{"id":479,"date":"2020-08-01T08:13:43","date_gmt":"2020-08-01T08:13:43","guid":{"rendered":"https:\/\/sms-txt.net\/?p=479"},"modified":"2021-03-19T19:28:10","modified_gmt":"2021-03-19T16:28:10","slug":"konum-i%cc%87zleme-ss7-saldirisi-sirasinda-konumlandirma-geli%cc%87sti%cc%87rme","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/tr\/sms-durdurma\/konum-i%cc%87zleme-ss7-saldirisi-sirasinda-konumlandirma-geli%cc%87sti%cc%87rme\/","title":{"rendered":"Konum Takibi S\u0131ras\u0131nda Konumland\u0131rma \u0130yile\u015ftirme -SS7 sald\u0131r\u0131s\u0131"},"content":{"rendered":"<h1>Konum Takibi S\u0131ras\u0131nda SS7 Konumland\u0131rma \u0130yile\u015ftirmesi<\/h1>\n<p>Muhtemelen SS7 a\u011flar\u0131na y\u00f6nelik sald\u0131r\u0131lardan biri konum g\u00f6zlemi olacakt\u0131r. Bir dilek\u00e7e abonesinin konumu \u015fu yollarla y\u00f6nlendirilir <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-day\/\"><strong>SS7<\/strong> <\/a>a\u011flar\u0131 ve ayr\u0131ca cevap baz istasyonunun bireyselli\u011fini i\u00e7erir. Her bir baz istasyonunun \u00f6zel koordinatlar\u0131 vard\u0131r ve bir alana hitap eder. Yo\u011funlu\u011fun bir sonucu olarak, bir metropoldeki politika alan\u0131 binlerce bin aras\u0131nda de\u011fi\u015fmektedir.<\/p>\n<p>&nbsp;<\/p>\n<p>Bir sald\u0131rgan, Stealthy SS7 Attacks 4-5 bir dizi Web arac\u0131n\u0131 kullanarak baz istasyonunu kendi bireyselli\u011fi ile takip etmenin yan\u0131 s\u0131ra konum emirleri olu\u015fturmak i\u00e7in mobil a\u011f \u00f6zelliklerinden yararlanabilir. Bu konum ke\u015ffinin ger\u00e7ekli\u011fi baz istasyonu politika alan\u0131na dayanmaktad\u0131r. K\u00f6t\u00fc niyetli ki\u015fi, \u015fu anda aboneye hizmet veren baz istasyonunun yerini belirler.<\/p>\n<p>Analizlerimiz, pirelerin abone konumunu hassas bir \u015fekilde tespit etmeyi ke\u015ffettiklerini ortaya koymaktad\u0131r. Bir mobil cihaz baz istasyonlar\u0131nda i\u015faret al\u0131r. K\u00f6t\u00fc niyetli ki\u015finin bu aboneye en yak\u0131n 3 veya hatta 2 baz istasyonunun koordinatlar\u0131n\u0131 belirlemesi durumunda, abone konumu daralt\u0131labilir.<\/p>\n<p>&nbsp;<\/p>\n<p>Normalde, bir mobil cihaz bir i\u015flem boyunca t\u00fcm radyo durumlar\u0131na sahip bir baz istasyonu se\u00e7er. Bu nedenle, mobil cihaz bu a\u011f ile i\u015faret girmelidir. K\u00f6t\u00fc niyetli ki\u015fi bile, t\u00fcm hedef aboneleri kullanarak birlikte gizli bir i\u015flem ba\u015flatmak i\u00e7in bir SMS ile \u00e7al\u0131\u015fabilir. Bu mesajlarla ilgili bilgiler abonenin de\u011ferlendirmesinden sunulabilir.<\/p>\n<p>&nbsp;<\/p>\n<p>Bir i\u015flemi \u00f6rtbas etmenin daha da iyi bir yolu, her zaman gizli USSD bildirimlerini kullanmakt\u0131r. Bu t\u00fcr bir i\u015flem \u015farj prosed\u00fcr\u00fcnden kaydedilmemi\u015f olsa da, mobil cihaz\u0131n\u0131z ve a\u011f\u0131n\u0131z aras\u0131nda i\u015faret al\u0131\u015fveri\u015fine ba\u015flarlar. K\u00f6t\u00fc niyetli ki\u015filer bile baz istasyonu tan\u0131mlamalar\u0131n\u0131 ve USSD bildirimlerini manip\u00fcle ederek konum hassasiyetini art\u0131rabilir.<\/p>\n<p>&nbsp;<\/p>\n<p>Davetsiz misafir, baz istasyonlar\u0131n\u0131n tan\u0131mlay\u0131c\u0131s\u0131n\u0131 sorar. Davetsiz misafiriniz, abonenin cihazlar\u0131n\u0131 kablosuz bir ba\u011flant\u0131 noktas\u0131 \u00fczerinden bir i\u015flem ger\u00e7ekle\u015ftirmeye te\u015fvik etmek i\u00e7in sessiz bir anlat\u0131m iletir. K\u00f6t\u00fc niyetli ki\u015finin Konumland\u0131rma art\u0131r\u0131m\u0131 almas\u0131 durumunda.