{"id":473,"date":"2020-07-31T08:09:32","date_gmt":"2020-07-31T08:09:32","guid":{"rendered":"https:\/\/sms-txt.net\/?p=473"},"modified":"2021-03-19T20:13:24","modified_gmt":"2021-03-19T17:13:24","slug":"huvudsaklig-typ-av-ss7-attacker","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sv\/ss7-sms\/huvudsaklig-typ-av-ss7-attacker\/","title":{"rendered":"Huvudsaklig typ av SS7-attacker"},"content":{"rendered":"<h1>Huvudsakligen SS7-attacker 3 typer:<\/h1>\n<ol>\n<li>Bypass f\u00f6r SMS hemadressering<\/li>\n<li>F\u00f6rb\u00e4ttrad positionering under platssp\u00e5rning<\/li>\n<li>Osynlig avlyssning av korta meddelanden<\/li>\n<\/ol>\n<h2>SMS Hush\u00e5llsruttering By-pass<\/h2>\n<p>En malefactor kan l\u00e4tt hoppa \u00f6ver de flesta skyddsprocedurer om de har installerat misstag som inte \u00e4r tydliga vid f\u00f6rsta anblicken. Vissa specialister k\u00e4nner att om de har utf\u00f6rt SMS Household Routing Alternative och konfigurerat med hj\u00e4lp av centerutrustning f\u00f6r att automatiskt hindra kategori Inch-meddelanden, skulle det inte vara m\u00f6jligt f\u00f6r inkr\u00e4ktaren att f\u00f6rv\u00e4rva IMSI (International Mobile Subscriber Id) och utf\u00f6ra farliga strejker fr\u00e5n din <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-sms-intercept-call-location-tracking\/\">SS7<\/a> n\u00e4tverk. SMS Household Routing \u00e4r verkligen en mjukvaru- och h\u00e5rdvarul\u00f6sning som bekr\u00e4ftar Proxy-handlingar av privata abonnentidentifierare och v\u00e4xladresser<\/p>\n<p>N\u00e4r du skaffar texter fr\u00e5n externa relationer. Kategori Inch omfattar SS7-meddelanden, som i allm\u00e4nhet bara borde erh\u00e5llas inifr\u00e5n exakt samma n\u00e4tverk snarare \u00e4n p\u00e5 InterConnect Hyperlinks fr\u00e5n n\u00e5gra andra n\u00e4tverk, f\u00f6rutom att det finns ett specifikt arrangemang f\u00f6r att uppn\u00e5 det. IMSI anses vara konfidentiell information eftersom den anv\u00e4nds f\u00f6r att hantera abonnenter vid de flesta av de flesta operationer. En angripare kan k\u00f6ra mer komplexa attacker som anv\u00e4nder sig av en \u00e5tervunnen IMSI.<\/p>\n<h2>F\u00f6rb\u00e4ttrad positionering under platssp\u00e5rning<\/h2>\n<p>Bland de absolut mest v\u00e4lk\u00e4nda angreppen p\u00e5 SS7-n\u00e4tverk \u00e4r plats\u00f6vervakning. \u00c4ven en f\u00f6rfr\u00e5gan om abonnentens plats dirigeras genom SS7-n\u00e4tverk och svaret inkluderar \u00e4ven basstationens individualitet. Varje basstation har speciella koordinater och hanterar en mycket viss plats. Som ett resultat varierar policyplatsen vid en, av densitet Metropolis fr\u00e5n tusentals tusentals till tiotusentals meter. En person kan anv\u00e4nda dessa mobiln\u00e4tets s\u00e4rdrag f\u00f6r att skapa platsen fr\u00e5gar, och f\u00f6r att hitta basstationen genom sin egen individualitet som anv\u00e4nder<\/p>\n<p>Smygande SS7-attack Ett urval av allm\u00e4nt tillg\u00e4ngliga onlineverktyg. Sanningen om denna platsdetektering \u00e4r baserad p\u00e5 basstationens policyplats. I sj\u00e4lva verket best\u00e4mmer den onda faktorn platsen f\u00f6r basstationen som fungerar abonnenten i minuten. V\u00e5ra tester visar att inkr\u00e4ktare har uppt\u00e4ckt att r\u00e4kna ut att abonnentens plats med \u00f6kad precision. En mobil apparat f\u00e5r vanligtvis tecken i flera basstationer.<\/p>\n<p>Om Malefactor best\u00e4mmer koordinaterna f\u00f6r tre eller tv\u00e5 basstationer n\u00e4rmast abonnenten, kan abonnentens plats begr\u00e4nsas. Vanligtvis v\u00e4ljer en mobil apparat en basstation med alla de optimala\/optimala radiotillst\u00e5nden under en handel. D\u00e4rf\u00f6r m\u00e5ste den mobila apparaten byta indikatorer tillsammans med hj\u00e4lp av detta n\u00e4tverk. \u00c4ven den onda faktorn kan anv\u00e4nda ett SMS f\u00f6r att p\u00e5b\u00f6rja en dold handel med alla m\u00e4rkesabonnenter. Informationen om dessa meddelanden kan erbjudas fr\u00e5n abonnentens \u00f6verv\u00e4gande. En mycket mer effektiv metod f\u00f6r att d\u00f6lja handel \u00e4r att anv\u00e4nda tysta USSD-meddelanden. \u00c4ven om<\/p>\n<p>Dessa aff\u00e4rer \u00e4r inte registrerade fr\u00e5n laddningsf\u00f6rfarandet utan de b\u00f6rjar teckna Trade-in mellan ditt mobilsystem och n\u00e4tverk. \u00c4ven den onda faktorn kan f\u00f6rb\u00e4ttra platsprecisionen genom att manipulera basstationsidentifieringar och tysta USSD-meddelanden. Inkr\u00e4ktaren ber att identifieraren f\u00f6r denna nuvarande basstation ). D\u00e4refter s\u00e4nder din inkr\u00e4ktare ett tyst USSD-meddelande f\u00f6r att f\u00f6rm\u00e5 abonnentens utrustning att utf\u00f6ra en handel via radioport. I h\u00e4ndelse av att den onda faktorn har<\/p>\n<p>Placering av f\u00f6rst\u00e4rkning. V\u00e4lsignad, att n\u00e4tverket kan v\u00e4lja en helt ny basstation f\u00f6r att f\u00e5 denna speciella handel, tillsammans med att VLR-databasen (Visitor Location Register) uppgraderar abonnentens plats.