{"id":482,"date":"2024-04-16T08:16:05","date_gmt":"2024-04-16T05:16:05","guid":{"rendered":"https:\/\/sms-txt.net\/?p=482"},"modified":"2024-09-05T12:46:37","modified_gmt":"2024-09-05T09:46:37","slug":"co-je-utok-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sk\/ss7-sms\/co-je-utok-ss7\/","title":{"rendered":"\u010co je \u00fatok SS7"},"content":{"rendered":"<p>SS7 je dizajn pre vykon\u00e1vanie out-band signaliz\u00e1cie na podporu tejto v\u00fdroby c v\u0161etky faktura\u010dn\u00e9, smerovanie inform\u00e1ci\u00ed trhov\u00e9 \u00fa\u010dely ich PSTN (verejn\u00e1 komutovan\u00e1 telef\u00f3nna sie\u0165). <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/\">SS7<\/a> je presne to, \u010do funguje, s\u00fa v\u0161etky implementovan\u00e9 signaliza\u010dn\u00e9 siete kan\u00e1lov, a na to, ktor\u00e9 protokoly otupi\u0165 kv\u00f4li jeho implement\u00e1cii<\/p>\n<p>Vstupn\u00e9 body v sieti SS7:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Protokoly SIGTRAN<\/li>\n<li>Syst\u00e9my VAS, napr. SMSC, IN<\/li>\n<li>Signaliza\u010dn\u00e9 br\u00e1ny, MGW<\/li>\n<li>Poskytovatelia slu\u017eieb SS7 (GRX, IPX)<\/li>\n<li>Preklad GTT<\/li>\n<li>Termin\u00e1ly ISDN<\/li>\n<li>Telef\u00f3ny GSM<\/li>\n<li>LIG (leg\u00e1lna br\u00e1na na zachyt\u00e1vanie)<\/li>\n<li>Femtocella 3G<\/li>\n<li>Zapuzdrenie SIP<\/li>\n<li>Vz\u00e1jomn\u00e9 vz\u0165ahy medzi prev\u00e1dzkovate\u013emi<\/li>\n<li>Pripojenie STP<\/li>\n<\/ul>\n<h1>\u010co presne rob\u00ed SS7?<\/h1>\n<p>SS7 m\u00f4\u017ee by\u0165 v skuto\u010dnosti len zoznam protokolov, ktor\u00e9 umo\u017e\u0148uj\u00fa telef\u00f3nnym sie\u0165am vymie\u0148a\u0165 si presn\u00e9 inform\u00e1cie potrebn\u00e9 na odovzd\u00e1vanie po\u017eiadaviek a textovej komunik\u00e1cie a tie\u017e na zaru\u010denie presnej faktur\u00e1cie. Okrem toho umo\u017e\u0148uje pou\u017e\u00edvate\u013eom, ktor\u00ed vyu\u017e\u00edvaj\u00fa jednu sie\u0165, prech\u00e1dza\u0165 do inej, napr\u00edklad pri cestovan\u00ed v zahrani\u010d\u00ed.<\/p>\n<h2>\u010co je dosta\u0165 do SS7 splnomocni\u0165 hackerov naozaj robi\u0165?<\/h2>\n<p>Ke\u010f z\u00edskaj\u00fa pr\u00edstup k tejto technike SS7, hacker m\u00f4\u017ee ma\u0165 pr\u00edstup presne k tak\u00e9mu mno\u017estvu inform\u00e1ci\u00ed a \u0161pehovac\u00edch kapac\u00edt ako poskytovatelia zabezpe\u010denia.<\/p>\n<p>Mohli by transparentne zavola\u0165 dopredu a poskytn\u00fa\u0165 im zru\u010dnos\u0165 po\u010d\u00fava\u0165 alebo nahr\u00e1va\u0165 za nich. M\u00f4\u017eu prech\u00e1dza\u0165 SMS spr\u00e1vy doru\u010den\u00e9 medzi telef\u00f3nmi, tie\u017e sledova\u0165 polohu telef\u00f3nu pomocou presne toho syst\u00e9mu, ktor\u00fd telef\u00f3nne siete vyu\u017e\u00edvaj\u00fa na udr\u017eanie pon\u00fakanej slu\u017eby a tie\u017e na odosielanie telef\u00f3nnych textov, hovorov a inform\u00e1ci\u00ed.<\/p>\n<h2>Ako z\u00edskate pr\u00edstup k pou\u017e\u00edvaniu siete SS7?<\/h2>\n<p>V\u00e4\u010d\u0161ina \u010fal\u0161\u00edch odpoved\u00ed nie je spr\u00e1vna. SS7 nem\u00e1 \u017eiadne re\u010dov\u00e9 povinnosti. SS7 pren\u00e1\u0161a v\u0161etky inform\u00e1cie o telef\u00f3ne nad sie\u0165ou paketov\u00e9ho \u0161t\u00fdlu. Suma ID volaj\u00faceho, niektor\u00e9 inform\u00e1cie o priebehu napr\u00edklad identifik\u00e1cia kr\u00edzov\u00e9ho respondenta c v\u0161etko na rozdiel od be\u017en\u00e9ho hovoru, v\u0161etko na telef\u00f3ne, okrem toho materi\u00e1lu, stavu. SS7 vedie a zostavuje spojenia potrebn\u00e9 na uskuto\u010dnenie v sieti t\u00fdm, ktor\u00fd pren\u00e1\u0161a va\u0161u prev\u00e1dzku, a to aj v tomto scen\u00e1ri.