{"id":26,"date":"2026-03-14T05:12:11","date_gmt":"2026-03-14T05:12:11","guid":{"rendered":"https:\/\/guyid.com\/blog\/dating-scam-detection-guide-safer-online-connections\/"},"modified":"2026-03-15T02:02:23","modified_gmt":"2026-03-15T02:02:23","slug":"dating-scam-detection-guide-safer-online-connections","status":"publish","type":"post","link":"https:\/\/guyid.com\/blog\/dating-scam-detection-guide-safer-online-connections\/","title":{"rendered":"Dating scam detection guide for safer online connections"},"content":{"rendered":"<div id=\"gid-art\">\n<p class=\"ga-lead\">Dating scams have exploded across online platforms, with thousands of users losing money and trust to sophisticated fraudsters every year. These scammers prey on genuine people seeking connection, using fake profiles and emotional manipulation to steal personal information and funds. This guide arms you with practical detection methods, verification tools, and step by step strategies to spot red flags before you become a victim. You&#8217;ll learn how to protect yourself and make smarter decisions when meeting people online.<\/p>\n<nav class=\"ga-toc\" aria-label=\"Contents\"><span class=\"ga-toc-lbl\">In this guide<\/span><\/p>\n<ol>\n<li><a href=\"#ga1\">Understanding Dating Scams and Common Red Flags<\/a><\/li>\n<li><a href=\"#ga2\">Preparing to Spot Scams: Tools and Prerequisites<\/a><\/li>\n<li><a href=\"#ga3\">Step by Step Dating Scam Detection Process<\/a><\/li>\n<li><a href=\"#ga4\">Verifying Identities and Avoiding Common Mistakes<\/a><\/li>\n<li><a href=\"#ga5\">Protect Yourself with Proven Detection Tools<\/a><\/li>\n<li><a href=\"#ga6\">Frequently Asked Questions<\/a><\/li>\n<\/ol>\n<\/nav>\n<div class=\"ga-kts\"><span class=\"ga-kts-t\">\u26a1 Key Takeaways<\/span><\/p>\n<div class=\"ga-kt\">\n<div class=\"ga-kt-d\"><\/div>\n<div>\n<div class=\"ga-kt-pt\">Recognize warning signs<\/div>\n<div class=\"ga-kt-dt\">Learn to identify common scammer tactics like inconsistent stories, money requests, and reluctance to meet in person<\/div>\n<\/div>\n<\/div>\n<div class=\"ga-kt\">\n<div class=\"ga-kt-d\"><\/div>\n<div>\n<div class=\"ga-kt-pt\">Prepare verification tools<\/div>\n<div class=\"ga-kt-dt\">Gather information and use digital tools to analyze profiles, photos, and behavior before trusting someone online<\/div>\n<\/div>\n<\/div>\n<div class=\"ga-kt\">\n<div class=\"ga-kt-d\"><\/div>\n<div>\n<div class=\"ga-kt-pt\">Follow structured steps<\/div>\n<div class=\"ga-kt-dt\">Apply a proven detection process from profile analysis to direct validation for safer interactions<\/div>\n<\/div>\n<\/div>\n<div class=\"ga-kt\">\n<div class=\"ga-kt-d\"><\/div>\n<div>\n<div class=\"ga-kt-pt\">Avoid common mistakes<\/div>\n<div class=\"ga-kt-dt\">Skip pitfalls like rushing trust or sharing personal data too soon that make you vulnerable to scams<\/div>\n<\/div>\n<\/div>\n<div class=\"ga-kt\">\n<div class=\"ga-kt-d\"><\/div>\n<div>\n<div class=\"ga-kt-pt\">Use detection resources<\/div>\n<div class=\"ga-kt-dt\">Leverage specialized tools to supplement manual checks and gain confidence in your online dating safety<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2 id=\"ga1\">Understanding Dating Scams and Common Red Flags<\/h2>\n<p>Dating scams come in many forms, but they all share one goal: exploiting your emotions and trust for financial gain. Catfishing involves creating fake identities with stolen photos and fabricated backgrounds to lure victims into relationships. Romance scams take this further, building deep emotional bonds over weeks or months before requesting money for emergencies, travel, or business opportunities. <a href=\"https:\/\/guyid.com\/dating-safety-statistics\">Scammers often use emotional manipulation and fake photos to lure victims<\/a>, making it critical to recognize their tactics early.<\/p>\n<p>These fraudsters follow predictable patterns once you know what to watch for. They craft elaborate stories about their lives, often claiming to work overseas in military service, oil rigs, or international business. Their profiles feature professional quality photos that seem too perfect, and their messages move quickly from casual chat to declarations of love. When pressed for video calls or in person meetings, they manufacture excuses about broken cameras, poor internet, or work restrictions.<\/p>\n<p>Several red flags should trigger immediate skepticism. Watch for inconsistent details about their background, location, or daily activities that don&#8217;t add up when you review past conversations. Be alert if they pressure you to move conversations off the dating platform to private messaging apps where there&#8217;s less oversight. Any request for money, gift cards, or financial help, regardless of the sob story attached, is a massive warning sign. Scammers also create urgency and secrecy, insisting you keep the relationship private from friends and family who might spot the deception.