{"id":765,"date":"2025-10-08T14:20:26","date_gmt":"2025-10-08T12:20:26","guid":{"rendered":"https:\/\/www.yepyr.com\/private-investigation-agency\/crypto-wallet-recovery-forensics\/"},"modified":"2025-10-08T14:33:34","modified_gmt":"2025-10-08T12:33:34","slug":"crypto-wallet-recovery-forensics","status":"publish","type":"page","link":"https:\/\/www.yepyr.com\/en\/private-investigation-agency\/crypto-wallet-recovery-forensics\/","title":{"rendered":"Crypto Wallet Recovery &amp; Forensics"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_0 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_0 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_cta_0 et_pb_promo et_pb_bg_layout_dark et_pb_module et_flex_module\"><div class=\"et_pb_promo_description\"><h1 class=\"et_pb_module_header\">Crypto wallet recovery &amp; forensics<\/h1><div class=\"et_pb_promo_content\"><h3>Lost access to your wallet? We can help. <\/h3>\n<p>Have you lost access to your crypto wallet due to a forgotten password, a damaged seed phrase, or an outdated wallet application? Or do you still have data on an old computer, hard drive, or phone that you suspect contains cryptocurrency? Yepyr assists in recovering, retrieving, and securing digital wallets and key material.  <\/p>\n<\/div><\/div><div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/www.yepyr.com\/?fluent-form=6\">Schedule a free consultation<\/a><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_1 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_1 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_1 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_0 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">What We Do<\/h2><\/div><\/div>\n\n<div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><p>Our specialists combine digital forensic techniques with blockchain expertise, as well as 'brute force' methods, to restore lost access or retrieve important wallet data. We operate using controlled methods, ensuring that the original data is always preserved. <\/p>\n<p>We can assist with, among other things:<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_2 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_2 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_0 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\uf3ba<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Forgotten passwords or PIN codes<\/h4><div class=\"et_pb_blurb_description\"><p>Recovery attempts using specialized software and key derivation methods.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_3 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_1 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\uf12e<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Damaged or incomplete seed phrases<\/h4><div class=\"et_pb_blurb_description\"><p>Reconstruction of missing words using checksums and pattern recognition.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_4 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_2 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\ue0e4<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Outdated wallets and software<\/h4><div class=\"et_pb_blurb_description\"><p>Migration of wallets to current versions or support for legacy clients.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_5 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_3 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\ue0f7<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Data recovery<\/h4><div class=\"et_pb_blurb_description\"><p>Recovery of wallet files from data on phones, USB sticks, laptops, or external drives.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_6 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_4 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\uf109<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Device analysis<\/h4><div class=\"et_pb_blurb_description\"><p>Reading and securing data from phones, USB sticks, laptops, or external drives.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_7 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_blurb_5 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_main_blurb_image\"><span class=\"et_pb_image_wrap\"><span class=\"et-pb-icon et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone\">\uf002<\/span><\/span><\/div><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">Technical forensics<\/h4><div class=\"et_pb_blurb_description\"><p>Analysis of wallet files, key structures, or transaction history to determine origin or value.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_2 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_3 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_8 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_1 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Our Approach<\/h2><\/div><\/div>\n\n<div class=\"et_pb_blurb_6 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">1. Intake &amp; assessment<\/h4><div class=\"et_pb_blurb_description\"><p>We map out your situation, available data, and possible recovery options.<\/p>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_blurb_7 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">2. Technical analysis<\/h4><div class=\"et_pb_blurb_description\"><p>Our investigators perform a reconstruction, ensuring that the original data remains untouched.