<\/p>\n<p>Sedan fr\u00e5gar inkr\u00e4ktaren exakt abonnentens plats igen och f\u00e5r identifieraren f\u00f6r denna nyaste basstation. S\u00e5, inkr\u00e4ktaren kan begr\u00e4nsa den plats d\u00e4r abonnenten kan hittas i<\/p>\n<p>Minut.<\/p>\n<p>&nbsp;<\/p>\n<h2>Osynlig avlyssning av korta meddelanden<\/h2>\n<p>Begr\u00e4nsad konceptavlyssning \u00e4r bara en av de absolut farligaste strejkerna p\u00e5 SS7-n\u00e4tverk. Massor av tj\u00e4nster anv\u00e4nder SMS som att vara en station. Som exempel anv\u00e4nder bankinstitut SMS f\u00f6r att f\u00e5 OTP (One Time Password) leverans och samh\u00e4llsn\u00e4tverk f\u00f6r l\u00f6senordsh\u00e4mtning, budb\u00e4rare f\u00f6r att f\u00e5 tillg\u00e5ng till denna ans\u00f6kan. Som ett s\u00e4tt att framkalla ett inkommande SMS b\u00f6r inkr\u00e4ktaren registrera en abonnent i ett \"falskt\" n\u00e4tverk med hj\u00e4lp av de viktigaste enheterna.<\/p>\n<p>\u00d6verfallet simulerar en abonnent som \u00e4r p\u00e5 drift i ett socialt n\u00e4tverk. HLR har en lista \u00f6ver abonnentens helt nya plats d\u00e4r termineringssamtal och SMS-meddelanden har skickats. I h\u00e4ndelse av en prognos misslyckas f\u00f6rs\u00f6ket<\/p>\n<p>Att n\u00e4tverket registrerar att abonnenten direkt tillbaka till sitt eget hemn\u00e4tverk. G\u00e4rningsmannen ser att den kan replikera strejken f\u00f6r att tj\u00e4na den andra samtalsanstr\u00e4ngningen f\u00f6rsummelse. Dessutom, i h\u00e4ndelse av att angriparna befaller n\u00e4tverkskomponenten, som kan signaleras vara en helt ny MSC, kan de f\u00e5nga upp SMS-meddelanden och avleda Avsluta r\u00f6stsamtal.<\/p>","protected":false},"excerpt":{"rendered":"<p>Huvudsakligen SS7-attacker 3 typer: SMS Home Routing Bypass Positioning Enhancement During Location Tracking Invisible Interception of Short Messages SMS Household Routing By-pass En malefactor kan l\u00e4tt hoppa \u00f6ver de flesta skyddsprocedurer om de har installerat misstag som inte \u00e4r tydliga vid f\u00f6rsta anblicken. Vissa specialister k\u00e4nner att om de har utf\u00f6rt SMS Household Routing Alternative och konfigurerat ...<\/p>","protected":false},"author":1,"featured_media":1729,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Main type of SS7 Attacks<\/title>\n<meta name=\"description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/huvudsaklig-typ-av-ss7-attacker\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Main type of SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/huvudsaklig-typ-av-ss7-attacker\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T08:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T17:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Main type of SS7 Attacks\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\",\"name\":\"Main type of SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"datePublished\":\"2020-07-31T08:09:32+00:00\",\"dateModified\":\"2021-03-19T17:13:24+00:00\",\"description\":\"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Main type of SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Huvudsaklig typ av SS7-attacker","description":"S\u00e5 h\u00e4r anv\u00e4nder du SS7-attacker med v\u00e5r avlyssningsprogramvara f\u00f6r samtal, plats och sms. L\u00e4r dig mer om olika typer av SS7-attacker.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sv\/ss7-sms\/huvudsaklig-typ-av-ss7-attacker\/","og_locale":"sv_SE","og_type":"article","og_title":"Main type of SS7 Attacks","og_description":"How to use SS7 attacks using our intercept software for calls, location and sms. Learn about different types of SS7 attacls.","og_url":"https:\/\/sms-txt.net\/sv\/ss7-sms\/huvudsaklig-typ-av-ss7-attacker\/","og_site_name":"SS7 Hacking","article_published_time":"2020-07-31T08:09:32+00:00","article_modified_time":"2021-03-19T17:13:24+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Main type of SS7 Attacks","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"},"wordCount":778,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","url":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/","name":"Huvudsaklig typ av SS7-attacker","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","datePublished":"2020-07-31T08:09:32+00:00","dateModified":"2021-03-19T17:13:24+00:00","description":"S\u00e5 h\u00e4r anv\u00e4nder du SS7-attacker med v\u00e5r avlyssningsprogramvara f\u00f6r samtal, plats och sms. L\u00e4r dig mer om olika typer av SS7-attacker.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Main-type-of-SS7-Attacks.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/main-type-of-ss7-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Main type of SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7-hackning","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/media\/1729"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}