{"id":14112,"date":"2025-12-23T23:22:19","date_gmt":"2025-12-23T20:22:19","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14112"},"modified":"2025-12-24T15:53:23","modified_gmt":"2025-12-24T12:53:23","slug":"chatbot-eavesdropping-whisper-leak-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/chatbot-eavesdropping-whisper-leak-protection\/14112\/","title":{"rendered":"Bir sinir a\u011f\u0131nda gizlice dinleme yapma"},"content":{"rendered":"<p>\u0130nsanlar, en \u00f6nemli, hatta en mahrem konular\u0131n\u0131 sinir a\u011flar\u0131na emanet ediyorlar; t\u0131bbi te\u015fhisleri do\u011frulamak, a\u015fk tavsiyesi almak veya <a href=\"https:\/\/edition.cnn.com\/2024\/12\/18\/health\/chatbot-ai-therapy-risks-wellness\/\" target=\"_blank\" rel=\"noopener nofollow\">psikoterapist yerine<\/a> yapay zekaya ba\u015fvurmak gibi. LLM\u2019ler taraf\u0131ndan kolayla\u015ft\u0131r\u0131lan <a href=\"https:\/\/www.cnn.com\/2025\/11\/06\/us\/openai-chatgpt-suicide-lawsuit-invs-vis\" target=\"_blank\" rel=\"noopener nofollow\">intihar planlama<\/a>, <a href=\"https:\/\/abcnews.go.com\/US\/las-vegas-cybertruck-explosion-suspect-chatgpt-plan-attack\/story?id=117428523\" target=\"_blank\" rel=\"noopener nofollow\">ger\u00e7ek d\u00fcnyadaki sald\u0131r\u0131lar<\/a> ve di\u011fer tehlikeli eylemlere ili\u015fkin zaten bilinen vakalar var.\u00a0 Sonu\u00e7 olarak, insanlar ile yapay zeka aras\u0131ndaki \u00f6zel sohbetler, h\u00fck\u00fcmetlerin, \u015firketlerin ve merakl\u0131 bireylerin ilgisini giderek daha fazla \u00e7ekiyor.<\/p>\n<p>Dolay\u0131s\u0131yla, Whisper Leak sald\u0131r\u0131s\u0131n\u0131 ger\u00e7ek hayatta uygulamak isteyenlerin say\u0131s\u0131 az de\u011fil. Sonu\u00e7ta, trafi\u011fe herhangi bir \u015fekilde m\u00fcdahale etmeden, sadece a\u011f \u00fczerinden yapay zeka sunucusuna \u015fifrelenmi\u015f veri paketlerinin g\u00f6nderilme ve alma zamanlama modellerini analiz etmek, sinir a\u011f\u0131 ile ger\u00e7ekle\u015ftirilen bir konu\u015fman\u0131n genel konusunu belirlemeye olanak tan\u0131r. Ancak, sohbetlerinizi yine de gizli tutabilirsiniz. Daha fazla bilgi almak i\u00e7in okumaya devam edin.<\/p>\n<h2>Whisper Leak sald\u0131r\u0131s\u0131 nas\u0131l i\u015fler?<\/h2>\n<p>T\u00fcm dil modelleri, \u00e7\u0131kt\u0131lar\u0131n\u0131 a\u015famal\u0131 olarak \u00fcretir. Bu, kullan\u0131c\u0131ya sanki kar\u015f\u0131 tarafta bir ki\u015fi kelime kelime yaz\u0131yormu\u015f gibi g\u00f6r\u00fcn\u00fcr. Ancak ger\u00e7ekte, dil modelleri tek tek karakterler veya kelimelerle de\u011fil, LLM\u2019ler i\u00e7in bir t\u00fcr anlamsal birim olan belirte\u00e7lerle \u00e7al\u0131\u015f\u0131r ve bu belirte\u00e7ler \u00fcretildik\u00e7e yapay zeka yan\u0131t\u0131 ekranda g\u00f6r\u00fcn\u00fcr. Bu \u00e7\u0131kt\u0131 modu \u201cak\u0131\u015f\u201d olarak bilinir ve ak\u0131\u015f\u0131n \u00f6zelliklerini \u00f6l\u00e7erek konu\u015fman\u0131n konusunu tahmin edebilirsiniz. Daha \u00f6nce, bir botun g\u00f6nderdi\u011fi her bir belirtecin uzunlu\u011funu analiz ederek botla yap\u0131lan sohbet metnini olduk\u00e7a do\u011fru bir \u015fekilde yeniden olu\u015fturmay\u0131 ba\u015faran bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ai-chatbot-side-channel-attack\/12312\/\" target=\"_blank\" rel=\"noopener\">ara\u015ft\u0131rmay\u0131<\/a> ele alm\u0131\u015ft\u0131k.<\/p>\n<p>Microsoft ara\u015ft\u0131rmac\u0131lar\u0131, 30 farkl\u0131 yapay zeka modelinin 11.800 komuta verdi\u011fi <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/11\/07\/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models\/\" target=\"_blank\" rel=\"noopener nofollow\">yan\u0131t \u00f6zelliklerini analiz ederek<\/a> bu \u00e7al\u0131\u015fmay\u0131 daha da ileriye g\u00f6t\u00fcrd\u00fcler. \u201cPara aklama yasal m\u0131?\u201d sorusunun \u00e7e\u015fitli varyasyonlar\u0131 da dahil olmak \u00fczere rastgele ve tamamen farkl\u0131 konular\u0131 kapsayan y\u00fcz adet soru kullan\u0131ld\u0131.<\/p>\n<p>Sunucu yan\u0131t gecikmesi, paket boyutu ve toplam paket say\u0131s\u0131n\u0131 kar\u015f\u0131la\u015ft\u0131rarak, ara\u015ft\u0131rmac\u0131lar \u201ctehlikeli\u201d sorgular\u0131 \u201cnormal\u201d sorgulardan \u00e7ok do\u011fru bir \u015fekilde ay\u0131rt edebildiler. Analiz i\u00e7in sinir a\u011flar\u0131n\u0131 da kulland\u0131lar, ancak LLM\u2019leri kullanmad\u0131lar. \u0130ncelenen modele ba\u011fl\u0131 olarak, \u201ctehlikeli\u201d konular\u0131 belirleme do\u011frulu\u011fu %71 ile %100 aras\u0131nda de\u011fi\u015firken, 30 modelden 19\u2019unda do\u011fruluk %97\u2019yi a\u015ft\u0131.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar daha sonra daha karma\u015f\u0131k ve ger\u00e7ek\u00e7i bir deney yapt\u0131lar. 10.000 rastgele konu\u015fmadan olu\u015fan bir veri setini test ettiler ve bunlardan sadece biri se\u00e7ilen konuya odaklanm\u0131\u015ft\u0131.<\/p>\n<p>Sonu\u00e7lar daha \u00e7e\u015fitliydi, ancak sim\u00fcle edilen sald\u0131r\u0131 yine de olduk\u00e7a ba\u015far\u0131l\u0131 oldu. Deepseek-r1, Groq-llama-4, gpt-4o-mini, xai-grok-2 ve -3, Mistral-small ve Mistral-large gibi modellerde, ara\u015ft\u0131rmac\u0131lar deneylerinin %50\u2019sinde hatal\u0131 pozitif sonu\u00e7 almadan g\u00fcr\u00fclt\u00fcdeki sinyali tespit edebildiler.