{"id":2674,"date":"2025-05-28T06:16:54","date_gmt":"2025-05-28T06:16:54","guid":{"rendered":"https:\/\/buvei.com\/blog\/?p=2674"},"modified":"2025-05-28T11:15:55","modified_gmt":"2025-05-28T11:15:55","slug":"kyc-vs-kyb-identity-business-verification-3","status":"publish","type":"post","link":"https:\/\/buvei.com\/blog\/pt\/kyc-vs-kyb-identity-business-verification-3\/","title":{"rendered":"KYC e KYB: o que s\u00e3o e por que s\u00e3o cruciais para o ecossistema financeiro moderno"},"content":{"rendered":"<p data-start=\"200\" data-end=\"637\">Em um mundo financeiro cada vez mais regulado, saber exatamente com quem voc\u00ea est\u00e1 fazendo neg\u00f3cios \u2014 seja uma pessoa f\u00edsica ou uma empresa \u2014 \u00e9 essencial para evitar fraudes, lavagem de dinheiro e danos \u00e0 reputa\u00e7\u00e3o. Duas ferramentas centrais ajudam nesse processo: <strong data-start=\"465\" data-end=\"494\">KYC (Conhe\u00e7a seu Cliente)<\/strong> e <strong data-start=\"497\" data-end=\"526\">KYB (Conhe\u00e7a seu Neg\u00f3cio)<\/strong>. Embora tenham objetivos semelhantes \u2014 a mitiga\u00e7\u00e3o de riscos \u2014, seus focos e processos s\u00e3o bastante distintos.<\/p>\n<h3 data-start=\"639\" data-end=\"655\">O que \u00e9 KYC?<\/h3>\n<p data-start=\"657\" data-end=\"842\">KYC \u00e9 o processo utilizado por institui\u00e7\u00f5es financeiras, provedores de pagamento e empresas reguladas para verificar a identidade de seus clientes individuais. Seu objetivo principal \u00e9:<\/p>\n<ul data-start=\"844\" data-end=\"1125\">\n<li data-start=\"844\" data-end=\"929\">\n<p data-start=\"846\" data-end=\"929\">Confirmar se a pessoa realmente existe e n\u00e3o est\u00e1 utilizando uma identidade falsa<\/p>\n<\/li>\n<li data-start=\"930\" data-end=\"1035\">\n<p data-start=\"932\" data-end=\"1035\">Avaliar o risco de envolvimento em atividades como lavagem de dinheiro ou financiamento ao terrorismo<\/p>\n<\/li>\n<li data-start=\"1036\" data-end=\"1125\">\n<p data-start=\"1038\" data-end=\"1125\">Atender \u00e0s exig\u00eancias legais e regulat\u00f3rias, como leis contra lavagem de dinheiro (AML)<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1127\" data-end=\"1160\"><strong data-start=\"1127\" data-end=\"1160\">Etapas comuns do KYC incluem:<\/strong><\/p>\n<ul data-start=\"1162\" data-end=\"1688\">\n<li data-start=\"1162\" data-end=\"1296\">\n<p data-start=\"1164\" data-end=\"1191\">Verifica\u00e7\u00e3o de identidade<\/p>\n<ul data-start=\"1194\" data-end=\"1296\">\n<li data-start=\"1194\" data-end=\"1251\">\n<p data-start=\"1196\" data-end=\"1251\">Envio de documento com foto emitido por \u00f3rg\u00e3o oficial<\/p>\n<\/li>\n<li data-start=\"1254\" data-end=\"1296\">\n<p data-start=\"1256\" data-end=\"1296\">Valida\u00e7\u00e3o facial ou selfie em tempo real<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1298\" data-end=\"1383\">\n<p data-start=\"1300\" data-end=\"1325\">Verifica\u00e7\u00e3o de endere\u00e7o<\/p>\n<ul data-start=\"1328\" data-end=\"1383\">\n<li data-start=\"1328\" data-end=\"1383\">\n<p data-start=\"1330\" data-end=\"1383\">Envio de conta de servi\u00e7o ou extrato banc\u00e1rio recente<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1385\" data-end=\"1577\">\n<p data-start=\"1387\" data-end=\"1407\">Avalia\u00e7\u00e3o de risco<\/p>\n<ul data-start=\"1410\" data-end=\"1577\">\n<li data-start=\"1410\" data-end=\"1463\">\n<p data-start=\"1412\" data-end=\"1463\">An\u00e1lise de ocupa\u00e7\u00e3o, renda e padr\u00f5es de transa\u00e7\u00e3o<\/p>\n<\/li>\n<li data-start=\"1466\" data-end=\"1577\">\n<p data-start=\"1468\" data-end=\"1577\">Sinaliza\u00e7\u00e3o de perfis de alto risco (por exemplo, pessoas desempregadas que realizam transfer\u00eancias elevadas)<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1579\" data-end=\"1688\">\n<p data-start=\"1581\" data-end=\"1605\">Monitoramento cont\u00ednuo<\/p>\n<ul data-start=\"1608\" data-end=\"1688\">\n<li data-start=\"1608\" data-end=\"1688\">\n<p data-start=\"1610\" data-end=\"1688\">Detec\u00e7\u00e3o de atividades incomuns, como transfer\u00eancias internacionais repentinas<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3 data-start=\"1690\" data-end=\"1721\">Por que o KYC \u00e9 importante?