{"id":388,"date":"2024-02-08T05:09:18","date_gmt":"2024-02-08T02:09:18","guid":{"rendered":"https:\/\/sms-txt.net\/?p=388"},"modified":"2024-09-05T12:45:43","modified_gmt":"2024-09-05T09:45:43","slug":"hur-hackare-utnyttjar-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sv\/ss7-sms\/hur-hackare-utnyttjar-ss7\/","title":{"rendered":"Hur utnyttjar hackare SS7?"},"content":{"rendered":"<p>Denna tids\u00e5lder anses vara mobilanv\u00e4ndningens tids\u00e5lder. Varenda m\u00e4nniska \u00e4r involverad i \u00f6verdriven anv\u00e4ndning av mobiltelefonen. Mobilanv\u00e4ndning har blivit ett beroende f\u00f6r varje person. Fr\u00e5n barn till yrkesverksamma, alla har dessa prylar i fickorna.<\/p>\n<p>Cyberattacker mot mobiler blev vanligare i och med 5G-tekniken. Det r\u00e5der ingen tvekan om att v\u00e4rldens telekommunikationssystem underl\u00e4ttar f\u00f6r m\u00e4nniskor med de b\u00e4sta internettj\u00e4nsterna. Dessa faciliteter ger inte bara komfort i m\u00e4nniskors liv. Men det p\u00e5verkar ocks\u00e5 s\u00e4kerheten f\u00f6r k\u00e4nsliga data p\u00e5 mobiltelefoner. Eftersom hackare inte \u00e4r intresserade av all information som musikhistoria. Men de attackerar uteslutande din k\u00e4nsliga information.<\/p>\n<h2>Vad \u00e4r SS7 och hur kan det anv\u00e4ndas av hackare?<\/h2>\n<p>Inf\u00f6randet av avancerade hackningstekniker tillsammans med ny programvara g\u00f6r hackning enklare och skickligare. M\u00e4nniskor kan nu utf\u00f6ra alla uppgifter \u00f6ver internet p\u00e5 ett skickligt s\u00e4tt. Men detta har ocks\u00e5 en negativ inverkan p\u00e5 datas\u00e4kerheten. Under 2019 \u00f6kade andelen attacker med skadlig kod till 50%, vilket bevisats av experter. I slutet av 2020 kan cyberattackerna \u00f6ka till h\u00f6gre antal.<\/p>\n<p>Under de senaste \u00e5ren har mobila n\u00e4tverk fr\u00e4mst attackerats av <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> protokoll. Detta har en negativ inverkan inte bara p\u00e5 anv\u00e4ndarnas integritet utan \u00e4ven p\u00e5 tj\u00e4nsteleverant\u00f6rens. SS7 introducerades 1974 som en l\u00e4nk mellan olika mobila enheter. SS7 hj\u00e4lper till att \u00f6verf\u00f6ra SMS och samtal fr\u00e5n en mobil enhet till en annan. \u00c4ven om syftet med uppfinningen var annorlunda. Men nu utnyttjas den i cyberattacker.<\/p>\n<p>Oftare \u00e4r hackarnas m\u00e5lomr\u00e5de att kompromissa med hela n\u00e4tverket. De f\u00e5r tillg\u00e5ng till all information om tj\u00e4nsteleverant\u00f6rernas abonnenter. N\u00e4r de v\u00e4l har f\u00e5tt tillg\u00e5ng till tj\u00e4nsteleverant\u00f6rernas information kan de p\u00e5 ett s\u00e4kert s\u00e4tt f\u00e5 tillg\u00e5ng till alla abonnenters personuppgifter. P\u00e5 s\u00e5 s\u00e4tt f\u00e5r de kontroll \u00f6ver alla samtal och meddelanden. Dessutom kan de sp\u00e5ra var den \u00f6nskade personen befinner sig, \u00e4ven n\u00e4r hans GPS \u00e4r avst\u00e4ngd. Hela processen sker p\u00e5 ett s\u00e5 s\u00e4kert s\u00e4tt utan n\u00e5gra s\u00e4kerhetsvarningar till tj\u00e4nsteleverant\u00f6ren.<\/p>\n<p>SS7-protokollet underl\u00e4ttar hela v\u00e4rldens ineffektiva kommunikation. Mobilanv\u00e4ndare har tillg\u00e5ng till effektiv kommunikation \u00f6ver hela v\u00e4rlden. Inf\u00f6randet av detta protokoll har fler nackdelar. Det g\u00f6r att m\u00e4nniskors personliga information blir mer utsatt f\u00f6r cyberattacker.<\/p>\n<p>Protokollet sedan dess uppfinning fick ingen uppdaterad version. Detta \u00e4r anledningen till att det enkelt kan anv\u00e4ndas i hackingv\u00e4rlden. V\u00e4rldens st\u00f6rsta underr\u00e4ttelsetj\u00e4nster anv\u00e4nder ocks\u00e5 detta protokoll f\u00f6r att f\u00e5 den n\u00f6dv\u00e4ndiga informationen legitimt. Tyv\u00e4rr kan all den informationen ocks\u00e5 l\u00e4tt n\u00e5s av hackare.<\/p>\n<p>Det finns speciella signaleringsprotokoll f\u00f6r telefoni i SS7. Detta signaleringsprotokoll \u00e4r ansvarigt f\u00f6r att koppla telefonsamtalet fr\u00e5n en mobil till en annan. Protokollet fungerar utm\u00e4rkt b\u00e5de f\u00f6r tr\u00e5dl\u00f6sa och tr\u00e5dbundna publika telefoner.<\/p>\n<h2>Vem p\u00e5verkas av SS7-s\u00e5rbarheten?<\/h2>\n<p>Med tiden lades ytterligare n\u00e5gra applikationer till \u00f6ver SS7-protokollet. Det grundl\u00e4ggande syftet med detta var inf\u00f6randet av SMS-tj\u00e4nster. F\u00f6ljt av inf\u00f6randet av vidarekoppling, samtal v\u00e4ntar, konferenssamtal, etc. Inf\u00f6randet av alla dessa nya appar g\u00f6r att mobila enheter ofta uts\u00e4tts f\u00f6r hackning. SS7-attacker \u00e4r attacker med skadlig programvara \u00f6ver mobila enheter.