{"id":1902,"date":"2006-03-16T16:49:11","date_gmt":"2006-03-16T14:49:11","guid":{"rendered":"https:\/\/www.fullo.net\/blog\/?p=1902"},"modified":"2006-03-15T16:57:09","modified_gmt":"2006-03-15T14:57:09","slug":"privacy-security-and-recovery","status":"publish","type":"post","link":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/","title":{"rendered":"Privacy, Security and Recovery"},"content":{"rendered":"<p>Nuovo progettino di <a href=\"http:\/\/www.philzimmermann.com\">Zimmerman<\/a> (qualcuno lo conoscer\u00e0 per quell&#8217;utilit\u00e0 di poco conto chiamata PGP). L&#8217;oggettino in questione di chiama <a href=\"http:\/\/www.philzimmermann.com\/EN\/zfone\/index.html\">Zfone<\/a> e non \u00e8 altro che un protocollo per rendere le telefonate VoIp fatte su protocollo SIP sicure e private.<\/p>\n<p>Per ora stato realizzato un software ad hoc per sfruttare l&#8217;idea (attualmente disponibile per Linux ed Os X), ma \u00e8 gi\u00e0 stata richiesta la standardizzazione del protocollo e rilasciato un toolkit per permetterne l&#8217;integrazione nei vari client SIP attualmente disponibili sul mercato.<\/p>\n<p><!--more--><\/p>\n<p>L&#8217;idea \u00e8 quella di sfruttare direttamente la rete p2p senza quindi passare da server contenenti chiavi PKI, per amor di precisione (non essendo per nulla un esperto dell&#8217;argomento) cito direttamente un estratto dal sito:<\/p>\n<blockquote><p>ZRTP protocol has some nice cryptographic features lacking in many other approaches to VoIP encryption. Although it uses a public key algorithm, it does not rely on a public key infrastructure (PKI). In fact, it does not use persistant public keys at all. It uses ephemeral Diffie-Hellman with hash commitment, and allows the detection of man-in-the-middle (MiTM) attacks by displaying a short authentication string for the users to read and compare over the phone. It has perfect forward secrecy, meaning the keys are destroyed at the end of the call, which precludes retroactively compromising the call by future disclosures of key material. But even if the users are too lazy to bother with short authentication strings, we still get fairly decent authentication against a MiTM attack, based on a form of key continuity&#8230;.<\/p><\/blockquote>\n<p>Altro progettino interessante \u00e8 <a href=\"http:\/\/www.truecrypt.org\/\">TrueCrypt<\/a> che crea delle partizioni criptate (o anche solo filesystem virtuali) da utilizzare poi sia in Windows che in Linux. Di questo progetto ne avevo parlato all&#8217;epoca su <a href=\"http:\/\/downloadblog.it\/cerca\/truecrypt\">DownloadBlog<\/a> ma con le ultime versioni sono stati fatti dei buoni passi avanti e rinfrescare la memoria non \u00e8 certo un male.<\/p>\n<p>Ultimo link del giorno \u00e8 una lista delle 10 migliori <a href=\"http:\/\/www.darknet.org.uk\/2006\/03\/10-best-security-live-cd-distros-pen-test-forensics-recovery\/\">distribuzioni su LiveCD per l&#8217;analisi ed il recupero dei dati<\/a>. Nulla di pi\u00f9 da dire di quello scritto nel post.<\/p>\n<p>ciuaz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nuovo progettino di Zimmerman (qualcuno lo conoscer\u00e0 per quell&#8217;utilit\u00e0 di poco conto chiamata PGP). L&#8217;oggettino in questione di chiama Zfone e non \u00e8 altro che un protocollo per rendere le telefonate VoIp fatte su protocollo SIP sicure e private. Per ora stato realizzato un software ad hoc per sfruttare l&#8217;idea (attualmente disponibile per Linux ed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[15,5],"tags":[1099,1100,179,1101,217],"class_list":["post-1902","post","type-post","status-publish","format-standard","hentry","category-amministrazione-di-sistema","category-tecnologia","tag-crypt","tag-pgp","tag-privacy","tag-recovery","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy, Security and Recovery  - Fullo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy, Security and Recovery  - Fullo\" \/>\n<meta property=\"og:description\" content=\"Nuovo progettino di Zimmerman (qualcuno lo conoscer\u00e0 per quell&#8217;utilit\u00e0 di poco conto chiamata PGP). L&#8217;oggettino in questione di chiama Zfone e non \u00e8 altro che un protocollo per rendere le telefonate VoIp fatte su protocollo SIP sicure e private. Per ora stato realizzato un software ad hoc per sfruttare l&#8217;idea (attualmente disponibile per Linux ed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/\" \/>\n<meta property=\"og:site_name\" content=\"Fullo\" \/>\n<meta