{"id":388,"date":"2024-02-08T05:09:18","date_gmt":"2024-02-08T02:09:18","guid":{"rendered":"https:\/\/sms-txt.net\/?p=388"},"modified":"2024-09-05T12:45:43","modified_gmt":"2024-09-05T09:45:43","slug":"kuidas-hakkerid-kasutavad-ss7-i-ara","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/et\/ss7-sms\/kuidas-hakkerid-kasutavad-ss7-i-ara\/","title":{"rendered":"Kuidas h\u00e4kkerid SS7-i \u00e4ra kasutavad?"},"content":{"rendered":"<p>Seda ajastut peetakse mobiilikasutuse ajastuks. Iga inimene on seotud mobiiltelefoni liigse kasutamisega. Mobiili kasutamine on muutunud iga inimese jaoks s\u00f5ltuvuseks. Alates lastest kuni professionaalideni, igal inimesel on need vidinad taskus.<\/p>\n<p>K\u00fcberr\u00fcnnakud mobiiltelefonide kaudu muutusid 5G-tehnoloogia tulekuga tavalisemaks. Pole kahtlust, et maailma telekommunikatsioonis\u00fcsteem h\u00f5lbustab inimestele parimaid internetiteenuseid. Need v\u00f5imalused ei too mitte ainult mugavust inimeste ellu. Kuid see m\u00f5jutab ka mobiiltelefonide tundlike andmete turvalisust. Kuna h\u00e4kkerid ei ole huvitatud kogu teabest, nagu n\u00e4iteks muusikaajalugu. Kuid nad r\u00fcndavad eranditult teie tundlikku teavet.<\/p>\n<h2>Mis on SS7 ja kuidas v\u00f5ivad h\u00e4kkerid seda kasutada?<\/h2>\n<p>T\u00e4iustatud h\u00e4kkimistehnikate kasutuselev\u00f5tt koos uue tarkvaraga muudab h\u00e4kkimise lihtsamaks ja oskuslikumaks. Inimesed on n\u00fc\u00fcd v\u00f5imelised sooritama mis tahes \u00fclesannet interneti kaudu oskuslikult. Kuid see avaldab ka negatiivset m\u00f5ju andmete turvalisusele. 2019. aastal kasvas pahavara r\u00fcnnakute protsent 50%, nagu on t\u00f5estanud eksperdid. 2020. aasta l\u00f5pus v\u00f5ivad k\u00fcberr\u00fcnnakud kasvada suuremaks.<\/p>\n<p>Viimastel aastatel on mobiilsidev\u00f5rke k\u00f5ige enam r\u00fcnnanud <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> protokoll. See m\u00f5jutab negatiivselt mitte ainult kasutajate, vaid ka teenusepakkuja eraelu puutumatust. SS7 v\u00f5eti kasutusele 1974. aastal kui \u00fchendusl\u00fcli erinevate mobiilseadmete vahel. SS7 aitab SMSide ja k\u00f5nede edastamisel \u00fchest mobiilseadmest teise. Kuigi selle leiutise eesm\u00e4rk oli erinev. Kuid n\u00fc\u00fcd kasutatakse seda \u00e4ra k\u00fcberr\u00fcnnakutes.<\/p>\n<p>Sagedamini on h\u00e4kkerite sihtm\u00e4rgiks kogu v\u00f5rgu kahjustamine. Nad saavutavad kogu teabe teenusepakkujate tellijate kohta. Kui nad saavad juurdep\u00e4\u00e4su teenusepakkujate teabele, saavad nad turvaliselt ligi k\u00f5igi tellijate isikuandmetele. Sel viisil saavad nad kontrolli kogu k\u00f5ne- ja s\u00f5numikorralduse \u00fcle. Lisaks sellele saavad nad j\u00e4lgida soovitud isiku asukohta isegi siis, kui tema GPS on v\u00e4lja l\u00fclitatud. Kogu protsess toimub sellisel turvalisel viisil, ilma et teenusepakkujale antaks mingeid turvahoiatusi.<\/p>\n<p>SS7 protokoll v\u00f5imaldab kogu maailma ebaefektiivset sidet. Mobiilsidekasutajad naudivad t\u00f5husat suhtlust kogu maailmas. Selle protokolli kasutuselev\u00f5tul on rohkem puudusi. See muudab inimeste isikuandmed k\u00fcberr\u00fcnnakutele vastuv\u00f5tlikumaks.