<\/p>\n<p>&nbsp;<\/p>\n<p>A\u011f, belirli bir i\u015flemi almak i\u00e7in yeni bir baz istasyonu se\u00e7ebilir ve ayr\u0131ca VLR (Ziyaret\u00e7i Konum Kayd\u0131) veritaban\u0131 abone konumunu y\u00fckseltir. \u0130zinsiz giren ki\u015fi tam olarak abone konumunu bir kez daha sorar ve bu baz istasyonunun tan\u0131mlay\u0131c\u0131s\u0131n\u0131 al\u0131r. Bu nedenle, davetsiz misafir, abonenin \u015fu anda bulunabilece\u011fi alan\u0131 zay\u0131flatabilir.<\/p>\n<p>&nbsp;<\/p>\n<h2>Sonu\u00e7:<\/h2>\n<p>\"Duvarlarla \u00e7evrili bah\u00e7e\" tasar\u0131m\u0131n\u0131n bile modas\u0131 ge\u00e7mi\u015ftir. SS7 sinyalle\u015fme s\u00fcreci bile telefon \u015febekesinin s\u00fcreci olarak bilinir. SS7'nin olu\u015fturulmas\u0131ndan \u00f6nce, abone ili\u015fkileri i\u00e7in hizmet sipari\u015fleri ve bilgi paketi nakliyesi bir istasyonla ta\u015f\u0131nd\u0131. Bu y\u00f6ntem g\u00fcncellendi ve 30 y\u0131l \u00f6nce d\u00fcnya \u00e7ap\u0131ndaki t\u00fcm sinyalizasyon programlar\u0131 (SS7) ile de\u011fi\u015ftirildi. SS7 k\u0131yaslamas\u0131, telekom\u00fcnikasyon i\u015fletmelerinin a\u011f cihazlar\u0131 etraf\u0131nda veri ve prosed\u00fcr de\u011fi\u015fim protokollerini olu\u015fturur. SS7, yerel, ulusal a\u011flarda bir sinyal altyap\u0131s\u0131 elde etmek i\u00e7in bir temel g\u00f6revi g\u00f6r\u00fcr.<\/p>\n<p>&nbsp;<\/p>\n<p>SS7 a\u011f\u0131n\u0131n bir platform oldu\u011fu kan\u0131tland\u0131\u011f\u0131ndan beri bile aboneler veya operat\u00f6rler i\u00e7in herhangi bir tehdit olu\u015fturmad\u0131. A\u011f, mobil ba\u011flant\u0131 ve hizmet deste\u011fi normlar\u0131na uyacak \u015fekilde ilerledi, ayr\u0131ca 21. y\u00fczy\u0131lda, SIGTRAN olarak bilinen baz\u0131 sinyal ta\u015f\u0131ma protokolleri de ilk kez kuruldu. SIGTRAN, mesajlar\u0131 ta\u015f\u0131mak i\u00e7in IP a\u011flar\u0131n\u0131n kullan\u0131lmas\u0131n\u0131 sa\u011flayan SS7 i\u00e7in bir geni\u015fleme olabilir, ayr\u0131ca bu bulu\u015f sinyalizasyon a\u011f\u0131n\u0131n da\u011f\u0131lmas\u0131n\u0131 durdurdu.<\/p>","protected":false},"excerpt":{"rendered":"<p>Konum Takibi S\u0131ras\u0131nda SS7 Konumland\u0131rma \u0130yile\u015ftirmesi Muhtemelen SS7 a\u011flar\u0131na yap\u0131lan sald\u0131r\u0131lardan biri konum g\u00f6zlemi olacakt\u0131r. Bir dilek\u00e7e abonesinin konumu SS7 a\u011flar\u0131 arac\u0131l\u0131\u011f\u0131yla y\u00f6nlendirilir ve ayr\u0131ca cevap baz istasyonunun bireyselli\u011fini i\u00e7erir. Her bir baz istasyonunun \u00f6zel koordinatlar\u0131 vard\u0131r ve bir alana hitap eder. Yo\u011funlu\u011fun bir sonucu olarak...<\/p>","protected":false},"author":1,"featured_media":1728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Location Tracking - How to track location using SS7<\/title>\n<meta name=\"description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/tr\/sms-durdurma\/konum-i\u0307zleme-ss7-saldirisi-sirasinda-konumlandirma-geli\u0307sti\u0307rme\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Positioning Enhancement During Location Tracking -SS7 attack\" \/>\n<meta