<\/p>\n<p>Hackare f\u00e5r tillg\u00e5ng till personliga telefonsamtal och meddelanden fr\u00e5n m\u00e5lenheterna. Ofta sker attackerna mot mobiloperat\u00f6rer f\u00f6r att enkelt komma \u00e5t alla anv\u00e4ndare. Angrepp via utnyttjande av SS7 sker mot telefonkommunikation, inte \u00f6ver wifi-kommunikation.<\/p>\n<p>De autentiska funktionerna i SS7 anv\u00e4nds av hackare f\u00f6r att f\u00e5 information om all kommunikation. Hackare m\u00e5ste ladda ner SS7 SDK fr\u00e5n internet f\u00f6r att anv\u00e4nda SS7 i hacking. Sedan anv\u00e4nder de SS7 SDK p\u00e5 ett mycket tekniskt s\u00e4tt f\u00f6r att uppn\u00e5 framg\u00e5ngsrik hacking.<\/p>\n<p>Detta hj\u00e4lper hackaren att ansluta till SS7-n\u00e4tverket. Efter anslutningen g\u00e5r de till m\u00e5ln\u00e4tverket. M\u00e5lenheten kan inte uppt\u00e4cka detta. Eftersom enheten tar den som en MSC- eller VLR-nod.<br \/>\nDen viktigaste aktiviteten som en hackare utf\u00f6r f\u00f6r att ens f\u00e5 tillg\u00e5ng till de mest s\u00e4kra enheterna \u00e4r \"MitM phishing\"-attacken. Efter denna attack forts\u00e4tter han f\u00f6r att uppn\u00e5 \u00f6nskad information. Hacker f\u00e5r sedan skickligt alla SMS- och samtalsdetaljer, tillsammans med att sp\u00e5ra den exakta platsen f\u00f6r m\u00e5lpersonen.<\/p>\n<p>De flesta anv\u00e4nder 2FA som ett skydd mot attacker fr\u00e5n skadlig kod p\u00e5 SS7. Men denna skyddsmetod f\u00f6r mobila tj\u00e4nsteleverant\u00f6rer misslyckas. Som i dessa typer av scenarier \u00f6vervinner hackare det f\u00f6r att anv\u00e4nda koderna via avlyssning. De anv\u00e4nder koder f\u00f6r att f\u00e5 tillg\u00e5ng till ett stort antal konton, \u00e4ven bankens.<\/p>\n<p>Digitala f\u00f6retag uts\u00e4tts nu f\u00f6r h\u00f6gre risk. Hackare anv\u00e4nder personlig information fr\u00e5n alla digitala f\u00f6retag. De g\u00f6r allt detta p\u00e5 ett s\u00e4kert s\u00e4tt med \"MitM phishing\"-attacken. Digitala f\u00f6retag \u00e4r beroende av SS7 f\u00f6r att sk\u00f6ta sin kommunikation.<\/p>\n<p>Digitala f\u00f6retag skickar sina viktiga professionella filer, som alla l\u00e4tt kan n\u00e5s av hackare. Ett stort antal enheter i den digitala eran anv\u00e4nder mobila enheter f\u00f6r att \u00f6verf\u00f6ra viktig professionell data. Digitala f\u00f6retag riskerar att uts\u00e4ttas f\u00f6r h\u00f6gre cyberattacker. Men de \u00e4gnar ingen uppm\u00e4rksamhet \u00e5t att \u00f6vervinna dessa attacker. Denna fr\u00e5ga b\u00f6r tas p\u00e5 allvar av dessa f\u00f6retag.<\/p>","protected":false},"excerpt":{"rendered":"<p>Denna tids\u00e5lder anses vara mobilanv\u00e4ndningens tids\u00e5lder. Varenda m\u00e4nniska \u00e4r involverad i \u00f6verdriven anv\u00e4ndning av mobiltelefonen. Mobilanv\u00e4ndning har blivit ett beroende f\u00f6r varje person. Fr\u00e5n barn till yrkesverksamma, alla har dessa prylar i fickan. Cyberattacker \u00f6ver mobiler blev vanligare med ankomsten av 5G ...<\/p>","protected":false},"author":1,"featured_media":401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Are Exploiting SS7?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/hur-hackare-utnyttjar-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Exploiting SS7?\" \/>\n<meta property=\"og:description\" content=\"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/hur-hackare-utnyttjar-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T02:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Hackers Are Exploiting SS7?\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"name\":\"How Hackers Are Exploiting SS7?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Are Exploiting SS7?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hur utnyttjar hackare SS7?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sv\/ss7-sms\/hur-hackare-utnyttjar-ss7\/","og_locale":"sv_SE","og_type":"article","og_title":"How Hackers Are Exploiting SS7?","og_description":"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...","og_url":"https:\/\/sms-txt.net\/sv\/ss7-sms\/hur-hackare-utnyttjar-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-08T02:09:18+00:00","article_modified_time":"2024-09-05T09:45:43+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Hackers Are Exploiting SS7?","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"wordCount":879,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","articleSection":["SS7"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","name":"Hur utnyttjar hackare SS7?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","width":2000,"height":761,"caption":"ss7 attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Hackers Are Exploiting SS7?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7-hackning","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}