{"id":466,"date":"2024-08-29T08:05:47","date_gmt":"2024-08-29T05:05:47","guid":{"rendered":"https:\/\/sms-txt.net\/?p=466"},"modified":"2024-09-05T12:47:59","modified_gmt":"2024-09-05T09:47:59","slug":"ka-informacijas-noplude-ss7-uzbrukumam","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ka-informacijas-noplude-ss7-uzbrukumam\/","title":{"rendered":"K\u0101 inform\u0101cijas nopl\u016bde SS7 uzbrukumam"},"content":{"rendered":"<h1>Inform\u0101cijas nopl\u016bde<\/h1>\n<p>Gandr\u012bz visi uzbrukumi ir v\u0113rsti uz inform\u0101cijas par abonentu un operatora t\u012bklu par\u0101d\u012b\u0161anu. Kr\u0101p\u0161ana, abonentu datpl\u016bsmas p\u0101rtver\u0161ana, k\u0101 ar\u012b pakalpojuma pieejam\u012bbas trauc\u0113jumi abonentiem, kas ir iev\u0113rojami maz\u0101ki par diviem procentiem.<\/p>\n<p>&nbsp;<\/p>\n<p>Pieg\u0101des iemesls ir tas, ka uzbruc\u0113jam ir nepiecie\u0161ams ieg\u016bt abonentu identifikatorus un serveru adreses to \u012bpa\u0161nieka t\u012bkl\u0101. Vair\u0101k uzbrukumu ir atkar\u012bgi no nepiecie\u0161am\u0101s inform\u0101cijas ieg\u016b\u0161anas. Datu ieguve nenoz\u012bm\u0113s, ka konkr\u0113ts uzbrukums abonentam. T\u0101 viet\u0101, lai veiktu sare\u017e\u0123\u012btus uzbrukumus, ir maz\u0101k sare\u017e\u0123\u012bta pieeja, lai atkal nopeln\u012btu, m\u0113\u0123inot p\u0101rdot inform\u0101ciju par papildu klas\u0113m. Apjoma piepras\u012bjumi var noz\u012bm\u0113t, ka uzbruc\u0113ji tagad b\u016bv\u0113 abonentu inform\u0101cijas b\u0101zes, kur\u0101s t\u0101lru\u0146a numuri tiek sal\u012bdzin\u0101ti ar personas identifikatoriem, un v\u0101c \u012bpa\u0161nieka datus, lai ieg\u016btu inform\u0101cijas ieg\u0101di nozar\u0113.<\/p>\n<p>&nbsp;<\/p>\n<p>Katrs uzbrukums m\u0113r\u0137tiec\u012bgi sa\u0146emt sev personu IMSI, ar\u012b katrs uzbrukums m\u0113r\u0137tiec\u012bgi uz demonstr\u0113jot t\u012bkla iestat\u012b\u0161anu kalpoja uzbruc\u0113jiem ieg\u016bt inform\u0101ciju vi\u0146i mekl\u0113ja. Lai ieg\u016btu inform\u0101ciju, galvenok\u0101rt tika izmantotas divas strat\u0113\u0123ijas: AnyTimeInterrogation un ar\u012b SendRoutingInfo. T\u0101s abas \u013cauj atkl\u0101t t\u012bkla inform\u0101ciju, bet SendRoutingInfo vienk\u0101r\u0161i ieg\u016bst abonenta IMSI; turkl\u0101t \u0161ie zi\u0146ojumi \u013cauj atkl\u0101t abonenta atra\u0161an\u0101s vietu. K\u0101 liecina m\u016bsu rezult\u0101ti, 17,5 procentos gad\u012bjumu t\u012bkla atbildes uz \u0161\u0101da veida r\u012bkojumu ietv\u0113ra datus par abonenta atra\u0161an\u0101s vietu.<\/p>\n<p>&nbsp;<\/p>\n<p>Filtr\u0113\u0161anas preferences t\u012bkla pieg\u0101d\u0113s (STP, HLR) vai k\u0101da pareizi konfigur\u0113ta filtr\u0113\u0161anas programma signaliz\u0101cijas m\u0113r\u0137tiec\u012bgiem apmekl\u0113t\u0101jiem piln\u012bb\u0101 nov\u0113rs\u012bs uzbrukumu iesp\u0113jam\u012bbu, izmantojot \u0161os zi\u0146ojumus, un t\u0101d\u0113j\u0101di mazin\u0101s da\u017e\u0101du apdraud\u0113jumu iesp\u0113jam\u012bbu. Tom\u0113r sazi\u0146as filtr\u0113\u0161anas alternat\u012bvas da\u017ek\u0101rt netiek izmantotas. Piem\u0113ram, atbild\u0113s uz piepras\u012bjumiem, kas v\u0113rsti uz pat\u0113r\u0113t\u0101ja atra\u0161an\u0101s vietas noskaidro\u0161anu, ir tikpat daudz atbil\u017eu k\u0101 citos t\u012bklos, kas aizsarg\u0101ti ar signaliz\u0101cijas apmekl\u0113t\u0101ju blo\u0137\u0113\u0161anas pieeju, sal\u012bdzinot ar citiem t\u012bkliem.<\/p>\n<p>Aptuveni tie\u0161i t\u0101dus pa\u0161us gal\u012bgos rezult\u0101tus ieguva visi uzbrukumi, kas v\u0113rsti uz t\u012bkla iestat\u012bjumu un abonentu identifikatoru r\u0101d\u012b\u0161anu. Visas \u0161\u012bs patie\u0161\u0101m ir labas paz\u012bmes. T\u0101s nor\u0101da uz dro\u0161\u012bbas pas\u0101kumiem, kas ir efekt\u012bvi. Ja iestat\u012b\u0161ana ir bijusi pareiza, tad sp\u0113c\u012bgu uzbrukumu procentu\u0101l\u0101 da\u013ca ir samazin\u0101ta l\u012bdz nullei. J\u0101atz\u012bm\u0113, ka liel\u0101k\u0101 da\u013ca t\u012bklu izmantoja SMS m\u0101jsaimniec\u012bbas mar\u0161rut\u0113\u0161anas programmu, lai nov\u0113rstu uzbrukumus, kas balst\u012bti uz SendRoutingInfoForSM sist\u0113mu.<\/p>\n<p>&nbsp;<\/p>\n<p>SendRoutingInfoForSM sazi\u0146\u0101 tiek piepras\u012bta inform\u0101cija, kas nepiecie\u0161ama SMS nos\u016bt\u012b\u0161anai: abonenta identifikators, k\u0101 ar\u012b uz\u0146\u0113m\u0113ja adrese. Tipisk\u0101 darba re\u017e\u012bm\u0101 SMS ir j\u0101iev\u0113ro \u0161\u012b konkr\u0113t\u0101 inform\u0101cija tiek uzskat\u012bts, ka katra l\u016bgumraksts ir j\u0101pieg\u0101d\u0101 j\u016bsu SMS m\u0101jas mar\u0161rut\u0113\u0161anas programm\u0101, kas dod identifikatorus un adreses. K\u013c\u016bdainas t\u012bkla r\u012bku formas d\u0113\u013c \u0161\u012b p\u0101rkl\u0101juma metode izr\u0101d\u012bj\u0101s neefekt\u012bva 87 % gad\u012bjumu piepras\u012bjumi var\u0113ja izlaist SMS House Routing. L\u012bdz\u012bgu efektu m\u0113s atkl\u0101j\u0101m SS7 t\u012bkla dro\u0161\u012bbas nov\u0113rt\u0113\u0161anas pl\u0101n\u0101.