<\/p>\n<p>Protokollile ei ole alates selle leiutamisest tehtud \u00fchtegi ajakohastatud versiooni. See on p\u00f5hjus, miks seda saab h\u00f5lpsasti kasutada h\u00e4kkimise maailmas. Maailma suurimad luureagentuurid kasutavad seda protokolli ka selleks, et saada vajalikku teavet seaduslikult. Kahjuks on kogu see teave ka h\u00e4kkerite poolt kergesti k\u00e4ttesaadav.<\/p>\n<p>SS7-s on olemas spetsiaalsed telefonisignalisatsiooniprotokollid. See signalisatsiooniprotokoll vastutab \u00fche mobiiltelefoni k\u00f5ne \u00fchendamise eest teise mobiiltelefoniga. See protokoll t\u00f6\u00f6tab h\u00e4sti nii traadita kui ka traadiga \u00fcldkasutatavate telefonide puhul.<\/p>\n<h2>Keda m\u00f5jutab SS7 haavatavus?<\/h2>\n<p>Aja jooksul lisandusid SS7-protokollile veel m\u00f5ned rakendused. Selle p\u00f5hieesm\u00e4rk oli SMS-teenuste kasutuselev\u00f5tt. Sellele j\u00e4rgnes k\u00f5ne edastamise, k\u00f5ne ootamise, konverentsk\u00f5nede jne kasutuselev\u00f5tt. K\u00f5igi nende uute rakenduste kasutuselev\u00f5tt viib mobiilseadmed sagedase h\u00e4kkimise suunas. SS7 r\u00fcnnakud on pahavara r\u00fcnnakud \u00fcle mobiilseadmete.<\/p>\n<p>H\u00e4kkerid saavad juurdep\u00e4\u00e4su sihtseadmete isiklikele telefonik\u00f5nedele ja s\u00f5numitele. Sagedasemad r\u00fcnnakud toimuvad mobiilsideteenuste pakkujate kaudu, et p\u00e4\u00e4seda h\u00f5lpsasti ligi k\u00f5igile kasutajatele. R\u00fcnnakud SS7-i \u00e4rakasutamise kaudu toimuvad telefoniside, mitte wifi-\u00fchenduste vastu.<\/p>\n<p>H\u00e4kkerid kasutavad SS7 autentseid v\u00f5imalusi, et saada teavet kogu side kohta. H\u00e4kkerid peavad SS7 SDK-d internetist alla laadima, et kasutada SS7-i h\u00e4kkimiseks. Seej\u00e4rel kasutavad nad SS7 SDK-d v\u00e4ga tehniliselt, et saavutada edukas h\u00e4kkimine.<\/p>\n<p>See aitab h\u00e4kkeril SS7-v\u00f5rku \u00fchenduda. P\u00e4rast \u00fchendamist l\u00e4hevad nad sihtv\u00f5rku. Eesm\u00e4rgiks olev seade ei suuda seda tuvastada. Kuna seade v\u00f5tab seda MSC- v\u00f5i VLR-s\u00f5lme.<br \/>\nPeamine tegevus, mida h\u00e4kker teostab, et saavutada juurdep\u00e4\u00e4s ka k\u00f5ige turvalisematele seadmetele, on \"MitM phishing\" r\u00fcnnak. P\u00e4rast seda r\u00fcnnakut j\u00e4tkab ta soovitud teabe saamist. H\u00e4kker saab seej\u00e4rel oskuslikult k\u00f5ik SMS-i ja k\u00f5ne \u00fcksikasjad ning j\u00e4lgib sihtisiku t\u00e4pset asukohta.<\/p>\n<p>Enamik inimesi kasutab 2FA-d kaitseks SS7-i pahavara r\u00fcnnakute eest. Kuid see mobiiliteenuse pakkujate kaitsemeetod ei toimi. Kuna sellistes stsenaariumides \u00fcletavad h\u00e4kkerid selle, et kasutada koode pealtkuulamise kaudu. Nad kasutavad koode, et saada juurdep\u00e4\u00e4s paljudele kontodele, isegi pangakontodele.<\/p>\n<p>Digitaalsed ettev\u00f5tted seisavad n\u00fc\u00fcd suuremas ohus. H\u00e4kkerid kasutavad k\u00f5igi digitaalsete ettev\u00f5tete isikuandmeid. Nad teevad seda k\u00f5ike turvaliselt \"MitM phishing\" r\u00fcnnakuga. Digitaalettev\u00f5tted s\u00f5ltuvad oma sidepidamisel SS7-st.<\/p>\n<p>Digitaalsed ettev\u00f5tted saadavad oma t\u00e4htsaid ametialaseid faile, millele h\u00e4kkerid saavad h\u00f5lpsasti ligi. Digitaalajastu suur hulk seadmeid kasutab professionaalsete oluliste andmete edastamiseks mobiilseadmeid. Digitaalsed ettev\u00f5tted on suuremas k\u00fcberr\u00fcnnakute ohus. Kuid nad ei p\u00f6\u00f6ra t\u00e4helepanu nende r\u00fcnnakute \u00fcletamisele. Need ettev\u00f5tted peaksid seda probleemi t\u00f5siselt v\u00f5tma.