{"id":388,"date":"2024-02-08T05:09:18","date_gmt":"2024-02-08T02:09:18","guid":{"rendered":"https:\/\/sms-txt.net\/?p=388"},"modified":"2024-09-05T12:45:43","modified_gmt":"2024-09-05T09:45:43","slug":"cum-exploateaza-hackerii-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/ro\/ss7-sms\/cum-exploateaza-hackerii-ss7\/","title":{"rendered":"Cum exploateaz\u0103 hackerii SS7?"},"content":{"rendered":"<p>Aceast\u0103 er\u0103 este considerat\u0103 era utiliz\u0103rii telefonului mobil. Fiecare persoan\u0103 este implicat\u0103 \u00een utilizarea excesiv\u0103 a telefonului mobil. Utilizarea telefoanelor mobile a devenit o dependen\u021b\u0103 pentru fiecare persoan\u0103. De la copii la profesioni\u0219ti, fiecare persoan\u0103 are aceste gadgeturi \u00een buzunar.<\/p>\n<p>Atacurile cibernetice asupra telefoanelor mobile au devenit mai frecvente odat\u0103 cu apari\u021bia tehnologiei 5G. F\u0103r\u0103 \u00eendoial\u0103, sistemul mondial de telecomunica\u021bii ofer\u0103 oamenilor cele mai bune servicii de internet. Aceste facilit\u0103\u021bi nu numai c\u0103 aduc confort \u00een via\u021ba oamenilor. Dar afecteaz\u0103 \u0219i siguran\u021ba datelor sensibile de pe telefoanele mobile. Deoarece hackerii nu sunt interesa\u021bi de toate informa\u021biile, cum ar fi cele despre istoria muzicii. Dar, ei atac\u0103 exclusiv informa\u021biile dumneavoastr\u0103 sensibile.<\/p>\n<h2>Ce este SS7 \u0219i cum poate fi folosit de hackeri?<\/h2>\n<p>Introducerea tehnicilor avansate de hacking \u00eempreun\u0103 cu noile software-uri face ca hackingul s\u0103 fie mai u\u0219or \u0219i mai competent. Oamenii sunt acum capabili s\u0103 \u00eendeplineasc\u0103 orice sarcin\u0103 pe internet \u00eentr-un mod competent. Dar, acest lucru marcheaz\u0103, de asemenea, un impact negativ asupra securit\u0103\u021bii datelor. \u00cen 2019, procentul atacurilor malware a crescut la 50%, dup\u0103 cum au demonstrat exper\u021bii. La sf\u00e2r\u0219itul anului 2020, atacurile cibernetice ar putea cre\u0219te la cifre mai mari.<\/p>\n<p>\u00cen ultimii c\u00e2\u021biva ani, re\u021belele mobile au fost atacate cel mai frecvent de <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> protocol. Acest lucru are un impact negativ nu numai asupra vie\u021bii private a utilizatorilor, ci \u0219i asupra celei a furnizorului de servicii. SS7 a fost introdus \u00een 1974, ca un conector \u00eentre diferite dispozitive mobile. SS7 ajut\u0103 la transferul de SMS-uri \u0219i apeluri de la un dispozitiv mobil la altul. De\u0219i scopul inven\u021biei a fost diferit. Dar, acum este exploatat \u00een atacurile cibernetice.<\/p>\n<p>Mai frecvent, \u021binta hackerilor este de a compromite \u00eentreaga re\u021bea. Ei ob\u021bin toate informa\u021biile abona\u021bilor furnizorilor de servicii. Odat\u0103 ce au acces la informa\u021biile furnizorilor de servicii, ei pot accesa \u00een siguran\u021b\u0103 informa\u021biile personale ale tuturor abona\u021bilor. \u00cen acest fel, ob\u021bin controlul asupra tuturor apelurilor \u0219i mesajelor. \u00cen plus, pot urm\u0103ri loca\u021bia persoanei dorite, chiar \u0219i atunci c\u00e2nd GPS-ul acesteia este dezactivat. \u00centregul proces se desf\u0103\u0219oar\u0103 \u00eentr-un mod at\u00e2t de sigur, f\u0103r\u0103 ca furnizorul de servicii s\u0103 fie avertizat.