<\/p>\n<p>SS7 sa pou\u017e\u00edva v tradi\u010dn\u00fdch telef\u00f3nnych sie\u0165ach, preto nie je potrebn\u00e9 sa na\u0148 napoji\u0165. Zariadenia s\u00fa drah\u00e9 a mohli by by\u0165 dosiahnut\u00e9 v ur\u010dit\u00fdch bodoch siete.<\/p>\n<p>Ak chcete urobi\u0165, je to trestn\u00fd \u010din pod\u013ea hlavy 18, USC, preto, \u017ee FBI vytvor\u00ed svoje zn\u00e1mosti, okrem ochrany domovsk\u00e9ho pozemku, preto\u017ee je to n\u00e1rodn\u00fd zlo\u010din.<\/p>\n<h2>\u010co presne je mo\u017en\u00e9 urobi\u0165?<\/h2>\n<p>Jedin\u00fdm sp\u00f4sobom, ako sa chr\u00e1ni\u0165 pred \u00fadermi SS7, je v\u017edy vypn\u00fa\u0165 smartf\u00f3n. Ja aj vy vieme, \u017ee to mo\u017eno nie je mo\u017en\u00e9. To, \u010do by ste mohli urobi\u0165, je \"pochopi\u0165 nepriate\u013ea\". Vedomosti o tom, \u017ee \u00falohy, ako s\u00fa \u00fadery SS7, s\u00fa be\u017en\u00e9 a \u010doraz \u010dastej\u0161ie sa vyskytuj\u00face, s\u00fa v s\u00fa\u010dasnosti nevyhnutn\u00e9 20 20.<\/p>\n<p>&nbsp;<\/p>\n<p>Napriek tomu je pri nespo\u010detnom mno\u017estve spotrebite\u013eov mobiln\u00fdch telef\u00f3nov mo\u017enos\u0165, \u017ee budete konkr\u00e9tnym objektom sledovania zo strany kyberzlo\u010dincov, nepatrn\u00e1. Ak by ste sa v\u0161ak n\u00e1hodou stali lek\u00e1rom, kr\u00e1\u013eovnou a ozna\u010dili sa za prezidenta, ktor\u00fd dr\u017e\u00ed vo vlastnom mobile bolestiv\u00e9 a citliv\u00e9 individu\u00e1lne inform\u00e1cie, va\u0161e vlastn\u00e9 mo\u017enosti s\u00fa vy\u0161\u0161ie ako u be\u017en\u00e9ho \u010dloveka. Ak pou\u017e\u00edvate 2FA pre bankov\u00e9 rie\u0161enia, m\u00f4\u017ee v\u00e1m hrozi\u0165 ohrozenie va\u0161ich \u00fa\u010dtov.<\/p>\n<p>&nbsp;<\/p>\n<p>Vzh\u013eadom na to, ak\u00e9 jednoduch\u00e9 je vykona\u0165 \u00fatok SS7 a tie\u017e po\u0161kodenie, ktor\u00e9 ur\u010dite sp\u00f4sob\u00edte obeti, ako aj jej dod\u00e1vate\u013eovi, m\u00f4\u017ee jednotlivec jednoducho o\u010dak\u00e1va\u0165, \u017ee inov\u00e1cie v telekomunik\u00e1ci\u00e1ch m\u00f4\u017eu br\u00e1ni\u0165 koncov\u00fdch pou\u017e\u00edvate\u013eov. Pre podniky vl\u00e1dnych agent\u00far a MSP teraz existuje pomerne ve\u013ea mo\u017enost\u00ed, od mobiln\u00fdch pr\u00edstupov VPN na mieru a\u017e po inovat\u00edvne mo\u017enosti, ako je napr\u00edklad zabezpe\u010denie na \u00farovni pou\u017e\u00edvate\u013ea zalo\u017een\u00e9 na SIM karte FirstPoint<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7 je dizajn pre vykon\u00e1vanie out-band signaliz\u00e1cie na podporu tejto v\u00fdroby c v\u0161etky faktura\u010dn\u00e9, smerovanie inform\u00e1ci\u00ed trhov\u00e9 \u00fa\u010dely ich PSTN (verejn\u00e1 komutovan\u00e1 telef\u00f3nna sie\u0165). SS7 je presne to, \u010do funguje s\u00fa v\u0161etky implementovan\u00e9 signaliza\u010dn\u00e9 siete kan\u00e1lov, a na to, ktor\u00e9 protokoly tup\u00e9 v\u010faka jeho implement\u00e1cii Vstupn\u00e9 body v sieti SS7: ...