<\/p>\n<div class=\"ga-tip\"><span class=\"ga-tip-i\">\ud83d\udca1<\/span><\/p>\n<div>\n<span class=\"ga-tip-l\">Pro Tip<\/span><br \/>\nScreenshot early conversations and profile details. Scammers often change their stories, and having records helps you catch contradictions that reveal their fraud.\n<\/div>\n<\/div>\n<div class=\"ga-q\">&#8220;The best defense against dating scams is skepticism paired with verification. Trust your instincts when something feels off, and never let emotional attachment override common sense safety practices.&#8221;<\/div>\n<p>Recognizing these patterns at the conversation&#8217;s start protects you from investing time, emotion, and money into a relationship built on lies. The earlier you spot red flags, the easier it is to walk away unharmed.<\/p>\n<div class=\"ga-hr\"><\/div>\n<h2 id=\"ga2\">Preparing to Spot Scams: Tools and Prerequisites<\/h2>\n<p>Before engaging deeply with anyone online, gather the right information and tools to verify their identity and spot potential fraud. Start by collecting basic details they share: full name, location, occupation, and any photos they send. Note their social media handles if they provide them, and pay attention to how much information they volunteer versus how much they deflect or keep vague.<\/p>\n<p>Several digital tools can help you analyze profiles and detect scams before you invest emotional energy. Reverse image search services let you check if profile photos appear elsewhere online under different names or contexts. The <a href=\"https:\/\/guyid.com\/tools\/catfish-probability-detector\">catfish probability detector<\/a> analyzes multiple profile signals to assess fraud likelihood. Social media cross checking reveals whether their claimed identity matches public profiles with consistent histories, friends, and activity patterns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/csuxjmfbwmkxiegfpljm.supabase.co\/storage\/v1\/object\/public\/blog-images\/organization-20809\/1773452928135_Man-uses-phone-for-profile-verification.png\" alt=\"Man using phone to verify a dating profile for scam detection\" width=\"760\" height=\"427\" \/><br \/>\n<span class=\"ga-cap\">Verifying dating profiles with the right tools is your first line of defense against scammers<\/span><\/p>\n<p><span class=\"ga-grid-lbl\">Scam Detection Tools at a Glance<\/span><\/p>\n<div class=\"ga-cards\">\n<div class=\"ga-card\">\n<div class=\"ga-ch\">\ud83d\udd0d Reverse Image Search<\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Detects<\/span><span class=\"gp gp-h\">Stolen Photos<\/span><\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Best For<\/span><span class=\"ga-cv\">Photo Authenticity<\/span><\/div>\n<\/div>\n<div class=\"ga-card\">\n<div class=\"ga-ch\">\ud83d\udcca Profile Analysis Tools<\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Detects<\/span><span class=\"gp gp-vh\">Behavior Patterns<\/span><\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Best For<\/span><span class=\"ga-cv\">Fraud Probability<\/span><\/div>\n<\/div>\n<div class=\"ga-card\">\n<div class=\"ga-ch\">\ud83d\udd17 Social Media Verification<\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Detects<\/span><span class=\"gp gp-m\">Identity Gaps<\/span><\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Best For<\/span><span class=\"ga-cv\">Confirming Real People<\/span><\/div>\n<\/div>\n<div class=\"ga-card\">\n<div class=\"ga-ch\">\ud83d\udea9 Bio Red Flag Detectors<\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Detects<\/span><span class=\"gp gp-l\">Suspicious Language<\/span><\/div>\n<div class=\"ga-cr\"><span class=\"ga-ck\">Best For<\/span><span class=\"ga-cv\">Profile Content Analysis<\/span><\/div>\n<\/div>\n<\/div>\n<p>Using technology and tools increases scam detection success, but preparation goes beyond software. Develop emotional readiness to stay skeptical without becoming cynical. Remind yourself that legitimate people won&#8217;t rush you or pressure you into decisions. They&#8217;ll understand if you want to verify their identity before deepening the connection. This mindset protects you from the urgency tactics scammers deploy to bypass your rational thinking.<\/p>\n<div class=\"ga-tip\"><span class=\"ga-tip-i\">\ud83d\udd0d<\/span><\/p>\n<div>\n<span class=\"ga-tip-l\">Pro Tip<\/span><br \/>\nRun profile photos through multiple reverse image searches using different services. Scammers sometimes edit photos slightly to evade detection on a single platform, but cross checking catches more fraud.\n<\/div>\n<\/div>\n<p>Gather screenshots of profiles, messages, and any suspicious claims before they can delete or modify them. This documentation proves invaluable if you need to report the scammer or warn others. Approach each new connection with cautious optimism, ready to verify before you trust, and you&#8217;ll dramatically reduce your vulnerability to dating fraud.