<\/h3>\n<ul data-start=\"1723\" data-end=\"2258\">\n<li data-start=\"1723\" data-end=\"1859\">\n<p data-start=\"1725\" data-end=\"1859\"><strong data-start=\"1725\" data-end=\"1756\">Combate ao crime financeiro<\/strong><br data-start=\"1756\" data-end=\"1759\" \/>Garante que o cliente seja uma pessoa real e n\u00e3o um fraudador tentando movimentar fundos il\u00edcitos.<\/p>\n<\/li>\n<li data-start=\"1861\" data-end=\"2006\">\n<p data-start=\"1863\" data-end=\"2006\"><strong data-start=\"1863\" data-end=\"1891\">Conformidade regulat\u00f3ria<\/strong><br data-start=\"1891\" data-end=\"1894\" \/>Evita multas e san\u00e7\u00f5es por descumprimento de leis como o Bank Secrecy Act dos EUA ou a AMLD da Uni\u00e3o Europeia.<\/p>\n<\/li>\n<li data-start=\"2008\" data-end=\"2129\">\n<p data-start=\"2010\" data-end=\"2129\"><strong data-start=\"2010\" data-end=\"2044\">Protege a reputa\u00e7\u00e3o da empresa<\/strong><br data-start=\"2044\" data-end=\"2047\" \/>Evita o onboarding de clientes mal-intencionados que possam comprometer a marca.<\/p>\n<\/li>\n<li data-start=\"2131\" data-end=\"2258\">\n<p data-start=\"2133\" data-end=\"2258\"><strong data-start=\"2133\" data-end=\"2169\">Melhora a experi\u00eancia do usu\u00e1rio<\/strong><br data-start=\"2169\" data-end=\"2172\" \/>Compreender o perfil do cliente permite oferecer produtos e servi\u00e7os mais adequados.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2675 aligncenter\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-300x170.jpg\" alt=\"\" width=\"476\" height=\"270\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-300x170.jpg 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-1024x579.jpg 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-768x434.jpg 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-400x226.jpg 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-800x452.jpg 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-832x470.jpg 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3-1248x705.jpg 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-1-3.jpg 1472w\" sizes=\"auto, (max-width: 476px) 100vw, 476px\" \/><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2260\" data-end=\"2276\">O que \u00e9 KYB?<\/h3>\n<p data-start=\"2278\" data-end=\"2508\">KYB aplica os mesmos princ\u00edpios do KYC, mas voltado para empresas e organiza\u00e7\u00f5es. O objetivo \u00e9 garantir que a entidade jur\u00eddica realmente existe, atua de forma leg\u00edtima e n\u00e3o \u00e9 uma empresa de fachada criada para fins fraudulentos.<\/p>\n<p data-start=\"2510\" data-end=\"2544\"><strong data-start=\"2510\" data-end=\"2544\">Etapas t\u00edpicas do KYB incluem:<\/strong><\/p>\n<ul data-start=\"2546\" data-end=\"3202\">\n<li data-start=\"2546\" data-end=\"2658\">\n<p data-start=\"2548\" data-end=\"2577\"><strong data-start=\"2548\" data-end=\"2575\">Documentos corporativos<\/strong><\/p>\n<ul data-start=\"2580\" data-end=\"2658\">\n<li data-start=\"2580\" data-end=\"2658\">\n<p data-start=\"2582\" data-end=\"2658\">Verifica\u00e7\u00e3o de licen\u00e7a de funcionamento, estatuto social, e inscri\u00e7\u00e3o