<\/p>","protected":false},"author":1,"featured_media":1737,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is SS7 attack<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sk\/ss7-sms\/co-je-utok-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is SS7 attack\" \/>\n<meta property=\"og:description\" content=\"SS7 is design for performing out-band signaling in aid of this production of c all billing, routing information market purposes of their PSTN (public switched telephone network). SS7 is exactly what works are all implemented channel signaling networks, and to that which protocols dull due to its implementation Entrance points in a SS7 network: &nbsp;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sk\/ss7-sms\/co-je-utok-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T05:16:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:46:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"What is SS7 attack\",\"datePublished\":\"2024-04-16T05:16:05+00:00\",\"dateModified\":\"2024-09-05T09:46:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-is-ss7-attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/\",\"name\":\"What is SS7 attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-is-ss7-attack.jpg\",\"datePublished\":\"2024-04-16T05:16:05+00:00\",\"dateModified\":\"2024-09-05T09:46:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-is-ss7-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-is-ss7-attack.jpg\",\"width\":900,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/what-is-ss7-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sms-txt.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sms-txt.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\",\"name\":\"SS7\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u010co je \u00fatok SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sk\/ss7-sms\/co-je-utok-ss7\/","og_locale":"sk_SK","og_type":"article","og_title":"What is SS7 attack","og_description":"SS7 is design for performing out-band signaling in aid of this production of c all billing, routing information market purposes of their PSTN (public switched telephone network). SS7 is exactly what works are all implemented channel signaling networks, and to that which protocols dull due to its implementation Entrance points in a SS7 network: &nbsp;...","og_url":"https:\/\/sms-txt.net\/sk\/ss7-sms\/co-je-utok-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-04-16T05:16:05+00:00","article_modified_time":"2024-09-05T09:46:37+00:00","og_image":[{"width":900,"height":507,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"What is SS7 attack","datePublished":"2024-04-16T05:16:05+00:00","dateModified":"2024-09-05T09:46:37+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/"},"wordCount":592,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg","articleSection":["SS7"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/","url":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/","name":"\u010co je \u00fatok SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg","datePublished":"2024-04-16T05:16:05+00:00","dateModified":"2024-09-05T09:46:37+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/What-is-ss7-attack.jpg","width":900,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/what-is-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"What is SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/media\/1737"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/media?parent=482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/categories?post=482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/tags?post=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}