{"id":473,"date":"2020-07-31T08:09:32","date_gmt":"2020-07-31T08:09:32","guid":{"rendered":"https:\/\/sms-txt.net\/?p=473"},"modified":"2021-03-19T20:13:24","modified_gmt":"2021-03-19T17:13:24","slug":"hovedtypen-af-ss7-angreb","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/da\/ss7-sms\/hovedtypen-af-ss7-angreb\/","title":{"rendered":"Hovedtyper af SS7-angreb"},"content":{"rendered":"<h1>SS7 angriber hovedsageligt 3 typer:<\/h1>\n<ol>\n<li>Omg\u00e5else af SMS Home Routing<\/li>\n<li>Forbedring af positionering under lokaliseringssporing<\/li>\n<li>Usynlig aflytning af korte beskeder<\/li>\n<\/ol>\n<h2>SMS Husholdning Rutef\u00f8ring By-pass<\/h2>\n<p>En kriminel kan nemt springe de fleste beskyttelsesprocedurer over, hvis de har installeret fejl, der ikke er tydelige ved f\u00f8rste \u00f8jekast. Nogle specialister f\u00f8ler, at hvis de har udf\u00f8rt SMS Household Routing Alternative og konfigureret med brug af centerudstyr til automatisk at forhindre kategori tommer beskeder, ville det ikke v\u00e6re muligt for ubuden g\u00e6st at erhverve IMSI (International Mobile Subscriber Id) og udf\u00f8re farlige strejker fra din <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-sms-intercept-call-location-tracking\/\">SS7<\/a> netv\u00e6rk. SMS Household Routing er virkelig en software- og hardwarel\u00f8sning, der bekr\u00e6fter Proxy-handlinger af private abonnentidentifikatorer og gearadresser<\/p>\n<p>N\u00e5r du f\u00e5r tekster fra eksterne relationer. Kategori Inch omfatter SS7-meddelelser, som generelt kun skal hentes inde fra det n\u00f8jagtige samme netv\u00e6rk snarere end p\u00e5 InterConnect Hyperlinks fra nogle andre netv\u00e6rk, medmindre der er en specifik ordning for at opn\u00e5 det. IMSI betragtes som fortrolige oplysninger, fordi det bruges til at h\u00e5ndtere abonnenter i de fleste af de fleste operationer. En angriber kan k\u00f8re mere komplekse angreb ved at bruge en gendannet IMSI.<\/p>\n<h2>Forbedring af positionering under lokaliseringssporing<\/h2>\n<p>Et af de absolut mest kendte angreb p\u00e5 SS7-netv\u00e6rk er lokaliseringsoverv\u00e5gning. Selv en foresp\u00f8rgsel om abonnentens placering dirigeres gennem SS7-netv\u00e6rk, og svaret inkluderer basestationens individualitet. Hver basestation har s\u00e6rlige koordinater og h\u00e5ndterer en helt bestemt placering. Som f\u00f8lge heraf varierer politikstedet i en storby med stor t\u00e6thed fra tusinder af tusinder til titusinder af meter. En person kan bruge disse s\u00e6rtr\u00e6k ved mobilnetv\u00e6rket til at oprette lokaliseringsforesp\u00f8rgsler og til at finde basestationen ved hj\u00e6lp af dens egen individualitet.<\/p>\n<p>Skjult SS7-angreb Et udvalg af offentligt tilg\u00e6ngelige onlinev\u00e6rkt\u00f8jer. Sandheden om denne placeringsdetektering er baseret p\u00e5 basestationens politiske placering. Faktisk beslutter den ondsindede akt\u00f8r stedet for den basestation, der fungerer som abonnent i minuttet. Vores analyser afsl\u00f8rer, at ubudne g\u00e6ster har opdaget at finde ud af, at abonnentens placering med forbedret pr\u00e6cision. Et mobilt apparat f\u00e5r normalt tegn i flere basestationer.<\/p>\n<p>Hvis den ondsindede part bestemmer koordinaterne for tre eller to basestationer, der er t\u00e6ttest p\u00e5 abonnenten, kan abonnentens placering indsn\u00e6vres. Normalt v\u00e6lger et mobilt apparat en basestation med alle de optimale\/optimale radiotilstande gennem en handel. Derfor er det mobile apparat n\u00f8dt til at udveksle indikatorer sammen ved hj\u00e6lp af dette netv\u00e6rk. Selv den ondsindede kan bruge en SMS til at begynde en skjult handel med alle m\u00e6rkeabonnenterne. Oplysningerne om disse meddelelser kan tilbydes fra abonnentens overvejelse. En langt mere effektiv metode til at d\u00e6kke over handel er at bruge stille USSD-meddelelser. Selvom<\/p>\n<p>Disse handler er ikke tilmeldt opladningsproceduren, de begynder at underskrive Trade-in mellem dit mobilsystem og netv\u00e6rk. Selv gerningsmanden kan forbedre placeringspr\u00e6cisionen ved at manipulere basestationsidentifikationer og stille USSD-meddelelser. Indtr\u00e6ngeren beder om identifikatoren for denne nuv\u00e6rende basestation). Derefter sender din indtr\u00e6nger en stille USSD-meddelelse for at f\u00e5 abonnentens udstyr til at udf\u00f8re en handel via radioporten. I tilf\u00e6lde af at hackeren har<\/p>\n<p>Placering af udvidelse. Velsignet, at netv\u00e6rket kunne v\u00e6lge en helt ny basestation for at f\u00e5 denne s\u00e6rlige handel, sammen med at VLR-databasen (Visitor Location Register) opgraderer abonnentens placering.