property=\"article:published_time\" content=\"2006-03-16T14:49:11+00:00\" \/>\n<meta name=\"author\" content=\"Francesco Fullone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fullo\" \/>\n<meta name=\"twitter:site\" content=\"@fullo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesco Fullone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/\"},\"author\":{\"name\":\"Francesco Fullone\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"headline\":\"Privacy, Security and Recovery\",\"datePublished\":\"2006-03-16T14:49:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/\"},\"wordCount\":339,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"keywords\":[\"crypt\",\"pgp\",\"privacy\",\"recovery\",\"security\"],\"articleSection\":[\"sysadmin\",\"tecnologia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/\",\"name\":\"Privacy, Security and Recovery - Fullo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\"},\"datePublished\":\"2006-03-16T14:49:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2006\\\/03\\\/16\\\/privacy-security-and-recovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy, Security and Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\",\"name\":\"Fullo\",\"description\":\"nulla e&#039; impossibile per chi non lo deve fare!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\",\"name\":\"Francesco Fullone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"width\":622,\"height\":622,\"caption\":\"Francesco Fullone\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.fullo.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fullo\",\"https:\\\/\\\/x.com\\\/fullo\"],\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/author\\\/fullo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy, Security and Recovery  - Fullo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/","og_locale":"en_US","og_type":"article","og_title":"Privacy, Security and Recovery  - Fullo","og_description":"Nuovo progettino di Zimmerman (qualcuno lo conoscer\u00e0 per quell&#8217;utilit\u00e0 di poco conto chiamata PGP). L&#8217;oggettino in questione di chiama Zfone e non \u00e8 altro che un protocollo per rendere le telefonate VoIp fatte su protocollo SIP sicure e private. Per ora stato realizzato un software ad hoc per sfruttare l&#8217;idea (attualmente disponibile per Linux ed [&hellip;]","og_url":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/","og_site_name":"Fullo","article_published_time":"2006-03-16T14:49:11+00:00","author":"Francesco Fullone","twitter_card":"summary_large_image","twitter_creator":"@fullo","twitter_site":"@fullo","twitter_misc":{"Written by":"Francesco Fullone","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/#article","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/"},"author":{"name":"Francesco Fullone","@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"headline":"Privacy, Security and Recovery","datePublished":"2006-03-16T14:49:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/"},"wordCount":339,"commentCount":0,"publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"keywords":["crypt","pgp","privacy","recovery","security"],"articleSection":["sysadmin","tecnologia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/","url":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/","name":"Privacy, Security and Recovery - Fullo","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/#website"},"datePublished":"2006-03-16T14:49:11+00:00","breadcrumb":{"@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullo.net\/blog\/2006\/03\/16\/privacy-security-and-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy, Security and Recovery"}]},{"@type":"WebSite","@id":"https:\/\/www.fullo.net\/blog\/#website","url":"https:\/\/www.fullo.net\/blog\/","name":"Fullo","description":"nulla e&#039; impossibile per chi non lo deve fare!","publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c","name":"Francesco Fullone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","url":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","width":622,"height":622,"caption":"Francesco Fullone"},"logo":{"@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1"},"sameAs":["http:\/\/www.fullo.net","https:\/\/www.linkedin.com\/in\/fullo","https:\/\/x.com\/fullo"],"url":"https:\/\/www.fullo.net\/blog\/author\/fullo\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OSc1-uG","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":2259,"url":"https:\/\/www.fullo.net\/blog\/2007\/05\/09\/installare-networkmanager-pptp-su-fedora-7\/","url_meta":{"origin":1902,"position":0},"title":"Installare