<\/p>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"et_pb_blurb_8 et_pb_blurb et_pb_bg_layout_light et_pb_blurb_position_top et_pb_module et_flex_module\"><div class=\"et_pb_blurb_content et_flex_module\"><div class=\"et_pb_blurb_container\"><h4 class=\"et_pb_module_header\">3. Recovery or advice<\/h4><div class=\"et_pb_blurb_description\"><p>Where possible, we restore access or advise on further steps to secure your wallet.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_3 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_4 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_9 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_2 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Important points of attention<\/h2><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_5 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_10 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><h3>Time, Success, and Guarantees<\/h3>\n<p>Recovery attempts vary greatly in complexity. Depending on the type of wallet, length and location of missing words, passphrase used, and any encryption, a recovery attempt can take from a few hours to weeks or longer. There is no guarantee that access will be restored; sometimes crucial information is missing, making recovery impossible. We always work transparently: for complex or costly recovery attempts, we discuss the technical probability of success and estimated costs.   <\/p>\n<h3><\/h3>\n<h3>What Influences the Chance of Success<\/h3>\n<ul>\n<li>Number of missing words and whether there is an (unknown) passphrase.<\/li>\n<li>Whether you can provide extra clues (known addresses, backups, wallet type).<\/li>\n<li>Whether media are encrypted or physically damaged.<\/li>\n<li>Technical and computational limitations (sometimes specialist hardware or a lot of computation time is needed).<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_11 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<ul class=\"et_pb_icon_list_0 et_pb_icon_list et_pb_module et_flex_module\">\n<li class=\"et_pb_icon_list_item_0 et_pb_icon_list_item et_pb_module et_flex_module\"><span class=\"et-pb-icon\">\uf071<\/span><div class=\"et_pb_icon_list_text\">We work exclusively for legitimate wallet owners or with demonstrable permission from the rightful claimant.<\/div><\/li>\n\n<li class=\"et_pb_icon_list_item_1 et_pb_icon_list_item et_pb_module et_flex_module\"><span class=\"et-pb-icon\">\uf071<\/span><div class=\"et_pb_icon_list_text\">All activities are carried out under license from the Ministry of Justice and Security (Wpbr).<\/div><\/li>\n\n<li class=\"et_pb_icon_list_item_2 et_pb_icon_list_item et_pb_module et_flex_module\"><span class=\"et-pb-icon\">\uf071<\/span><div class=\"et_pb_icon_list_text\">Data is treated with strict confidentiality and processed in accordance with GDPR guidelines.<\/div><\/li>\n\n<li class=\"et_pb_icon_list_item_3 et_pb_icon_list_item et_pb_module et_flex_module\"><span class=\"et-pb-icon\">\uf071<\/span><div class=\"et_pb_icon_list_text\">If recovery proves impossible, you will receive a clear technical explanation of the findings.<\/div><\/li>\n\n<li class=\"et_pb_icon_list_item_4 et_pb_icon_list_item et_pb_module et_flex_module\"><span class=\"et-pb-icon\">\uf071<\/span><div class=\"et_pb_icon_list_text\">Recovery attempts are technically complex and can be costly or lengthy; success can never be guaranteed.<\/div><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_4 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_6 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_12 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_heading_3 et_pb_heading et_pb_module et_flex_module\"><div class=\"et_pb_heading_container\"><h2 class=\"et_pb_module_header\">Frequently asked questions about crypto wallet recovery &amp; forensics<\/h2><\/div><\/div>\n\n<div class=\"dsm_faq_0 dsm_faq et_pb_module\"><div class=\"et_pb_module_inner\"><div class=\"dsm-faq-container dsm-front \" data-accordion=\"off\" data-open_first_item=\"off\">\n<div class=\"dsm_faq_child_0 dsm_faq_child dsm-faq-item-wrapper et_pb_module\"><div class=\"et_pb_module_inner\"><div class=\"dsm-title-wrapper\">\n\t\t\t\t <div class=\"dsm-title-inner-wrapper\">\n\t\t\t\t   <div class=\"dsm_open_icon\"><\/div>\n\t\t\t\t   <div class=\"dsm_close_icon\"><\/div>\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   <h5 class=\"dsm-faq-title\">Hoe lang duur een herstelpoging?<\/h5>\n\t\t\t\t <\/div> \n\t\t\t\t <div class=\"dsm-faq-item-inner-wrapper\">\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"dsm-faq-content\"><p>Dat verschilt sterk; van enkele uren (bij \u00e9\u00e9n of twee ontbrekende woorden met goede aanwijzingen) tot weken of langer bij uitgebreide brute-force of wanneer versleutelde media betrokken zijn. We geven vooraf een inschatting van werk en kosten.<\/p><\/div><\/div><\/div>\n\n<div class=\"dsm_faq_child_1 dsm_faq_child dsm-faq-item-wrapper et_pb_module\"><div class=\"et_pb_module_inner\"><div class=\"dsm-title-wrapper\">\n\t\t\t\t <div class=\"dsm-title-inner-wrapper\">\n\t\t\t\t   <div class=\"dsm_open_icon\"><\/div>\n\t\t\t\t   <div class=\"dsm_close_icon\"><\/div>\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   <h5 class=\"dsm-faq-title\">Krijg ik altijd mijn crypto terug?<\/h5>\n\t\t\t\t <\/div> \n\t\t\t\t <div class=\"dsm-faq-item-inner-wrapper\">\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"dsm-faq-content\"><p>Nee. Als cruciale informatie ontbreekt (bijv. onbekende passphrase, te veel ontbrekende seed-woorden) of als sleutels onherstelbaar zijn beschadigd, kunnen we niet garanderen dat toegang wordt hersteld.