<\/p>\n<p>Derefter sp\u00f8rger den ubudne g\u00e6st endnu en gang om abonnentens placering og f\u00e5r identifikatoren for denne nyeste basestation. S\u00e5 den ubudne g\u00e6st kan indsn\u00e6vre det sted, hvor abonnenten kan findes i<\/p>\n<p>Minut.<\/p>\n<p>&nbsp;<\/p>\n<h2>Usynlig aflytning af korte beskeder<\/h2>\n<p>Begr\u00e6nset konceptaflytning er bare et af de absolut farligste angreb p\u00e5 SS7-netv\u00e6rk. Masser af tjenester bruger SMS som at v\u00e6re en station. For eksempel bruger bankinstitutioner SMS til at f\u00e5 OTP (One Time Password) levering og sociale netv\u00e6rk til hentning af adgangskode, budbringere - for at f\u00e5 adgang til denne anvendelse. Som en m\u00e5de at fremkalde en indg\u00e5ende SMS p\u00e5, skal den ubudne g\u00e6st tilmelde en abonnent i et \"falsk\" netv\u00e6rk ved hj\u00e6lp af de v\u00e6sentlige enheder.<\/p>\n<p>Angrebet simulerer en abonnent, der driver rundt i et socialt netv\u00e6rk. HLR har en liste over denne abonnents helt nye placering, hvor afsluttende opkald og SMS-beskeder er blevet sendt. I tilf\u00e6lde af en prognose mislykkes indsatsen<\/p>\n<p>At netv\u00e6rket tilmelder abonnenten direkte tilbage til sit eget hjemmenetv\u00e6rk. Gerningsmanden ser, at den kan replikere strejken for at tjene den anden opkaldsindsats fors\u00f8mmelse. Desuden, hvis angriberne styrer netv\u00e6rkskomponenten, der kan signaleres at v\u00e6re en helt ny MSC, kan de opfange SMS-beskeder og omdirigere afsluttende taleopkald.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hovedsageligt SS7-angreb af 3 typer: SMS Home Routing Bypass Positioning Enhancement During Location Tracking Invisible Interception of Short Messages SMS Household Routing By-pass En skadevolder kan let springe de fleste beskyttelsesprocedurer over, hvis de har opsat fejl, der ikke er klare ved f\u00f8rste \u00f8jekast. Nogle specialister f\u00f8ler, at hvis de har udf\u00f8rt SMS Household Routing Alternative og konfigureret ...<\/p>","protected":false},"author":1,"featured_media":1729,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Main type of SS7 Attacks<\/title>\n<meta name=\"description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/da\/ss7-sms\/hovedtypen-af-ss7-angreb\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Main type of SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/da\/ss7-sms\/hovedtypen-af-ss7-angreb\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T08:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T17:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Main type of SS7 Attacks\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\",\"name\":\"Main type of SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"description\":\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Main-type-of-SS7-Attacks.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/main-type-of-ss7-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sms-txt.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Main type of SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sms-txt.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\",\"name\":\"SS7\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hovedtyper af SS7-angreb","description":"S\u00e5dan bruger du SS7-angreb ved hj\u00e6lp af vores aflytningssoftware til opkald, placering og sms. L\u00e6r om forskellige typer SS7-angreb.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/da\/ss7-sms\/hovedtypen-af-ss7-angreb\/","og_locale":"da_DK","og_type":"article","og_title":"Main type of SS7 Attacks","og_description":"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.","og_url":"https:\/\/sms-txt.net\/da\/ss7-sms\/hovedtypen-af-ss7-angreb\/","og_site_name":"SS7 Hacking","article_published_time":"2020-07-31T08:09:32+00:00","article_modified_time":"2021-03-19T17:13:24+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Main type of SS7 Attacks","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"wordCount":778,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","url":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","name":"Hovedtyper af SS7-angreb","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","description":"S\u00e5dan bruger du SS7-angreb ved hj\u00e6lp af vores aflytningssoftware til opkald, placering og sms. L\u00e6r om forskellige typer SS7-angreb.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Main type of SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7-hacking","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/media\/1729"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/da\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}