{"id":466,"date":"2024-08-29T08:05:47","date_gmt":"2024-08-29T05:05:47","guid":{"rendered":"https:\/\/sms-txt.net\/?p=466"},"modified":"2024-09-05T12:47:59","modified_gmt":"2024-09-05T09:47:59","slug":"jak-unik-informaci-pro-utok-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/cs\/ss7-sms\/jak-unik-informaci-pro-utok-ss7\/","title":{"rendered":"Jak \u00fanik informac\u00ed pro \u00fatok SS7"},"content":{"rendered":"<h1>\u00danik informac\u00ed<\/h1>\n<p>T\u00e9m\u011b\u0159 v\u0161echny \u00fatoky byly zam\u011b\u0159eny na zobrazen\u00ed informac\u00ed o \u00fa\u010dastn\u00edkovi a s\u00edti oper\u00e1tora. Podvody, odposlech provozu \u00fa\u010dastn\u00edk\u016f a tak\u00e9 naru\u0161en\u00ed dostupnosti slu\u017eeb pro \u00fa\u010dastn\u00edky v\u00fdrazn\u011b ni\u017e\u0161\u00ed ne\u017e dv\u011b procenta.<\/p>\n<p>&nbsp;<\/p>\n<p>Dod\u00e1vka je d\u016fsledkem toho, jak naru\u0161itel pot\u0159ebuje z\u00edskat identifik\u00e1tory \u00fa\u010dastn\u00edk\u016f a adresy server\u016f s\u00edt\u011b jejich vlastn\u00edka. Dal\u0161\u00ed \u00fatoky jsou na pospas z\u00edsk\u00e1n\u00ed informac\u00ed, kter\u00e9 jsou nezbytn\u00e9. Vyt\u011b\u017eov\u00e1n\u00ed dat neznamen\u00e1, \u017ee konkr\u00e9tn\u00ed \u00fatok na \u00fa\u010dastn\u00edka. Sp\u00ed\u0161e ne\u017e prov\u00e1d\u011bt slo\u017eit\u00e9 \u00fatoky je m\u00e9n\u011b n\u00e1ro\u010dn\u00fd p\u0159\u00edstup, jak znovu vyd\u011blat p\u0159i pokusu o prodej informac\u00ed t\u00fdkaj\u00edc\u00edch se dal\u0161\u00edch t\u0159\u00edd. Objemov\u00e9 dotazy mohou znamenat, \u017ee \u00fato\u010dn\u00edci nyn\u00ed buduj\u00ed datab\u00e1ze informac\u00ed o \u00fa\u010dastn\u00edc\u00edch, podle kter\u00fdch se porovn\u00e1vaj\u00ed telefonn\u00ed \u010d\u00edsla s identifik\u00e1tory osob, a shroma\u017e\u010fuj\u00ed \u00fadaje o majiteli, aby z\u00edskali n\u00e1kup informac\u00ed v odv\u011btv\u00ed.<\/p>\n<p>&nbsp;<\/p>\n<p>Ka\u017ed\u00fd \u00fatok zam\u011b\u0159en\u00fd na z\u00edsk\u00e1n\u00ed si osoby IMSI, tak\u00e9 ka\u017ed\u00fd \u00fatok zam\u011b\u0159en\u00fd na prok\u00e1z\u00e1n\u00ed nastaven\u00ed s\u00edt\u011b slou\u017eil \u00fato\u010dn\u00edk\u016fm z\u00edskat informace, kter\u00e9 hledali. K z\u00edsk\u00e1n\u00ed informac\u00ed byly pou\u017eity p\u0159edev\u0161\u00edm dv\u011b strategie: AnyTimeInterrogation a SendRoutingInfo. Ob\u011b umo\u017e\u0148uj\u00ed odhalen\u00ed informac\u00ed o s\u00edti a SendRoutingInfo jednodu\u0161e poskytuje IMSI \u00fa\u010dastn\u00edka; tyto zpr\u00e1vy tak\u00e9 umo\u017e\u0148uj\u00ed zjistit polohu \u00fa\u010dastn\u00edka. Jak ukazuj\u00ed na\u0161e v\u00fdsledky, v 17,5 procenta p\u0159\u00edpad\u016f obsahovaly odpov\u011bdi s\u00edt\u011b na tento druh p\u0159\u00edkazu \u00fadaje o poloze \u00fa\u010dastn\u00edka.<\/p>\n<p>&nbsp;<\/p>\n<p>Filtrov\u00e1n\u00ed p\u0159edvoleb na s\u00ed\u0165ov\u00fdch zdroj\u00edch (STP, HLR) nebo spr\u00e1vn\u011b nakonfigurovan\u00fd program pro filtrov\u00e1n\u00ed c\u00edlen\u00fdch n\u00e1v\u0161t\u011bvn\u00edk\u016f signalizace zcela vylou\u010d\u00ed mo\u017enost \u00fatok\u016f vyu\u017e\u00edvaj\u00edc\u00edch tyto zpr\u00e1vy, a proto zm\u00edrn\u00ed pravd\u011bpodobnost r\u016fzn\u00fdch nebezpe\u010d\u00ed. Nicm\u00e9n\u011b alternativy pro filtrov\u00e1n\u00ed komunikace se obvykle n\u011bkdy neprov\u00e1d\u011bj\u00ed. Nap\u0159\u00edklad pod\u00edl odpov\u011bd\u00ed na po\u017eadavky c\u00edlen\u00e9 na zji\u0161t\u011bn\u00ed polohy spot\u0159ebitele byl u s\u00edt\u00ed chr\u00e1n\u011bn\u00fdch p\u0159\u00edstupem blokov\u00e1n\u00ed signaliza\u010dn\u00edch n\u00e1v\u0161t\u011bvn\u00edk\u016f ve srovn\u00e1n\u00ed s jin\u00fdmi s\u00edt\u011bmi stejn\u011b nabit\u00fd.<\/p>\n<p>P\u0159ibli\u017en\u011b stejn\u00e9 kone\u010dn\u00e9 v\u00fdsledky byly z\u00edsk\u00e1ny pro v\u0161echny \u00fatoky zam\u011b\u0159en\u00e9 na zobrazen\u00ed nastaven\u00ed s\u00edt\u011b a identifik\u00e1tor\u016f \u00fa\u010dastn\u00edk\u016f. To v\u0161e jsou opravdu dobr\u00e9 zn\u00e1mky. Jsou tipem na \u00fa\u010dinn\u00e9 bezpe\u010dnostn\u00ed kroky. V p\u0159\u00edpad\u011b, \u017ee nastaven\u00ed bylo spr\u00e1vn\u00e9, pak se procento siln\u00fdch \u00fatok\u016f sni\u017euje na nulu. Je pozoruhodn\u00e9, \u017ee v\u011bt\u0161ina s\u00edt\u00ed vyu\u017eila, \u017ee program SMS household Routing k potla\u010den\u00ed \u00fatok\u016f zalo\u017een\u00fdch na syst\u00e9mu SendRoutingInfoForSM.