
{"id":592,"date":"2009-09-11T08:31:46","date_gmt":"2009-09-11T11:31:46","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=592"},"modified":"2009-09-11T08:31:46","modified_gmt":"2009-09-11T11:31:46","slug":"%c2%bfque-personaje-de-lost-eres","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/","title":{"rendered":"\u00bfQu\u00e9 personaje de Lost eres?"},"content":{"rendered":"<p>Bajo esta inocente pregunta se esconde un <span style=\"font-weight: bold;\">quiz <\/span>de Facebook que <span style=\"font-weight: bold;\">permite a los desarrolladores de estas aplicaciones acceder a la informaci\u00f3n de nuestro perfil<\/span>, est\u00e9 o no en modo privado.<\/p>\n<p>Tus fotos, grupos en los que est\u00e9s, tendencias pol\u00edticas, religi\u00f3n u orientaci\u00f3n sexual, estar\u00e1n a disposici\u00f3n de estos desarrolladores. Y no s\u00f3lo las tuyas sino <span style=\"font-weight: bold;\">tambi\u00e9n la informaci\u00f3n de tus amigos<\/span>.<\/p>\n<p>American Civil Liberties Union (ACLU) est\u00e1 realizando una campa\u00f1a para la que  han desarrollado un <a href=\"http:\/\/apps.facebook.com\/aclunc_privacy_quiz\/\">quiz<\/a> en donde puedes ver todo lo que se puede extraer de tu perfil. Al realizar el test vemos como extrae nuestra informaci\u00f3n personal: nuestras fotos, grupos, etc&#8230;<\/p>\n<div style=\"text-align: center;\"><a href=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s1600-h\/face1.JPG\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5379113937100386386\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 231px; height: 193px;\" src=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG\" border=\"0\" alt=\"\" \/><\/a><\/div>\n<p>Y adem\u00e1s la informaci\u00f3n de nuestros amigos que tenemos agregados.<\/p>\n<div style=\"text-align: center;\"><a href=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/SqZ1yVJ8b0I\/AAAAAAAAAPU\/pjxiYHNlm98\/s1600-h\/face2.JPG\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5379116312473399106\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 238px; height: 201px;\" src=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/SqZ1yVJ8b0I\/AAAAAAAAAPU\/pjxiYHNlm98\/s400\/face2.JPG\" border=\"0\" alt=\"\" \/><\/a><\/div>\n<p>Esto es verdaderamente alarmante, <span style=\"font-weight: bold;\">\u00bfqu\u00e9 ser\u00e1n capaces de hacer con toda esta informaci\u00f3n?<\/span>, nuestro tesoro oculto. &lt;Mode-albal-en-la-cabeza&gt; \u00bfVenderla para estudios estad\u00edsticos? \u00bfal gobierno? &lt;\/Mode-albal-en-la-cabeza&gt;<\/p>\n<p>La red social consciente de esto ha desactivado cientos de estas aplicaciones que no cumpl\u00edan con la pol\u00edtica de Facebook, pero esto no es suficiente. Las opciones de privacidad no hacen nada para prevenir que las aplicaciones de los desarrolladores accedan a tu informaci\u00f3n. Dicen que est\u00e1n trabajando en implementar nuevos controles de los datos del usuario. Esperemos que esto se haga efectivo pronto y de forma que protejan nuestro derecho de privacidad.<\/p>\n<p>Si accedemos a la Configuraci\u00f3n de Privacidad a partir de la pesta\u00f1a Opciones, leemos que nos informan de ello:<\/p>\n<ol style=\"text-align: justify;\">\n<li>A menos que t\u00fa o tus amigos hay\u00e1is dado vuestra autorizaci\u00f3n a una aplicaci\u00f3n al visitarla, Facebook s\u00f3lo le permitir\u00e1 acceder a la informaci\u00f3n disponible en las b\u00fasquedas p\u00fablicas (tu nombre, redes, foto de perfil y lista de amigos).<\/li>\n<li>Cuando des tu autorizaci\u00f3n a una aplicaci\u00f3n, \u00e9sta podr\u00e1 acceder a cualquier dato relacionado con tu cuenta que le sea preciso para funcionar.<\/li>\n<li>Cuando un amigo tuyo visita una aplicaci\u00f3n o la autoriza, la informaci\u00f3n a la que la aplicaci\u00f3n puede acceder incluye la lista de amigos de tu amigo e informaci\u00f3n acerca de las personas de esa lista.<\/li>\n<li>Si interact\u00faas con una aplicaci\u00f3n que ha sido restringida a usuarios de cierta edad y\/o pa\u00eds sin autorizarla expl\u00edcitamente, la aplicaci\u00f3n puede ser capaz de inferir tu fecha de nacimiento o ubicaci\u00f3n aproximada porque has podido acceder a ella.<\/li>\n<\/ol>\n<p>Y yo me pregunto: \u00bfpara qu\u00e9 necesitan acceder a mis fotos o grupos en los que estoy inscrita cuando realizo un test para saber a qu\u00e9 personaje de The Big Bang Theory me parezco? personalmente me suena an\u00e1logo a dar privilegios de root al comando &#8216;date&#8217; para ver la fecha en un sistema Unix.<\/p>\n<p>Desde FB indican que los usuarios pueden limitar la informaci\u00f3n de las aplicaciones, pero esto no es suficiente.<\/p>\n<div style=\"text-align: center;\"><a href=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqbIw6f1diI\/AAAAAAAAAPc\/qPnNX_tHgG8\/s1600-h\/f3.JPG\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5379207547602695714\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 236px;\" src=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqbIw6f1diI\/AAAAAAAAAPc\/qPnNX_tHgG8\/s400\/f3.JPG\" border=\"0\" alt=\"\" \/><\/a><\/div>\n<p>F<br \/>\nACLs granulares en FB ya!<\/p>\n<p>Como <a href=\"http:\/\/alt1040.com\/2009\/09\/quieres-ser-presidente-cuidado-con-las-redes-sociales\">dice<\/a> Obama: &#8220;Tengan cuidado con lo que suban a Internet, porque  permanecer\u00e1 all\u00ed el resto de sus vidas&#8221;.<\/p>\n<p>Esta info nos lleg\u00f3 v\u00eda <a href=\"http:\/\/www.error500.net\/\">Antonio Ortiz<\/a>.<\/p>\n<p>Fuente: SecurityByDefault<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bajo esta inocente pregunta se esconde un quiz de Facebook que permite a los desarrolladores de estas aplicaciones acceder a la informaci\u00f3n de nuestro perfil, est\u00e9 o no en modo privado. Tus fotos, grupos en los que est\u00e9s, tendencias pol\u00edticas, religi\u00f3n u orientaci\u00f3n sexual, estar\u00e1n a disposici\u00f3n de estos desarrolladores. Y no s\u00f3lo las tuyas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-592","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 personaje de Lost eres?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfque-personaje-de-lost-eres\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfQu\u00e9 personaje de Lost eres?\",\"datePublished\":\"2009-09-11T11:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 personaje de Lost eres?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG\",\"datePublished\":\"2009-09-11T11:31:46+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage\",\"url\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG\",\"contentUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 personaje de Lost eres?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfque-personaje-de-lost-eres\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfQu\u00e9 personaje de Lost eres?","datePublished":"2009-09-11T11:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 personaje de Lost eres?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG","datePublished":"2009-09-11T11:31:46+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-personaje-de-lost-eres\/#primaryimage","url":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG","contentUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SqZzoEM4sFI\/AAAAAAAAAPM\/u1j1BhBSORE\/s400\/face1.JPG"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/592\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/592\/revisions\/593"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}