fiscal<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2660\" data-end=\"2881\">\n<p data-start=\"2662\" data-end=\"2721\"><strong data-start=\"2662\" data-end=\"2719\">Identifica\u00e7\u00e3o de s\u00f3cios e benefici\u00e1rios finais (UBOs)<\/strong><\/p>\n<ul data-start=\"2724\" data-end=\"2881\">\n<li data-start=\"2724\" data-end=\"2826\">\n<p data-start=\"2726\" data-end=\"2826\">Uso de bancos de dados corporativos (como OpenCorporates) para entender a estrutura de propriedade<\/p>\n<\/li>\n<li data-start=\"2829\" data-end=\"2881\">\n<p data-start=\"2831\" data-end=\"2881\">Identifica\u00e7\u00e3o de quem realmente controla a empresa<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2883\" data-end=\"2989\">\n<p data-start=\"2885\" data-end=\"2926\"><strong data-start=\"2885\" data-end=\"2924\">Valida\u00e7\u00e3o das atividades comerciais<\/strong><\/p>\n<ul data-start=\"2929\" data-end=\"2989\">\n<li data-start=\"2929\" data-end=\"2989\">\n<p data-start=\"2931\" data-end=\"2989\">Revis\u00e3o de contratos, notas fiscais e registros log\u00edsticos<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2991\" data-end=\"3084\">\n<p data-start=\"2993\" data-end=\"3028\"><strong data-start=\"2993\" data-end=\"3026\">Avalia\u00e7\u00e3o da sa\u00fade financeira<\/strong><\/p>\n<ul data-start=\"3031\" data-end=\"3084\">\n<li data-start=\"3031\" data-end=\"3084\">\n<p data-start=\"3033\" data-end=\"3084\">An\u00e1lise de balan\u00e7os, fluxo de caixa e endividamento<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"3086\" data-end=\"3202\">\n<p data-start=\"3088\" data-end=\"3135\"><strong data-start=\"3088\" data-end=\"3133\">Verifica\u00e7\u00e3o de san\u00e7\u00f5es e m\u00eddias negativas<\/strong><\/p>\n<ul data-start=\"3138\" data-end=\"3202\">\n<li data-start=\"3138\" data-end=\"3202\">\n<p data-start=\"3140\" data-end=\"3202\">Pesquisa em listas de san\u00e7\u00f5es e cobertura negativa na imprensa<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3 data-start=\"3204\" data-end=\"3234\">Por que o KYB \u00e9 essencial?<\/h3>\n<ul data-start=\"3236\" data-end=\"3757\">\n<li data-start=\"3236\" data-end=\"3354\">\n<p data-start=\"3238\" data-end=\"3354\"><strong data-start=\"3238\" data-end=\"3276\">Confirma a legitimidade da empresa<\/strong><br data-start=\"3276\" data-end=\"3279\" \/>Garante que a entidade esteja registrada e operando dentro da legalidade.<\/p>\n<\/li>\n<li data-start=\"3356\" data-end=\"3480\">\n<p data-start=\"3358\" data-end=\"3480\"><strong data-start=\"3358\" data-end=\"3394\">Identifica controladores ocultos<\/strong><br data-start=\"3394\" data-end=\"3397\" \/>Revela estruturas complexas que possam esconder lavagem de dinheiro ou corrup\u00e7\u00e3o.<\/p>\n<\/li>\n<li data-start=\"3482\" data-end=\"3602\">\n<p data-start=\"3484\" data-end=\"3602\"><strong data-start=\"3484\" data-end=\"3512\">Avalia riscos comerciais<\/strong><br data-start=\"3512\" data-end=\"3515\" \/>Ajuda a evitar parcerias com empresas inst\u00e1veis ou envolvidas em atividades de risco.<\/p>\n<\/li>\n<li data-start=\"3604\" data-end=\"3757\">\n<p data-start=\"3606\" data-end=\"3757\"><strong data-start=\"3606\" data-end=\"3660\">Garante a conformidade com leis corporativas e AML<\/strong><br data-start=\"3660\" data-end=\"3663\" \/>Especialmente importante para abertura de contas empresariais ou onboarding de fornecedores.