<\/p>\n<div class=\"ga-hr\"><\/div>\n<h2 id=\"ga3\">Step by Step Dating Scam Detection Process<\/h2>\n<p>Following a structured approach helps you systematically evaluate whether someone online is genuine or fraudulent. Commit to each step before moving forward in any relationship.<\/p>\n<h3>Step 1: Analyze the Profile and Bio<\/h3>\n<p>Compare what you see against typical genuine profiles versus common scam characteristics. Real profiles usually have varied photos showing the person in different settings with friends or family, while scam profiles often feature only professional looking solo shots. Genuine bios include specific details about hobbies, local references, and realistic life descriptions, whereas fraudulent ones use vague language, claim exotic careers, or include grammatical errors suggesting foreign origins.<\/p>\n<table class=\"ga-tbl\">\n<thead>\n<tr>\n<th>Genuine Profile Traits<\/th>\n<th>Scam Profile Traits<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Multiple casual photos with others<\/td>\n<td>Only professional or model quality solo photos<\/td>\n<\/tr>\n<tr>\n<td>Specific local details and realistic job<\/td>\n<td>Vague location, exotic career claims<\/td>\n<\/tr>\n<tr>\n<td>Natural grammar and conversational tone<\/td>\n<td>Generic messages, poor grammar, copied text<\/td>\n<\/tr>\n<tr>\n<td>Gradual relationship building<\/td>\n<td>Rapid emotional intensity and love bombing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Step 2: Use Specialized Detection Tools<\/h3>\n<p>Run their profile through a <a href=\"https:\/\/guyid.com\/tools\/dating-bio-red-flag-detector\">dating bio red flag detector<\/a> to identify suspicious language patterns and claims. These tools analyze word choice, emotional manipulation tactics, and common scammer phrases that humans might miss. Cross reference profile photos with reverse image searches to see if they appear elsewhere online.<\/p>\n<h3>Step 3: Conduct Direct Validation<\/h3>\n<p>Insist on a video chat before the relationship progresses, and watch for excuses about broken cameras or poor connections that persist over multiple requests. Ask them to send a photo holding a sign with today&#8217;s date and a specific phrase you provide, which scammers using stolen images cannot easily fake. Verify their social media accounts show years of authentic activity, not recently created profiles with minimal history.<\/p>\n<h3>Step 4: Watch for Behavioral Red Flags<\/h3>\n<p>Notice if they deflect personal questions, avoid specifics about their daily life, or can&#8217;t provide details that someone living where they claim would know. Be alert to any financial requests, no matter how they frame them as loans, investments, or emergency help. Scammers create artificial urgency to prevent you from thinking clearly or consulting friends who would spot the fraud.<\/p>\n<h3>Step 5: Disengage if Doubts Persist<\/h3>\n<p>Trust your instincts when something feels wrong, even if you can&#8217;t pinpoint exactly what. Legitimate people understand caution and won&#8217;t punish you for wanting verification. If they react with anger, guilt trips, or increased pressure when you ask reasonable questions, that response itself confirms your suspicions.<\/p>\n<div class=\"ga-tip\"><span class=\"ga-tip-i\">\ud83d\udccb<\/span><\/p>\n<div>\n<span class=\"ga-tip-l\">Pro Tip<\/span><br \/>\nDocument everything suspicious in a dedicated file with screenshots, dates, and notes. This evidence helps you report the scammer to platforms and authorities, potentially protecting others from the same fraud.\n<\/div>\n<\/div>\n<p>This systematic approach transforms vague unease into concrete verification steps. By following each phase methodically, you remove emotion from the equation and make safety based decisions grounded in evidence rather than hope.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/csuxjmfbwmkxiegfpljm.supabase.co\/storage\/v1\/object\/public\/blog-images\/organization-20809\/1773452906626_Infographic-on-dating-scam-warning-signs-and-actions.png\" alt=\"Infographic showing dating scam warning signs and protective actions to take\" width=\"760\" height=\"427\" \/><br \/>\n<span class=\"ga-cap\">A structured detection process helps you identify scammers before they can cause harm<\/span><\/p>\n<div class=\"ga-hr\"><\/div>\n<h2 id=\"ga4\">Verifying Identities and Avoiding Common Mistakes<\/h2>\n<p>Once you&#8217;ve detected potential red flags, verification becomes your strongest defense against dating fraud. Video calls provide the most reliable real time confirmation because scammers using stolen photos can&#8217;t fake live interaction. Request calls at different times and dates to ensure they&#8217;re not using pre recorded videos, and ask them to perform simple actions like waving or holding up objects to prove the feed is live.