{"id":479,"date":"2020-08-01T08:13:43","date_gmt":"2020-08-01T08:13:43","guid":{"rendered":"https:\/\/sms-txt.net\/?p=479"},"modified":"2021-03-19T19:28:10","modified_gmt":"2021-03-19T16:28:10","slug":"zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sk\/zachytenie-sms\/zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok\/","title":{"rendered":"Vylep\u0161enie ur\u010dovania polohy po\u010das sledovania polohy - \u00fatok SS7"},"content":{"rendered":"<h1>Vylep\u0161enie polohovania SS7 po\u010das sledovania polohy<\/h1>\n<p>Jedn\u00fdm z \u00fatokov na siete SS7 je pravdepodobne pozorovanie polohy. Umiestnenie \u00fa\u010dastn\u00edka pet\u00edcie je smerovan\u00e9 pomocou <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-day\/\"><strong>SS7<\/strong> <\/a>siete a odpove\u010f zah\u0155\u0148a aj individualitu z\u00e1klad\u0148ovej stanice. Ka\u017ed\u00e1 z\u00e1klad\u0148ov\u00e1 stanica m\u00e1 \u0161peci\u00e1lne s\u00faradnice a adresy oblasti. V d\u00f4sledku hustoty sa oblas\u0165 politiky v metropole pohybuje v rozmedz\u00ed tis\u00edcov a tis\u00edcov.<\/p>\n<p>&nbsp;<\/p>\n<p>\u00dato\u010dn\u00edk dok\u00e1\u017ee vyu\u017ei\u0165 osobitosti mobilnej siete na vytvorenie lokaliza\u010dn\u00fdch pr\u00edkazov, okrem toho dok\u00e1\u017ee sledova\u0165 z\u00e1klad\u0148ov\u00fa stanicu s jej vlastnou individualitou pomocou Stealthy SS7 Attacks 4-5 radu webov\u00fdch n\u00e1strojov. Pravdivos\u0165 tohto zis\u0165ovania polohy je zalo\u017een\u00e1 na oblasti politiky z\u00e1klad\u0148ovej stanice. \u017de \u0161kodca zist\u00ed miesto z\u00e1klad\u0148ovej stanice, ktor\u00e1 funguje \u00fa\u010dastn\u00edkovi v s\u00fa\u010dasnom \u010dase.<\/p>\n<p>Na\u0161e anal\u00fdzy odhalili, \u017ee blchy objavili presn\u00e9 ur\u010denie miesta odberu. Mobiln\u00e9 zariadenie dost\u00e1va zna\u010dky v z\u00e1klad\u0148ov\u00fdch staniciach. V pr\u00edpade, \u017ee \u0161kodca ur\u010d\u00ed s\u00faradnice 3 alebo dokonca 2 z\u00e1klad\u0148ov\u00fdch stan\u00edc, ktor\u00e9 s\u00fa najbli\u017e\u0161ie k tomuto \u00fa\u010dastn\u00edkovi, m\u00f4\u017ee sa z\u00fa\u017ei\u0165 poloha \u00fa\u010dastn\u00edka.<\/p>\n<p>&nbsp;<\/p>\n<p>Be\u017ene si mobiln\u00e9 zariadenie vyber\u00e1 z\u00e1klad\u0148ov\u00fa stanicu so v\u0161etk\u00fdmi r\u00e1diov\u00fdmi stavmi po\u010das celej transakcie. Preto mus\u00ed mobiln\u00e9 zariadenie zad\u00e1va\u0165 vstupn\u00e9 znaky s touto sie\u0165ou. Dokonca aj \u0161kodca m\u00f4\u017ee vykona\u0165 pr\u00e1cu s SMS, aby za\u010dal skryt\u00fa transakciu spolu s pou\u017eit\u00edm v\u0161etk\u00fdch cie\u013eov\u00fdch \u00fa\u010dastn\u00edkov. Inform\u00e1cie t\u00fdkaj\u00face sa t\u00fdchto spr\u00e1v m\u00f4\u017eu by\u0165 pon\u00faknut\u00e9 z \u00favahy \u00fa\u010dastn\u00edka.<\/p>\n<p>&nbsp;<\/p>\n<p>E\u0161te lep\u0161\u00edm prostriedkom na zakrytie transakcie je v\u017edy pou\u017eitie utajen\u00fdch ozn\u00e1men\u00ed USSD. Hoci tento druh transakcie nie je zap\u00edsan\u00fd z postupu \u00fa\u010dtovania, za\u010dn\u00fa v\u00fdmenu znakov medzi mobiln\u00fdm zariaden\u00edm a sie\u0165ou. Dokonca aj \u0161kodca m\u00f4\u017ee zv\u00fd\u0161i\u0165 presnos\u0165 polohy manipul\u00e1ciou s identifik\u00e1ciami z\u00e1klad\u0148ovej stanice a ozn\u00e1meniami USSD.<\/p>\n<p>&nbsp;<\/p>\n<p>Naru\u0161ite\u013e po\u017eiada o identifik\u00e1tor svojej z\u00e1klad\u0148ovej stanice. V\u00e1\u0161 naru\u0161ite\u013e vysiela tich\u00e9 rozpr\u00e1vanie tak, aby prin\u00fatil zariadenia \u00fa\u010dastn\u00edka vykona\u0165 transakciu prostredn\u00edctvom bezdr\u00f4tov\u00e9ho portu. V pr\u00edpade, \u017ee \u0161kodca z\u00edska roz\u0161\u00edrenie polohy.<\/p>\n<p>&nbsp;<\/p>\n<p>Sie\u0165 m\u00f4\u017ee vybra\u0165 \u010derstv\u00fa z\u00e1klad\u0148ov\u00fa stanicu na z\u00edskanie konkr\u00e9tnej transakcie a tie\u017e datab\u00e1zu VLR (Visitor Location Register), ktor\u00e1 aktualizuje polohu \u00fa\u010dastn\u00edka. Naru\u0161ite\u013e sa e\u0161te raz op\u00fdta na presn\u00fa polohu \u00fa\u010dastn\u00edka a z\u00edska identifik\u00e1tor tejto z\u00e1klad\u0148ovej stanice. Naru\u0161ite\u013e tak m\u00f4\u017ee zo\u0161t\u00edhli\u0165 oblas\u0165, v ktorej sa \u00fa\u010dastn\u00edk v s\u00fa\u010dasnosti nach\u00e1dza.