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3759\" data-end=\"3792\">KYC vs KYB: compara\u00e7\u00e3o direta<\/h3>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"3794\" data-end=\"4453\">\n<thead data-start=\"3794\" data-end=\"3883\">\n<tr data-start=\"3794\" data-end=\"3883\">\n<th data-start=\"3794\" data-end=\"3813\" data-col-size=\"sm\">Dimens\u00e3o<\/th>\n<th data-start=\"3813\" data-end=\"3846\" data-col-size=\"sm\">KYC<\/th>\n<th data-start=\"3846\" data-end=\"3883\" data-col-size=\"md\">KYB<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"3974\" data-end=\"4453\">\n<tr data-start=\"3974\" data-end=\"4063\">\n<td data-start=\"3974\" data-end=\"3993\" data-col-size=\"sm\">Quem<\/td>\n<td data-start=\"3993\" data-end=\"4026\" data-col-size=\"sm\">Pessoa f\u00edsica<\/td>\n<td data-start=\"4026\" data-end=\"4063\" data-col-size=\"md\">Empresa ou entidade jur\u00eddica<\/td>\n<\/tr>\n<tr data-start=\"4064\" data-end=\"4153\">\n<td data-start=\"4064\" data-end=\"4083\" data-col-size=\"sm\">Documentos-chave<\/td>\n<td data-start=\"4083\" data-end=\"4116\" data-col-size=\"sm\">Documento oficial, comprovante<\/td>\n<td data-start=\"4116\" data-end=\"4153\" data-col-size=\"md\">Contrato social, CNPJ, UBO<\/td>\n<\/tr>\n<tr data-start=\"4154\" data-end=\"4256\">\n<td data-start=\"4154\" data-end=\"4173\" data-col-size=\"sm\">Riscos visados<\/td>\n<td data-start=\"4173\" data-end=\"4211\" data-col-size=\"sm\">Roubo de identidade, fraude pessoal<\/td>\n<td data-start=\"4211\" data-end=\"4256\" data-col-size=\"md\">Empresas de fachada, fraudes corporativas<\/td>\n<\/tr>\n<tr data-start=\"4257\" data-end=\"4349\">\n<td data-start=\"4257\" data-end=\"4279\" data-col-size=\"sm\">Dura\u00e7\u00e3o do processo<\/td>\n<td data-start=\"4279\" data-end=\"4312\" data-col-size=\"sm\">Curto (minutos a horas)<\/td>\n<td data-start=\"4312\" data-end=\"4349\" data-col-size=\"md\">Mais longo (dias a semanas)<\/td>\n<\/tr>\n<tr data-start=\"4350\" data-end=\"4453\">\n<td data-start=\"4350\" data-end=\"4369\" data-col-size=\"sm\">Casos de uso<\/td>\n<td data-start=\"4369\" data-end=\"4402\" data-col-size=\"sm\">Contas banc\u00e1rias, e-wallets<\/td>\n<td data-start=\"4402\" data-end=\"4453\" data-col-size=\"md\">Contas empresariais, onboarding de fornecedores<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\">\u00a0<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2676 aligncenter\" src=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-300x170.jpg\" alt=\"\" width=\"455\" height=\"258\" srcset=\"https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-300x170.jpg 300w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-1024x579.jpg 1024w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-768x434.jpg 768w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-400x226.jpg 400w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-800x452.jpg 800w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-832x470.jpg 832w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2-1248x705.jpg 1248w, https:\/\/wordpress.buvei.com\/wp-content\/uploads\/2025\/05\/KYC-vs.-KYB-2-2.jpg 1472w\" sizes=\"auto, (max-width: 455px) 100vw, 455px\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3 data-start=\"4455\" data-end=\"4473\">Exemplos reais<\/h3>\n<p data-start=\"4475\" data-end=\"4752\"><strong data-start=\"4475\" data-end=\"4513\">Falta de KYC \u2192 Lavagem de dinheiro<\/strong><br data-start=\"4513\" data-end=\"4516\" \/>Uma plataforma de empr\u00e9stimos P2P na China n\u00e3o realizou KYC completo. Criminosos abriram contas falsas, levantaram mais de 1 bilh\u00e3o de RMB e sumiram. Uma simples verifica\u00e7\u00e3o de identidade com reconhecimento facial teria evitado o golpe.<\/p>\n<p data-start=\"4754\" data-end=\"5028\"><strong data-start=\"4754\" data-end=\"4791\">Falta de KYB \u2192 Fraude corporativa<\/strong><br data-start=\"4791\" data-end=\"4794\" \/>Uma empresa de e-commerce internacional pagou US$500 mil adiantado a um fornecedor falso. A empresa n\u00e3o existia \u2014 sem sede f\u00edsica, com dados de s\u00f3cios duvidosos. Uma verifica\u00e7\u00e3o b\u00e1sica de registro empresarial teria evitado o preju\u00edzo.