<\/p>\n<p>Social media cross checking offers another powerful verification layer. Search for their name and location across multiple platforms to find profiles that match their claims. Genuine people typically have established accounts with years of posts, tagged photos with friends, and interactions that demonstrate real social connections. Look for consistency in appearance, background details, and timeline across platforms. If someone claims to be 35 but their Facebook shows a graduation year suggesting they&#8217;re actually 50, that discrepancy demands explanation.<\/p>\n<p>Ask for additional proof of identity when appropriate. While you shouldn&#8217;t demand sensitive documents early in a relationship, someone genuinely interested in building trust will understand reasonable verification requests. They might share a work ID with sensitive details blurred, show you their business website, or introduce you to friends via group video chat. These gestures cost nothing for honest people but prove impossible for scammers.<\/p>\n<p>Many victims fall prey to common mistakes that undermine even careful detection efforts. Skipping verification steps because the connection feels special or the person seems trustworthy is the most dangerous error. Emotional rushing, where you let feelings override rational caution, plays directly into scammer manipulation tactics designed to bypass your defenses.<\/p>\n<p>Sharing personal information too soon creates vulnerability before you&#8217;ve confirmed someone&#8217;s identity. Avoid revealing your home address, workplace details, financial information, or other data that could be exploited for identity theft or stalking. Legitimate romantic interests won&#8217;t need this information in early conversations and will respect boundaries around privacy.<\/p>\n<div class=\"ga-q\">&#8220;Never send money, gift cards, or financial assistance to someone you haven&#8217;t met in person and thoroughly verified. No genuine romantic interest requires financial help from someone they&#8217;ve never met face to face.&#8221;<\/div>\n<p>Pacing trust appropriately means matching your emotional investment to the verification you&#8217;ve completed. Stay alert even after initial verification, because sophisticated scammers sometimes pass early checks before revealing their true intentions later. Maintain healthy skepticism throughout the relationship&#8217;s development, and remember that real love doesn&#8217;t require you to compromise your safety or financial security.<\/p>\n<div class=\"ga-hr\"><\/div>\n<h2 id=\"ga5\">Protect Yourself with Proven Detection Tools<\/h2>\n<p>Detecting dating scams requires both awareness and the right technology to analyze profiles effectively. While manual verification catches many fraudsters, specialized tools provide additional layers of protection by identifying patterns and red flags that humans might miss. These resources complement your personal judgment and make the verification process faster and more thorough.<\/p>\n<p>The <a href=\"https:\/\/guyid.com\/tools\/dating-bio-red-flag-detector\">dating bio red flag detector<\/a> analyzes profile text for suspicious language patterns, emotional manipulation tactics, and common phrases scammers use. The <a href=\"https:\/\/guyid.com\/tools\/catfish-probability-detector\">catfish probability detector<\/a> evaluates multiple profile signals simultaneously to assess fraud likelihood, giving you an objective risk assessment before you invest time in conversations. These tools work together to provide comprehensive analysis that strengthens your safety.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/csuxjmfbwmkxiegfpljm.supabase.co\/storage\/v1\/object\/public\/blog-images\/organization-20809\/1773452781983_guyid.jpg\" alt=\"GuyID dating safety and identity verification platform\" width=\"760\" height=\"427\" \/><br \/>\n<span class=\"ga-cap\">GuyID provides specialized scam detection tools to keep you safe while dating online<\/span><\/p>\n<p>Using these detection resources doesn&#8217;t mean you&#8217;re paranoid or overly suspicious. It means you&#8217;re smart about protecting yourself in an environment where fraud is common. Think of these tools as insurance for your emotional and financial wellbeing, providing peace of mind as you navigate online dating. They help you make informed decisions based on data rather than just intuition, especially useful when emotions might cloud your judgment.<\/p>\n<p>Explore our <a href=\"https:\/\/guyid.com\/dating-safety-statistics\">dating safety statistics<\/a> to understand the full scope of online dating fraud and arm yourself with knowledge. The more you know about how scammers operate and how common their tactics are, the better prepared you&#8217;ll be to spot them.