{"id":479,"date":"2020-08-01T08:13:43","date_gmt":"2020-08-01T08:13:43","guid":{"rendered":"https:\/\/sms-txt.net\/?p=479"},"modified":"2021-03-19T19:28:10","modified_gmt":"2021-03-19T16:28:10","slug":"imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/ro\/interceptare-sms\/imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7\/","title":{"rendered":"\u00cembun\u0103t\u0103\u021birea pozi\u021bion\u0103rii \u00een timpul urm\u0103ririi loca\u021biei - atac SS7"},"content":{"rendered":"<h1>\u00cembun\u0103t\u0103\u021birea pozi\u021bion\u0103rii SS7 \u00een timpul urm\u0103ririi loca\u021biei<\/h1>\n<p>Probabil unul dintre atacurile asupra re\u021belelor SS7 ar fi observarea loca\u021biei. Loca\u021bia unui abonat la peti\u021bie este direc\u021bionat\u0103 prin intermediul <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-day\/\"><strong>SS7<\/strong> <\/a>re\u021bele \u0219i, de asemenea, r\u0103spunsul cuprinde individualitatea sta\u021biei de baz\u0103. Fiecare sta\u021bie de baz\u0103 are coordonate speciale \u0219i se adreseaz\u0103 unei zone. Ca urmare a densit\u0103\u021bii, zona de politic\u0103 la o metropol\u0103 variaz\u0103 de la mii de mii.<\/p>\n<p>&nbsp;<\/p>\n<p>Un atacator este capabil s\u0103 profite de particularit\u0103\u021bile re\u021belei mobile pentru a crea ordine de localizare, \u00een plus fa\u021b\u0103 de urm\u0103rirea sta\u021biei de baz\u0103 cu propria sa individualitate, utiliz\u00e2nd atacuri SS7 Stealthy 4-5 o serie de instrumente web. Adev\u0103rul acestei descoperiri a loca\u021biei se bazeaz\u0103 pe zona de politic\u0103 a sta\u021biei de baz\u0103. C\u0103 r\u0103uf\u0103c\u0103torul stabile\u0219te locul sta\u021biei de baz\u0103 care func\u021bioneaz\u0103 abonatul \u00een prezent.<\/p>\n<p>Analizele noastre arat\u0103 c\u0103 puricii au descoperit s\u0103 fixeze cu precizie loca\u021bia abonatului. Un dispozitiv mobil prime\u0219te semne \u00een sta\u021biile de baz\u0103. \u00cen cazul \u00een care maleficul decide coordonatele a 3 sau chiar 2 sta\u021bii de baz\u0103 cele mai apropiate de acest abonat, loca\u021bia abonatului ar putea fi restr\u00e2ns\u0103.<\/p>\n<p>&nbsp;<\/p>\n<p>\u00cen mod normal, un dispozitiv mobil selecteaz\u0103 o sta\u021bie de baz\u0103 cu toate st\u0103rile radio pe parcursul unei tranzac\u021bii. Prin urmare, dispozitivul mobil trebuie s\u0103 introduc\u0103 semnale cu aceast\u0103 re\u021bea. Chiar \u0219i r\u0103uf\u0103c\u0103torul poate lucra cu un SMS pentru a \u00eencepe o tranzac\u021bie ascuns\u0103 \u00eempreun\u0103 cu to\u021bi abona\u021bii viza\u021bi. Informa\u021biile referitoare la aceste mesaje pot fi oferite din considera\u021bia abonatului.<\/p>\n<p>&nbsp;<\/p>\n<p>Un mijloc \u0219i mai bun de a ascunde o tranzac\u021bie este s\u0103 utiliza\u021bi \u00eentotdeauna notific\u0103ri USSD ascunse. De\u0219i acest tip de tranzac\u021bie nu este \u00eenscris din procedura de \u00eenc\u0103rcare, ele \u00eencep schimbul de semne \u00eentre dispozitivul mobil \u0219i re\u021bea. Chiar \u0219i r\u0103uf\u0103c\u0103torul poate spori precizia loca\u021biei manipul\u00e2nd identific\u0103rile sta\u021biilor de baz\u0103 \u0219i notific\u0103rile USSD.<\/p>\n<p>&nbsp;<\/p>\n<p>Intrusul solicit\u0103 identificatorul sta\u021biei lor de baz\u0103. Intrusul transmite o vorb\u0103 \u00een surdin\u0103 astfel \u00eenc\u00e2t s\u0103 induc\u0103 dispozitivele abonatului s\u0103 efectueze o tranzac\u021bie printr-un port wireless. \u00cen cazul \u00een care r\u0103uf\u0103c\u0103torul va ob\u021bine augmentarea pozi\u021bion\u0103rii.<\/p>\n<p>&nbsp;<\/p>\n<p>Re\u021beaua poate selecta o sta\u021bie de baz\u0103 nou\u0103 pentru a ob\u021bine tranzac\u021bia respectiv\u0103, iar baza de date VLR (Visitor Location Register) actualizeaz\u0103 loca\u021bia abonatului. Intrusul solicit\u0103 \u00eenc\u0103 o dat\u0103 loca\u021bia exact\u0103 a abonatului \u0219i ob\u021bine identificatorul acestei sta\u021bii de baz\u0103. Prin urmare, intrusul poate sub\u021bia zona \u00een care abonatul poate fi g\u0103sit \u00een prezent.<\/p>\n<p>&nbsp;<\/p>\n<h2>Concluzie:<\/h2>\n<p>Chiar \u0219i conceptul de \"gr\u0103din\u0103 \u00eengr\u0103dit\u0103\" este dep\u0103\u0219it. Chiar \u0219i procesul de semnalizare SS7 este cunoscut ca proces al re\u021belei telefonice. \u00cenaintea cre\u0103rii SS7, ordinele de serviciu pentru rela\u021biile cu abona\u021bii \u0219i expedierea pachetelor de informa\u021bii erau deplasate cu o sta\u021bie. Aceast\u0103 metod\u0103 a fost actualizat\u0103 \u0219i \u00eenlocuit\u0103 cu toate programele de semnalizare la nivel mondial (SS7) peste 30 de decenii \u00een urm\u0103. Reperul SS7 stabile\u0219te protocoalele de schimb de date \u0219i proceduri \u00een jurul dispozitivelor de re\u021bea ale \u00eentreprinderilor de telecomunica\u021bii. SS7 ac\u021bioneaz\u0103 ca o baz\u0103 pentru a ob\u021bine o infrastructur\u0103 de semnalizare la nivelul re\u021belelor locale, na\u021bionale.