<\/p>\n<h3 data-start=\"5030\" data-end=\"5065\">Tecnologia moderna em KYC e KYB<\/h3>\n<ul data-start=\"5067\" data-end=\"5318\">\n<li data-start=\"5067\" data-end=\"5119\">\n<p data-start=\"5069\" data-end=\"5119\">Reconhecimento facial com detec\u00e7\u00e3o de vivacidade<\/p>\n<\/li>\n<li data-start=\"5120\" data-end=\"5160\">\n<p data-start=\"5122\" data-end=\"5160\">Extra\u00e7\u00e3o autom\u00e1tica de dados com OCR<\/p>\n<\/li>\n<li data-start=\"5161\" data-end=\"5210\">\n<p data-start=\"5163\" data-end=\"5210\">Registro de auditoria imut\u00e1vel com blockchain<\/p>\n<\/li>\n<li data-start=\"5211\" data-end=\"5257\">\n<p data-start=\"5213\" data-end=\"5257\">Modelos de risco baseados em big data e IA<\/p>\n<\/li>\n<li data-start=\"5258\" data-end=\"5318\">\n<p data-start=\"5260\" data-end=\"5318\">Ferramentas para rastrear estruturas societ\u00e1rias complexas<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5320\" data-end=\"5616\">Hoje, solu\u00e7\u00f5es baseadas em IA conseguem verificar uma identidade em menos de 3 segundos ou gerar relat\u00f3rios completos de risco corporativo em poucos minutos. A miss\u00e3o continua sendo a mesma: manter agentes mal-intencionados fora do sistema financeiro e facilitar o acesso para clientes leg\u00edtimos.<\/p>\n<h3 data-start=\"5618\" data-end=\"5640\">Onde entra a Buvei<\/h3>\n<p data-start=\"5642\" data-end=\"5950\">Plataformas como a <a href=\"https:\/\/buvei.com\/\"><strong data-start=\"5661\" data-end=\"5670\">Buvei<\/strong> <\/a>j\u00e1 incorporam processos robustos de KYC e KYB como parte do onboarding dos usu\u00e1rios e empresas que operam no ecossistema. Atrav\u00e9s de tecnologias automatizadas e foco na experi\u00eancia do usu\u00e1rio, a Buvei promove um ambiente seguro, \u00e1gil e em conformidade com as leis internacionais.<\/p>\n<h3 data-start=\"5952\" data-end=\"5965\">Conclus\u00e3o<\/h3>\n<p data-start=\"5967\" data-end=\"6066\">KYC responde \u00e0 pergunta <strong data-start=\"5991\" data-end=\"6009\">\"Quem \u00e9 voc\u00ea?\"<\/strong><br data-start=\"6009\" data-end=\"6012\" \/>KYB responde \u00e0 pergunta <strong data-start=\"6036\" data-end=\"6066\">\"Essa empresa \u00e9 leg\u00edtima?\"<\/strong><\/p>\n<p data-start=\"6068\" data-end=\"6194\">Juntas, essas pr\u00e1ticas s\u00e3o os pilares de um sistema financeiro seguro e confi\u00e1vel, tanto para indiv\u00edduos quanto para empresas.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"Em um mundo financeiro cada vez mais regulado, saber exatamente com quem voc\u00ea est\u00e1 fazendo neg\u00f3cios \u2014 seja&hellip;","protected":false},"author":2,"featured_media":2659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":""},"categories":[27],"tags":[126,1147,1149],"class_list":{"0":"post-2674","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-payment-basics-pt","8":"tag-buvei-pt","9":"tag-kyb-pt","10":"tag-kyc-pt","11":"cs-entry"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts\/2674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/comments?post=2674"}],"version-history":[{"count":0,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/posts\/2674\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/media\/2659"}],"wp:attachment":[{"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/media?parent=2674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/categories?post=2674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/buvei.com\/blog\/wp-json\/wp\/v2\/tags?post=2674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}