<\/p><\/div><\/div><\/div>\n\n<div class=\"dsm_faq_child_2 dsm_faq_child dsm-faq-item-wrapper et_pb_module\"><div class=\"et_pb_module_inner\"><div class=\"dsm-title-wrapper\">\n\t\t\t\t <div class=\"dsm-title-inner-wrapper\">\n\t\t\t\t   <div class=\"dsm_open_icon\"><\/div>\n\t\t\t\t   <div class=\"dsm_close_icon\"><\/div>\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   <h5 class=\"dsm-faq-title\">Wat kost het ongeveer?<\/h5>\n\t\t\t\t <\/div> \n\t\t\t\t <div class=\"dsm-faq-item-inner-wrapper\">\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"dsm-faq-content\"><p>Kosten hangen af van tijd, benodigde tools\/hardware en complexiteit. Vooraf ontvang je een offerte of kostenraming voordat we ingrijpende of dure stappen ondernemen.<\/p><\/div><\/div><\/div>\n\n<div class=\"dsm_faq_child_3 dsm_faq_child dsm-faq-item-wrapper et_pb_module\"><div class=\"et_pb_module_inner\"><div class=\"dsm-title-wrapper\">\n\t\t\t\t <div class=\"dsm-title-inner-wrapper\">\n\t\t\t\t   <div class=\"dsm_open_icon\"><\/div>\n\t\t\t\t   <div class=\"dsm_close_icon\"><\/div>\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   <h5 class=\"dsm-faq-title\">Hoe veilig is het process voor mijn data?<\/h5>\n\t\t\t\t <\/div> \n\t\t\t\t <div class=\"dsm-faq-item-inner-wrapper\">\n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t   \n\t\t\t\t <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"dsm-faq-content\"><p>Originele data blijven intact, we werken forensisch en maken waar nodig kopie\u00ebn. We behandelen alle gegevens vertrouwelijk en volgens AVG-richtlijnen.<\/p><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_5 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_7 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_13 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module\"><div class=\"et_pb_text_inner\"><h2>Why Yepyr?<\/h2>\n<ul>\n<li>Recognized private investigation agency (Justis permit)<\/li>\n<li>Specialized in crypto and digital forensics<\/li>\n<li>Discreet, transparent, and technically substantiated<\/li>\n<li>Access to modern recovery and analysis tools<\/li>\n<li>Proven experience with various wallet types and storage media<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_6 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_8 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_14 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_cta_1 et_pb_promo et_pb_bg_layout_dark et_pb_module et_flex_module\"><div class=\"et_pb_promo_description\"><h2 class=\"et_pb_module_header\">Need help with crypto wallet recovery or digital forensic investigation?<\/h2><\/div><div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/www.yepyr.com\/?fluent-form=6\">Contact us for a free consultation<\/a><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":766,"parent":716,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-765","page","type-page","status-publish","has-post-thumbnail","hentry"],"dsm_author":{"name":"Jean-Paul de Jong","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1c79a5cffaf46e38fd1a83845c1ea8df78404f46a26b2158ad70c72f85658326?s=96&d=mm&r=g","archive_link":"https:\/\/www.yepyr.com\/en\/author\/jp\/","biodata":""},"dsm_categories":[],"dsm_attachment_categories":[],"dsm_featured_image":{"thumbnail":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-150x150.jpg","medium":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-300x300.jpg","medium_large":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","large":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","1536x1536":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","2048x2048":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-post-main-image":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-400x250.jpg","et-pb-post-main-image-fullwidth":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-portfolio-image":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-400x284.jpg","et-pb-portfolio-module-image":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-510x382.jpg","et-pb-portfolio-image-single":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-gallery-module-image-portrait":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-400x512.jpg","et-pb-post-main-image-fullwidth-large":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-image--responsive--desktop":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-image--responsive--tablet":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","et-pb-image--responsive--phone":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-480x480.jpg","woocommerce_thumbnail":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-300x300.jpg","woocommerce_single":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg","woocommerce_gallery_thumbnail":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512-100x100.jpg","full":"https:\/\/www.yepyr.com\/wp-content\/uploads\/2025\/10\/2-9b3d3ea3-1669-43dd-8c46-1ab4e17d320d-512x512.jpg"},"_links":{"self":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/comments?post=765"}],"version-history":[{"count":3,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/765\/revisions"}],"predecessor-version":[{"id":770,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/765\/revisions\/770"}],"up":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/pages\/716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/media\/766"}],"wp:attachment":[{"href":"https:\/\/www.yepyr.com\/en\/wp-json\/wp\/v2\/media?parent=765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}