<\/p>\n<div class=\"ga-cta\"><span class=\"ga-cta-h\">Stay Safe While Dating Online<\/span><br \/>\n<span class=\"ga-cta-p\">GuyID&#8217;s free detection tools help you verify profiles and catch scammers before they can cause harm.<\/span><\/p>\n<div class=\"ga-btns\"><a class=\"ga-btn-g\" href=\"https:\/\/guyid.com\/tools\/catfish-probability-detector\">Check a Profile Free<\/a><br \/>\n<a class=\"ga-btn-o\" href=\"https:\/\/guyid.com\/tools\/dating-bio-red-flag-detector\">Scan a Dating Bio<\/a><\/div>\n<\/div>\n<div id=\"ga6\" class=\"ga-faq\">\n<h2>Frequently Asked Questions<\/h2>\n<details class=\"ga-fi\">\n<summary class=\"ga-fq\">What is a dating scam and how common are they?<\/summary>\n<div class=\"ga-fa\">Dating scams involve fraudsters creating fake romantic relationships to exploit victims emotionally and financially. They&#8217;re alarmingly frequent on dating platforms, with thousands of cases reported annually and many more going unreported due to embarrassment. Scammers use stolen photos, fabricated identities, and emotional manipulation to build trust before requesting money or personal information.<\/div>\n<\/details>\n<details class=\"ga-fi\">\n<summary class=\"ga-fq\">How can I verify if someone is truly who they claim to be?<\/summary>\n<div class=\"ga-fa\">Request video calls at different times to confirm they match their photos and can interact in real time. Perform reverse image searches on their profile pictures to check if they appear elsewhere online under different names. Cross reference their social media accounts for years of consistent activity, friend connections, and details that match what they&#8217;ve told you.<\/div>\n<\/details>\n<details class=\"ga-fi\">\n<summary class=\"ga-fq\">What are the top warning signs of a dating scam?<\/summary>\n<div class=\"ga-fa\">Watch for inconsistent stories about their background, location, or daily life that don&#8217;t align with previous conversations. Be alert if they avoid meeting in person or video chatting despite weeks of messaging, especially with excuses about broken equipment or work restrictions. Any requests for money, gift cards, or financial help represent major red flags, as do demands for secrecy about your relationship.<\/div>\n<\/details>\n<details class=\"ga-fi\">\n<summary class=\"ga-fq\">Can I report a suspected dating scammer and how?<\/summary>\n<div class=\"ga-fa\">Report suspected scammers immediately to the dating platform where you met them, using their built in reporting features. File complaints with the Federal Trade Commission and Internet Crime Complaint Center to help authorities track fraud patterns. Keep all evidence including messages, photos, profile screenshots, and transaction records to assist investigations and potentially help recover losses.<\/div>\n<\/details>\n<\/div>\n<div class=\"ga-abtm\">\n<div class=\"ga-bava\"><img decoding=\"async\" src=\"https:\/\/guyidblog-smjvbzvhve.live-website.com\/wp-content\/uploads\/2026\/03\/ravishankar-photo.jpg\" alt=\"Ravi Shankar \u2014 Founder of GuyID\" \/><br \/>\n<span class=\"ga-bava-i\" style=\"display: none;\">RS<\/span><\/div>\n<div><span class=\"ga-bn\">About Ravi Shankar<\/span><br \/>\n<span class=\"ga-br\">Founder, GuyID \u00b7 Dating Safety Researcher \u00b7 13+ Years in Data Analytics<\/span><br \/>\n<span class=\"ga-bb\">Ravi Shankar is the founder of <a href=\"https:\/\/guyid.com\">GuyID<\/a>, a consent-based identity verification platform for online dating. With 13+ years in data analytics and a deep focus on consumer trust, Ravi built GuyID to close the safety gap women face in digital dating. His research found 92% of women report safety concerns, validating GuyID&#8217;s mission to lead the next wave of <strong>dating scam detection<\/strong> tools.<\/span><br \/>\n<a class=\"ga-li\" href=\"https:\/\/www.linkedin.com\/in\/ravi-shankar-analytics\/\" target=\"_blank\" rel=\"noopener noreferrer\">Connect on LinkedIn<\/a><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn to detect dating scams with proven verification methods, red flag identification, and step by step strategies to protect yourself from online fraud and catfishing.<\/p>\n","protected":false},"author":2,"featured_media":28,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"default","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dating-safety"],"_links":{"self":[{"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":2,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":59,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/posts\/26\/revisions\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/media\/28"}],"wp:attachment":[{"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guyid.com\/blog\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}