property=\"og:description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/tr\/sms-durdurma\/konum-i\u0307zleme-ss7-saldirisi-sirasinda-konumlandirma-geli\u0307sti\u0307rme\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-01T08:13:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T16:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Positioning Enhancement During Location Tracking -SS7 attack\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"tr-TR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"name\":\"SS7 Location Tracking - How to track location using SS7\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"description\":\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"tr-TR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr-TR\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Positioning Enhancement During Location Tracking -SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr-TR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr-TR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 Konum Takibi - SS7 kullanarak konum takibi nas\u0131l yap\u0131l\u0131r","description":"Muhtemelen SS7 a\u011flar\u0131na yap\u0131lan sald\u0131r\u0131lardan biri konum g\u00f6zlemi olacakt\u0131r. SS7 yaz\u0131l\u0131m\u0131m\u0131z\u0131 kullanarak konum takibi yapabilirsiniz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/tr\/sms-durdurma\/konum-i\u0307zleme-ss7-saldirisi-sirasinda-konumlandirma-geli\u0307sti\u0307rme\/","og_locale":"tr_TR","og_type":"article","og_title":"Positioning Enhancement During Location Tracking -SS7 attack","og_description":"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.","og_url":"https:\/\/sms-txt.net\/tr\/sms-durdurma\/konum-i\u0307zleme-ss7-saldirisi-sirasinda-konumlandirma-geli\u0307sti\u0307rme\/","og_site_name":"SS7 Hacking","article_published_time":"2020-08-01T08:13:43+00:00","article_modified_time":"2021-03-19T16:28:10+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Positioning Enhancement During Location Tracking -SS7 attack","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"wordCount":569,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"tr-TR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","url":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","name":"SS7 Konum Takibi - SS7 kullanarak konum takibi nas\u0131l yap\u0131l\u0131r","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","description":"Muhtemelen SS7 a\u011flar\u0131na yap\u0131lan sald\u0131r\u0131lardan biri konum g\u00f6zlemi olacakt\u0131r. SS7 yaz\u0131l\u0131m\u0131m\u0131z\u0131 kullanarak konum takibi yapabilirsiniz.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb"},"inLanguage":"tr-TR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"tr-TR","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Positioning Enhancement During Location Tracking -SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 Hackleme","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr-TR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"tr-TR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/posts\/479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/media\/1728"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/categories?post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/tr\/wp-json\/wp\/v2\/tags?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}