<\/p>\n<p>Protocolul SS7 faciliteaz\u0103 comunicarea ineficient\u0103 din \u00eentreaga lume. Utilizatorii de telefonie mobil\u0103 se bucur\u0103 de o comunicare eficient\u0103 \u00een \u00eentreaga lume. Introducerea acestui protocol are mai multe dezavantaje. Acest lucru face ca informa\u021biile personale ale oamenilor s\u0103 fie mai predispuse la atacuri cibernetice.<\/p>\n<p>De la inventarea sa, protocolul nu a primit nicio versiune actualizat\u0103. Acesta este motivul pentru care poate fi utilizat cu u\u0219urin\u021b\u0103 \u00een lumea hacking-ului. Cele mai mari agen\u021bii de informa\u021bii din lume folosesc, de asemenea, acest protocol pentru a ob\u021bine \u00een mod legitim informa\u021biile necesare. Din p\u0103cate, toate aceste informa\u021bii pot fi, de asemenea, u\u0219or accesate de hackeri.<\/p>\n<p>Exist\u0103 protocoale speciale de semnalizare telefonic\u0103 \u00een SS7. Acest protocol de semnalizare este responsabil pentru conectarea apelului telefonic de la un mobil la altul. Protocolul func\u021bioneaz\u0103 eficient at\u00e2t pentru telefoanele publice f\u0103r\u0103 fir, c\u00e2t \u0219i pentru cele cu fir.<\/p>\n<h2>Cine este afectat de vulnerabilitatea SS7?<\/h2>\n<p>Cu timpul, au fost ad\u0103ugate \u0219i alte aplica\u021bii peste protocolul SS7. Scopul de baz\u0103 al acestora a fost introducerea serviciilor SMS. Urmate de introducerea redirec\u021bion\u0103rii apelurilor, a apelurilor \u00een a\u0219teptare, a apelurilor \u00een conferin\u021b\u0103 etc. Odat\u0103 cu introducerea tuturor acestor aplica\u021bii noi, dispozitivele mobile sunt supuse frecvent pirateriei informatice. Atacurile SS7 sunt atacuri malware asupra dispozitivelor mobile.<\/p>\n<p>Hackerii au acces la apelurile telefonice \u0219i mesajele personale ale dispozitivelor \u021bint\u0103. Atacurile sunt efectuate mai frecvent prin intermediul furnizorilor de servicii mobile, pentru a accesa cu u\u0219urin\u021b\u0103 to\u021bi utilizatorii. Atacurile prin exploatarea SS7 se efectueaz\u0103 asupra comunica\u021biilor telefonice, nu asupra comunica\u021biilor wifi.<\/p>\n<p>Capacit\u0103\u021bile autentice ale SS7 sunt utilizate de hackeri pentru a ob\u021bine informa\u021bii despre toate comunica\u021biile. Hackerii trebuie s\u0103 descarce SS7 SDK de pe internet pentru a utiliza SS7 \u00een hacking. Apoi, ei folosesc SS7 SDK \u00eentr-un mod foarte tehnic pentru a reu\u0219i hacking-ul.<\/p>\n<p>Acest lucru \u00eei ajut\u0103 pe hackeri s\u0103 se conecteze la re\u021beaua SS7. Dup\u0103 conectare, ace\u0219tia se \u00eendreapt\u0103 c\u0103tre re\u021beaua \u021bint\u0103. Dispozitivul \u021bint\u0103 este incapabil s\u0103 detecteze acest lucru. Deoarece dispozitivul \u00eel ia drept un nod MSC sau VLR.<br \/>\nPrincipala activitate efectuat\u0103 de un hacker pentru a ob\u021bine acces la cele mai securizate dispozitive este atacul \"MitM phishing\". Dup\u0103 acest atac, hackerul procedeaz\u0103 la ob\u021binerea informa\u021biilor dorite. Hackerul ob\u021bine apoi \u00een mod eficient toate detaliile SMS-urilor \u0219i apelurilor, \u00eempreun\u0103 cu localizarea exact\u0103 a persoanei vizate.<\/p>\n<p>Majoritatea oamenilor folosesc 2FA ca protec\u021bie \u00eempotriva atacurilor malware ale SS7. Dar, aceast\u0103 abordare de protec\u021bie a furnizorilor de servicii mobile e\u0219ueaz\u0103. Ca \u00een aceste tipuri de scenarii, hackerii o dep\u0103\u0219esc pentru a utiliza codurile prin interceptare. Ei folosesc codurile pentru a ob\u021bine acces la un num\u0103r mare de conturi, chiar \u0219i la cel al b\u0103ncii.