NetworkManager-pptp su Fedora 7","author":"Francesco Fullone","date":"09\/05\/2007","format":false,"excerpt":"Dopo il tutorial che avevo scritto per installare un client pptp su Fedora Core 5 non poteva mancare l'aggiornamento che sfrutta direttamente tutte le potenzialit\u00e0 di NetworkManager. Premetto che onestamente non capisco perch\u00e8 il pacchetto in questione non sia incluso in quasi nessuna distribuzione, eppure risulta indispensabile per qualsiasi sistemista\u2026","rel":"","context":"In &quot;linux&quot;","block_context":{"text":"linux","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/linux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1313,"url":"https:\/\/www.fullo.net\/blog\/2005\/03\/22\/touched\/","url_meta":{"origin":1902,"position":1},"title":"touched","author":"Francesco Fullone","date":"22\/03\/2005","format":false,"excerpt":"dopo l'editor wysiwyg per wp, che mi ha abbastanza deluso per la limitatezza [non \u00e8 possibile alterare dei tag con attributi di stile o altro], \u00e8 stato rilasciato un plugin che permette di fare l'online editing direttamente dalla template (senza cio\u00e8 loggarsi nel pannello di controllo). Il plugin in questione\u2026","rel":"","context":"In &quot;php&quot;","block_context":{"text":"php","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/php\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1737,"url":"https:\/\/www.fullo.net\/blog\/2005\/11\/08\/ajax-news-3\/","url_meta":{"origin":1902,"position":2},"title":"Ajax news","author":"Francesco Fullone","date":"08\/11\/2005","format":false,"excerpt":"Da qualche settimana non pubblico nessun link su ajax, ecco qui una lista per risolvere il problema: AFlax \u00e8 uno script js per interfacciarsi direttamente a flash, onestamente non ho ancora studiato come fa ma dai demo sembra interessante.... [via Ajaxian] Napolux mi comunica che ha realizzato un piccolo tutorial,\u2026","rel":"","context":"In &quot;ajax&quot;","block_context":{"text":"ajax","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/ajax\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":223,"url":"https:\/\/www.fullo.net\/blog\/2003\/04\/30\/jabber\/","url_meta":{"origin":1902,"position":3},"title":"jabber","author":"Francesco Fullone","date":"30\/04\/2003","format":false,"excerpt":"ho controllato per curiosit\u00e0 sul sito di jabber se fossero stati pubblicati nuovi client che supportano il file trasfert (purtroppo il mio adorato PSI non lo fa), e sono incappato in JAJC che pare gestisca TUTTO ed anche qualcosa in pi\u00f9... unico limite: \u00e8 solo per windoze (psi \u00e8 multipiattaforma)...\u2026","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1357,"url":"https:\/\/www.fullo.net\/blog\/2005\/04\/23\/memo-fat32-e-files\/","url_meta":{"origin":1902,"position":4},"title":"memo: fat32 e files","author":"Francesco Fullone","date":"23\/04\/2005","format":false,"excerpt":"se state per caso convertendo archivi in formato mbox in formato .eml, o viceversa, su un filesystem fat32 ricordatevi che ogni cartella non pu\u00f2 contenere pi\u00f9 di 16.384 files. E che sommando i file delle sue sotto cartelle non si possono superare i 65.534 files! ps. e questo mi risolve\u2026","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1824,"url":"https:\/\/www.fullo.net\/blog\/2005\/12\/20\/riassunto-della-settimana\/","url_meta":{"origin":1902,"position":5},"title":"Riassunto della settimana","author":"Francesco Fullone","date":"20\/12\/2005","format":false,"excerpt":"Riassumo qui gli ultimi post fatti su Oss e d\/l, essendo abbastanza impegnato con il trasloco ho dovuto rallentare il ritmo dei post. Li riassumo quindi qui in seguito cercando di raggrupparli nella categorie in cui sarebbero stati inseriti. Open Source rilasciata la versione 2.0 beta 1 di Gaim, supporta\u2026","rel":"","context":"In &quot;ajax&quot;","block_context":{"text":"ajax","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/ajax\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/comments?post=1902"}],"version-history":[{"count":0,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1902\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/media?parent=1902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/categories?post=1902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/tags?post=1902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}