
{"id":692,"date":"2021-01-07T18:26:19","date_gmt":"2021-01-07T17:26:19","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=692"},"modified":"2021-01-07T18:26:19","modified_gmt":"2021-01-07T17:26:19","slug":"les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/","title":{"rendered":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1cuvNe.img?h=493&amp;w=874&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Certains malwares utilisent d\u00e9sormais le BSSID du point d\u2019acc\u00e8s pour g\u00e9olocaliser leurs victimes. Ils s\u2019appuient pour cela sur des bases gratuites et accessibles \u00e0 tous.<\/strong><\/p>\n\n\n\n<p>Le chercheur en s\u00e9curit\u00e9 Xavier Mertens a d\u00e9tect\u00e9 une nouvelle m\u00e9thode utilis\u00e9e par les pirates pour g\u00e9olocaliser leurs victimes et, le cas \u00e9ch\u00e9ant, d\u00e9cider de leur sort. Habituellement, ils s\u2019appuient sur l\u2019adresse IP. Mais avec la\u00a0p\u00e9nurie d\u2019adresses\u00a0IPv4, il est de plus en plus difficile de g\u00e9olocaliser cet identifiant avec certitude, car ces adresses sont de plus en plus \u00e9chang\u00e9es d\u2019un op\u00e9rateur \u00e0 un autre et d\u2019un pays \u00e0 un autre.<\/p>\n\n\n\n<p>Dans l\u2019un des derniers codes malveillants analys\u00e9s, Xavier Mertens a vu que l\u2019auteur int\u00e9grait une seconde m\u00e9thode&nbsp;: la g\u00e9olocalisation par le BSSID (Basic Service Set Identifier). Cette s\u00e9quence de 48&nbsp;bits n\u2019est rien d\u2019autre que l\u2019adresse MAC du point d\u2019acc\u00e8s. Les 24&nbsp;premiers bits d\u00e9signent g\u00e9n\u00e9ralement le fournisseur. Les 24&nbsp;bits restants sont choisis de telle mani\u00e8re \u00e0 obtenir un identifiant unique de l\u2019appareil.<\/p>\n\n\n\n<p>Dans le code malveillant, la g\u00e9olocalisation s\u2019appuie sur la base de donn\u00e9es mynikov.org, qui est gratuite et accessible \u00e0 tous. Elle r\u00e9f\u00e9rence \u00e0 se jour plus de 34&nbsp;millions de BSSID avec leurs donn\u00e9es de localisation et elle s\u2019est visiblement construite gr\u00e2ce \u00e0 ses utilisateurs.&nbsp;<em>\u00ab&nbsp;Si vous avez une bonne source de donn\u00e9es Wi-Fi, partagez-la avec moi par e-mail alex@mynikov.org&nbsp;\u00bb<\/em>, peut-on lire sur le site.<\/p>\n\n\n\n<p>Ces bases de donn\u00e9es ne sont pas nouvelles et sont notamment utilis\u00e9es par les applis mobiles pour localiser les utilisateurs. Un autre exemple est Wigle.net qui peut localiser plus de 700&nbsp;millions de r\u00e9seaux Wi-Fi dans le monde. Pour obtenir ces donn\u00e9es, c\u2019est facile&nbsp;: il suffit de se placer quelque part et de scanner les r\u00e9seaux Wi-Fi existants aux alentours. On obtient automatiquement leurs BSSID.<\/p>\n\n\n\n<p><strong>Source<\/strong>:\u00a0Xavier Mertens (via ZDnet)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certains malwares utilisent d\u00e9sormais le BSSID du point d\u2019acc\u00e8s pour g\u00e9olocaliser leurs victimes. Ils s\u2019appuient pour cela sur des bases gratuites et accessibles \u00e0 tous. Le chercheur en s\u00e9curit\u00e9 Xavier [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Certains malwares utilisent d\u00e9sormais le BSSID du point d\u2019acc\u00e8s pour g\u00e9olocaliser leurs victimes. Ils s\u2019appuient pour cela sur des bases gratuites et accessibles \u00e0 tous. Le chercheur en s\u00e9curit\u00e9 Xavier [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-07T17:26:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser\",\"datePublished\":\"2021-01-07T17:26:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/\"},\"wordCount\":364,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-34.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/\",\"name\":\"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-34.jpg\",\"datePublished\":\"2021-01-07T17:26:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-34.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-34.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/07\\\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/","og_locale":"fr_FR","og_type":"article","og_title":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store","og_description":"Certains malwares utilisent d\u00e9sormais le BSSID du point d\u2019acc\u00e8s pour g\u00e9olocaliser leurs victimes. Ils s\u2019appuient pour cela sur des bases gratuites et accessibles \u00e0 tous. Le chercheur en s\u00e9curit\u00e9 Xavier [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-01-07T17:26:19+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser","datePublished":"2021-01-07T17:26:19+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/"},"wordCount":364,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/","url":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/","name":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg","datePublished":"2021-01-07T17:26:19+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-34.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/07\/les-pirates-utilisent-ladresse-mac-de-votre-routeur-wi-fi-pour-vous-localiser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Les pirates utilisent l\u2019adresse MAC de votre routeur Wi-Fi pour vous localiser"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/692\/revisions"}],"predecessor-version":[{"id":694,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/692\/revisions\/694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/693"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}