<\/p>","protected":false},"excerpt":{"rendered":"<p>Inform\u0101cijas nopl\u016bde Gandr\u012bz visi uzbrukumi ir v\u0113rsti uz inform\u0101cijas par abonentu un operatora t\u012bklu par\u0101d\u012b\u0161anu. Kr\u0101p\u0161ana, abonentu datpl\u016bsmas p\u0101rtver\u0161ana, k\u0101 ar\u012b pakalpojuma pieejam\u012bbas trauc\u0113jumi abonentiem, kas ir iev\u0113rojami maz\u0101ki par diviem procentiem.   Pieg\u0101de ir rezult\u0101ts tam, k\u0101 uzbruc\u0113jam ir nepiecie\u0161ams ieg\u016bt abonentu identifikatorus un...<\/p>","protected":false},"author":1,"featured_media":1731,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Information leakage for SS7 attack<\/title>\n<meta name=\"description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/lv\/ss7-sms\/ka-informacijas-noplude-ss7-uzbrukumam\/\" \/>\n<meta property=\"og:locale\" content=\"lv_LV\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Information leakage for SS7 attack\" \/>\n<meta property=\"og:description\" content=\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/lv\/ss7-sms\/ka-informacijas-noplude-ss7-uzbrukumam\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T05:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:47:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Information leakage for SS7 attack\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"lv\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\",\"name\":\"How Information leakage for SS7 attack\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"datePublished\":\"2024-08-29T05:05:47+00:00\",\"dateModified\":\"2024-09-05T09:47:59+00:00\",\"description\":\"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"lv\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lv\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Information leakage for SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lv\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lv\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"K\u0101 inform\u0101cijas nopl\u016bde SS7 uzbrukumam","description":"K\u0101 SS7 hakeri un uzbrukumi tiek veikti, lai nopludin\u0101tu inform\u0101ciju. P\u0101rtveriet \u012bszi\u0146as un zvanus, izmantojot m\u016bsu SS7 programmat\u016bras uzlauzumus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ka-informacijas-noplude-ss7-uzbrukumam\/","og_locale":"lv_LV","og_type":"article","og_title":"How Information leakage for SS7 attack","og_description":"How SS7 Hacks and attacks are perform to leak information. Intercept the sms and call using our SS7 software hacks.","og_url":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ka-informacijas-noplude-ss7-uzbrukumam\/","og_site_name":"SS7 Hacking","article_published_time":"2024-08-29T05:05:47+00:00","article_modified_time":"2024-09-05T09:47:59+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Information leakage for SS7 attack","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"},"wordCount":498,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"lv"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/","name":"K\u0101 inform\u0101cijas nopl\u016bde SS7 uzbrukumam","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","datePublished":"2024-08-29T05:05:47+00:00","dateModified":"2024-09-05T09:47:59+00:00","description":"K\u0101 SS7 hakeri un uzbrukumi tiek veikti, lai nopludin\u0101tu inform\u0101ciju. P\u0101rtveriet \u012bszi\u0146as un zvanus, izmantojot m\u016bsu SS7 programmat\u016bras uzlauzumus.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb"},"inLanguage":"lv","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"lv","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/How-Information-leakage-for-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-information-leakage-for-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Information leakage for SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 uzlau\u0161ana","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lv"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"lv","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/media\/1731"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}