<\/p>","protected":false},"excerpt":{"rendered":"<p>Seda ajastut peetakse mobiilikasutuse ajastuks. Iga inimene on seotud mobiiltelefoni liigse kasutamisega. Mobiili kasutamine on muutunud iga inimese jaoks s\u00f5ltuvuseks. Alates lastest kuni professionaalideni, igal inimesel on need vidinad taskus. K\u00fcberr\u00fcnnakud mobiiltelefonide kaudu muutusid tavalisemaks koos 5G tulekuga...<\/p>","protected":false},"author":1,"featured_media":401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Are Exploiting SS7?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/et\/ss7-sms\/kuidas-hakkerid-kasutavad-ss7-i-ara\/\" \/>\n<meta property=\"og:locale\" content=\"et_EE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Exploiting SS7?\" \/>\n<meta property=\"og:description\" content=\"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/et\/ss7-sms\/kuidas-hakkerid-kasutavad-ss7-i-ara\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T02:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Hackers Are Exploiting SS7?\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"et\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"name\":\"How Hackers Are Exploiting SS7?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\"},\"inLanguage\":\"et\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"et\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Are Exploiting SS7?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"et\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"et\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kuidas h\u00e4kkerid SS7-i \u00e4ra kasutavad?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/et\/ss7-sms\/kuidas-hakkerid-kasutavad-ss7-i-ara\/","og_locale":"et_EE","og_type":"article","og_title":"How Hackers Are Exploiting SS7?","og_description":"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...","og_url":"https:\/\/sms-txt.net\/et\/ss7-sms\/kuidas-hakkerid-kasutavad-ss7-i-ara\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-08T02:09:18+00:00","article_modified_time":"2024-09-05T09:45:43+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Hackers Are Exploiting SS7?","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"wordCount":879,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","articleSection":["SS7"],"inLanguage":"et"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","name":"Kuidas h\u00e4kkerid SS7-i \u00e4ra kasutavad?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb"},"inLanguage":"et","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"et","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","width":2000,"height":761,"caption":"ss7 attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Hackers Are Exploiting SS7?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 h\u00e4kkimine","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"et"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"et","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}