<\/p>\n<p>&nbsp;<\/p>\n<p>Nu a reprezentat nicio amenin\u021bare pentru abona\u021bi sau operatori, chiar dac\u0103 re\u021beaua SS7 s-a dovedit a fi o platform\u0103. Re\u021beaua a progresat pentru a se potrivi cu normele de leg\u0103tur\u0103 mobil\u0103 \u0219i suport de servicii, de asemenea, \u00een secolul 21, de asemenea, o pereche de protocoale de transport de semnalizare cunoscute sub numele de SIGTRAN au fost stabilite pentru prima dat\u0103. SIGTRAN poate fi o extindere pentru SS7 care permite utilizarea re\u021belelor IP pentru a muta mesaje, de asemenea, aceast\u0103 inven\u021bie re\u021beaua de semnalizare a \u00eencetat s\u0103 mai fie dispersat\u0103.<\/p>","protected":false},"excerpt":{"rendered":"<p>Consolidarea pozi\u021bion\u0103rii SS7 \u00een timpul urm\u0103ririi loca\u021biei Probabil unul dintre atacurile asupra re\u021belelor SS7 ar fi observarea loca\u021biei. Loca\u021bia unui abonat la peti\u021bie este direc\u021bionat\u0103 prin intermediul re\u021belelor SS7 \u0219i, de asemenea, r\u0103spunsul cuprinde individualitatea sta\u021biei de baz\u0103. Fiecare sta\u021bie de baz\u0103 are coordonate speciale \u0219i adreseaz\u0103 o zon\u0103. Ca urmare a densit\u0103\u021bii,...<\/p>","protected":false},"author":1,"featured_media":1728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Location Tracking - How to track location using SS7<\/title>\n<meta name=\"description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/ro\/interceptare-sms\/imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Positioning Enhancement During Location Tracking -SS7 attack\" \/>\n<meta property=\"og:description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/ro\/interceptare-sms\/imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-01T08:13:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T16:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Positioning Enhancement During Location Tracking -SS7 attack\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"name\":\"SS7 Location Tracking - How to track location using SS7\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"description\":\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Positioning Enhancement During Location Tracking -SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 Location Tracking - Cum s\u0103 urm\u0103ri\u021bi loca\u021bia utiliz\u00e2nd SS7","description":"Probabil unul dintre atacurile asupra re\u021belelor SS7 ar fi observarea loca\u021biei. Pute\u021bi urm\u0103ri loca\u021bia folosind software-ul nostru SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/ro\/interceptare-sms\/imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7\/","og_locale":"ro_RO","og_type":"article","og_title":"Positioning Enhancement During Location Tracking -SS7 attack","og_description":"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.","og_url":"https:\/\/sms-txt.net\/ro\/interceptare-sms\/imbunatatirea-pozitionarii-in-timpul-urmaririi-locatiei-atac-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2020-08-01T08:13:43+00:00","article_modified_time":"2021-03-19T16:28:10+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Positioning Enhancement During Location Tracking -SS7 attack","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"wordCount":569,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","url":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","name":"SS7 Location Tracking - Cum s\u0103 urm\u0103ri\u021bi loca\u021bia utiliz\u00e2nd SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","description":"Probabil unul dintre atacurile asupra re\u021belelor SS7 ar fi observarea loca\u021biei. Pute\u021bi urm\u0103ri loca\u021bia folosind software-ul nostru SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Positioning Enhancement During Location Tracking -SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media\/1728"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/categories?post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/tags?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}