,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"resource-type":[],"topic":[],"resource-initiative":[],"class_list":["post-30939","resource","type-resource","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"taxonomy_info":[],"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-1024x256.png",1024,256,true],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource\/30939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":5,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource\/30939\/revisions"}],"predecessor-version":[{"id":31047,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource\/30939\/revisions\/31047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/29263"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=30939"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-type?post=30939"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/topic?post=30939"},{"taxonomy":"resource-initiative","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-initiative?post=30939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}