<\/p>\n<p>&nbsp;<\/p>\n<p>Komunikace SendRoutingInfoForSM vy\u017eaduje informace pot\u0159ebn\u00e9 k odesl\u00e1n\u00ed SMS: identifik\u00e1tor \u00fa\u010dastn\u00edka a tak\u00e9 adresu hostitele. V typick\u00e9m pracovn\u00edm re\u017eimu se SMS mus\u00ed dr\u017eet t\u011bchto konkr\u00e9tn\u00edch informac\u00ed, kter\u00e9 jsou pova\u017eov\u00e1ny za ka\u017edou petici, kter\u00e1 by m\u011bla b\u00fdt doru\u010dena do programu SMS House Routing, kter\u00fd poskytuje identifik\u00e1tory a adresy. Vzhledem k chybn\u00e9 podob\u011b s\u00ed\u0165ov\u00e9ho za\u0159\u00edzen\u00ed se tato technika pokryt\u00ed uk\u00e1zala jako ne\u00fa\u010dinn\u00e1 v 87 procentech p\u0159\u00edpad\u016f \u017e\u00e1dost\u00ed dok\u00e1zala p\u0159esko\u010dit SMS house Routing. Podobn\u00e9 \u00fa\u010dinky jsme zjistili i p\u0159i pl\u00e1nu hodnocen\u00ed bezpe\u010dnosti s\u00edt\u011b SS7.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00danik informac\u00ed T\u00e9m\u011b\u0159 v\u0161echny \u00fatoky byly zam\u011b\u0159eny na zobrazen\u00ed informac\u00ed o \u00fa\u010dastn\u00edkovi a s\u00edti oper\u00e1tora. Podvody, zachycen\u00ed provozu \u00fa\u010dastn\u00edk\u016f a tak\u00e9 naru\u0161en\u00ed dostupnosti slu\u017eeb pro \u00fa\u010dastn\u00edky v\u00fdrazn\u011b m\u00e9n\u011b ne\u017e dv\u011b procenta.   Dod\u00e1vka je v\u00fdsledkem toho, jak \u00fato\u010dn\u00edk pot\u0159ebuje z\u00edskat identifik\u00e1tory \u00fa\u010dastn\u00edka a...<\/p>","protected":false},"author":1,"featured_media":1731,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Information leakage for SS7 attack<\/title>\n<meta name=\"description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/cs\/ss7-sms\/jak-unik-informaci-pro-utok-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Information leakage for SS7 attack\" \/>\n<meta property=\"og:description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/cs\/ss7-sms\/jak-unik-informaci-pro-utok-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T05:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:47:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Information leakage for SS7 attack\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"cs-CZ\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"name\":\"How Information leakage for SS7 attack\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"description\":\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"cs-CZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Information leakage for SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs-CZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Jak \u00fanik informac\u00ed pro \u00fatok SS7","description":"Jak se prov\u00e1d\u011bj\u00ed hackersk\u00e9 \u00fatoky a \u00fatoky na SS7 s c\u00edlem \u00faniku informac\u00ed. Zachyt\u00e1vejte sms a hovory pomoc\u00ed na\u0161ich softwarov\u00fdch hack\u016f SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/cs\/ss7-sms\/jak-unik-informaci-pro-utok-ss7\/","og_locale":"cs_CZ","og_type":"article","og_title":"How Information leakage for SS7 attack","og_description":"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.","og_url":"https:\/\/sms-txt.net\/cs\/ss7-sms\/jak-unik-informaci-pro-utok-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-08-29T05:05:47+00:00","article_modified_time":"2024-09-05T09:47:59+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Information leakage for SS7 attack","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"wordCount":498,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","name":"Jak \u00fanik informac\u00ed pro \u00fatok SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","description":"Jak se prov\u00e1d\u011bj\u00ed hackersk\u00e9 \u00fatoky a \u00fatoky na SS7 s c\u00edlem \u00faniku informac\u00ed. Zachyt\u00e1vejte sms a hovory pomoc\u00ed na\u0161ich softwarov\u00fdch hack\u016f SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Information leakage for SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/media\/1731"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}