<\/p>\n<p>\u00centreprinderile digitale sunt acum expuse unui risc mai mare. Hackerii folosesc informa\u021biile personale ale tuturor \u00eentreprinderilor digitale. Ei fac toate acestea \u00een siguran\u021b\u0103 prin atacul \"MitM phishing\". \u00centreprinderile digitale sunt dependente de SS7 pentru a-\u0219i desf\u0103\u0219ura comunica\u021biile.<\/p>\n<p>\u00centreprinderile digitale \u00ee\u0219i trimit fi\u0219iere profesionale importante, care pot fi accesate cu u\u0219urin\u021b\u0103 de hackeri. Un num\u0103r mare de dispozitive din era digital\u0103 utilizeaz\u0103 dispozitive mobile pentru a transmite date profesionale importante. \u00centreprinderile digitale sunt expuse riscului de a se confrunta cu atacuri cibernetice mai mari. Dar, acestea nu acord\u0103 nicio aten\u021bie pentru a dep\u0103\u0219i aceste atacuri. Aceast\u0103 problem\u0103 ar trebui s\u0103 fie luat\u0103 \u00een serios de aceste \u00eentreprinderi.<\/p>","protected":false},"excerpt":{"rendered":"<p>Aceast\u0103 er\u0103 este considerat\u0103 era utiliz\u0103rii telefonului mobil. Fiecare persoan\u0103 este implicat\u0103 \u00een utilizarea excesiv\u0103 a telefonului mobil. Utilizarea telefoanelor mobile a devenit o dependen\u021b\u0103 pentru fiecare persoan\u0103. De la copii la profesioni\u0219ti, fiecare persoan\u0103 are aceste gadgeturi \u00een buzunar. Atacurile cibernetice asupra telefoanelor mobile au devenit mai frecvente odat\u0103 cu apari\u021bia tehnologiei 5G...<\/p>","protected":false},"author":1,"featured_media":401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Are Exploiting SS7?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/cum-exploateaza-hackerii-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Exploiting SS7?\" \/>\n<meta property=\"og:description\" content=\"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/cum-exploateaza-hackerii-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T02:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Hackers Are Exploiting SS7?\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"name\":\"How Hackers Are Exploiting SS7?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Are Exploiting SS7?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cum exploateaz\u0103 hackerii SS7?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/ro\/ss7-sms\/cum-exploateaza-hackerii-ss7\/","og_locale":"ro_RO","og_type":"article","og_title":"How Hackers Are Exploiting SS7?","og_description":"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...","og_url":"https:\/\/sms-txt.net\/ro\/ss7-sms\/cum-exploateaza-hackerii-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-08T02:09:18+00:00","article_modified_time":"2024-09-05T09:45:43+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Hackers Are Exploiting SS7?","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"wordCount":879,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","articleSection":["SS7"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","name":"Cum exploateaz\u0103 hackerii SS7?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","width":2000,"height":761,"caption":"ss7 attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Hackers Are Exploiting SS7?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}