<\/p>\n<p>&nbsp;<\/p>\n<h2>Z\u00e1ver:<\/h2>\n<p>Dokonca aj dizajn \"ohradenej z\u00e1hrady\" je zastaran\u00fd. Dokonca aj proces signaliz\u00e1cie SS7 je zn\u00e1my ako proces telef\u00f3nnej siete. Pred vytvoren\u00edm SS7 sa objedn\u00e1vky slu\u017eieb pre \u00fa\u010dastn\u00edcke vz\u0165ahy a preprava informa\u010dn\u00fdch bal\u00edkov pres\u00favali so stanicou. T\u00e1to met\u00f3da bola aktualizovan\u00e1 a nahraden\u00e1 v\u0161etk\u00fdmi celosvetov\u00fdmi signaliza\u010dn\u00fdmi programami (SS7) pred viac ako 30 desa\u0165ro\u010diami. Vzor SS7 stanovuje protokoly na v\u00fdmenu \u00fadajov a postupov okolo sie\u0165ov\u00fdch zariaden\u00ed telekomunika\u010dn\u00fdch podnikov. SS7 sl\u00fa\u017ei ako z\u00e1klad\u0148a na z\u00edskanie signaliza\u010dnej infra\u0161trukt\u00fary v miestnych a n\u00e1rodn\u00fdch sie\u0165ach.<\/p>\n<p>&nbsp;<\/p>\n<p>Nepredstavovala \u017eiadnu hrozbu pre \u00fa\u010dastn\u00edkov ani oper\u00e1torov, aj ke\u010f sa sie\u0165 SS7 uk\u00e1zala ako platforma. Sie\u0165 sa vyv\u00edjala tak, aby zodpovedala norm\u00e1m podpory mobiln\u00fdch spojen\u00ed a slu\u017eieb, a v 21. storo\u010d\u00ed sa prv\u00fdkr\u00e1t vytvorila aj dvojica signaliza\u010dn\u00fdch dopravn\u00fdch protokolov zn\u00e1mych ako SIGTRAN. SIGTRAN m\u00f4\u017ee by\u0165 roz\u0161\u00edren\u00edm pre SS7, ktor\u00e9 umo\u017e\u0148uje vyu\u017eitie siet\u00ed IP na prenos spr\u00e1v, aj tento vyn\u00e1lez signaliza\u010dnej siete prestal by\u0165 rozpt\u00fdlen\u00fd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Vylep\u0161enie polohy SS7 po\u010das sledovania polohy Pravdepodobne jedn\u00fdm z \u00fatokov na siete SS7 by bolo sledovanie polohy. Lokaliz\u00e1cia \u00fa\u010dastn\u00edka pet\u00edcie je smerovan\u00e1 prostredn\u00edctvom siet\u00ed SS7 a odpove\u010f zah\u0155\u0148a aj individualitu z\u00e1klad\u0148ovej stanice. Ka\u017ed\u00e1 jednotliv\u00e1 z\u00e1klad\u0148ov\u00e1 stanica m\u00e1 \u0161peci\u00e1lne s\u00faradnice a adresy oblasti. V d\u00f4sledku hustoty...<\/p>","protected":false},"author":1,"featured_media":1728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Location Tracking - How to track location using SS7<\/title>\n<meta name=\"description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sk\/zachytenie-sms\/zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Positioning Enhancement During Location Tracking -SS7 attack\" \/>\n<meta property=\"og:description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sk\/zachytenie-sms\/zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-01T08:13:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T16:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Positioning Enhancement During Location Tracking -SS7 attack\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"name\":\"SS7 Location Tracking - How to track location using SS7\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"description\":\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Positioning Enhancement During Location Tracking -SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sledovanie polohy SS7 - Ako sledova\u0165 polohu pomocou SS7","description":"Jedn\u00fdm z \u00fatokov na siete SS7 je pravdepodobne pozorovanie polohy. Polohu m\u00f4\u017eete sledova\u0165 pomocou n\u00e1\u0161ho softv\u00e9ru SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sk\/zachytenie-sms\/zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok\/","og_locale":"sk_SK","og_type":"article","og_title":"Positioning Enhancement During Location Tracking -SS7 attack","og_description":"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.","og_url":"https:\/\/sms-txt.net\/sk\/zachytenie-sms\/zlepsenie-polohy-pocas-sledovania-polohy-ss7-utok\/","og_site_name":"SS7 Hacking","article_published_time":"2020-08-01T08:13:43+00:00","article_modified_time":"2021-03-19T16:28:10+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Positioning Enhancement During Location Tracking -SS7 attack","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"wordCount":569,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","url":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","name":"Sledovanie polohy SS7 - Ako sledova\u0165 polohu pomocou SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","description":"Jedn\u00fdm z \u00fatokov na siete SS7 je pravdepodobne pozorovanie polohy. Polohu m\u00f4\u017eete sledova\u0165 pomocou n\u00e1\u0161ho softv\u00e9ru SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Positioning Enhancement During Location Tracking -SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/media\/1728"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/categories?post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/tags?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}