<\/p>\n<p>Alibaba-Qwen2.5, Lambda-llama-3.1, gpt-4.1, gpt-o1-mini, Groq-llama-4 ve Deepseek-v3-chat i\u00e7in alg\u0131lama ba\u015far\u0131 oran\u0131 %20\u2019ye d\u00fc\u015ft\u00fc, ancak yine de hatal\u0131 pozitif sonu\u00e7lar g\u00f6r\u00fclmedi. \u00d6te yandan, Gemini 2.5 pro, Anthropic-Claude-3-haiku ve gpt-4o-mini i\u00e7in Microsoft sunucular\u0131nda \u201ctehlikeli\u201d sohbetlerin tespiti yaln\u0131zca %5 oran\u0131nda ba\u015far\u0131l\u0131 oldu. \u00d6te yandan, Gemini 2.5 pro, Anthropic-Claude-3-haiku ve gpt-4o-mini i\u00e7in Microsoft sunucular\u0131nda \u201ctehlikeli\u201d sohbetlerin tespiti yaln\u0131zca %5 oran\u0131nda ba\u015far\u0131l\u0131 oldu. Test edilen di\u011fer modeller i\u00e7in ba\u015far\u0131 oran\u0131 daha da d\u00fc\u015f\u00fckt\u00fc.<\/p>\n<p>Dikkate al\u0131nmas\u0131 gereken \u00f6nemli bir nokta ise, sonu\u00e7lar\u0131n yaln\u0131zca belirli bir yapay zeka modeline de\u011fil, ayn\u0131 zamanda modelin \u00e7al\u0131\u015ft\u0131\u011f\u0131 sunucu yap\u0131land\u0131rmas\u0131na da ba\u011fl\u0131 oldu\u011fudur. Bu nedenle, ayn\u0131 OpenAI modeli Microsoft\u2019un altyap\u0131s\u0131nda OpenAI\u2019\u0131n kendi sunucular\u0131na k\u0131yasla farkl\u0131 sonu\u00e7lar g\u00f6sterebilir. Ayn\u0131 durum t\u00fcm a\u00e7\u0131k kaynakl\u0131 modeller i\u00e7in de ge\u00e7erlidir.<\/p>\n<h2>Pratik uygulamalar: Whisper Leak sald\u0131r\u0131s\u0131n\u0131n \u00e7al\u0131\u015fmas\u0131 i\u00e7in ne gerekir?<\/h2>\n<p>Geni\u015f kaynaklara sahip bir sald\u0131rgan, kurbanlar\u0131n\u0131n a\u011f trafi\u011fine eri\u015fimi varsa (\u00f6rne\u011fin, bir ISP\u2019deki veya bir kurulu\u015f i\u00e7indeki bir y\u00f6nlendiriciyi kontrol ederek), yapay zeka asistan sunucular\u0131na g\u00f6nderilen trafi\u011fi \u00f6l\u00e7erek, \u00e7ok d\u00fc\u015f\u00fck bir hata oran\u0131n\u0131 korurken, ilgilendi\u011fi konulardaki konu\u015fmalar\u0131n \u00f6nemli bir y\u00fczdesini tespit edebilir. Ancak bu, olas\u0131 herhangi bir konu\u015fma konusunun otomatik olarak alg\u0131lanmas\u0131 anlam\u0131na gelmez. Sald\u0131rgan \u00f6nce alg\u0131lama sistemlerini belirli temalar \u00fczerinde e\u011fitmelidir, model bunlar i\u00e7in yaln\u0131zca tamamlay\u0131c\u0131 bir unsur olacakt\u0131r.<\/p>\n<p>Bu tehdit, sadece teorik olarak de\u011ferlendirilemez. \u00d6rne\u011fin, emniyet g\u00fc\u00e7leri silah veya uyu\u015fturucu \u00fcretimi ile ilgili aramalar\u0131 izleyebilirken, \u015firketler \u00e7al\u0131\u015fanlar\u0131n\u0131n i\u015f arama sorgular\u0131n\u0131 takip edebilirler. Ancak, bu teknolojiyi y\u00fczlerce veya binlerce konuyu kapsayan kitlesel g\u00f6zetim yapmak i\u00e7in kullanmak m\u00fcmk\u00fcn de\u011fildir; bu, \u00e7ok fazla kaynak gerektirir.<\/p>\n<p>Ara\u015ft\u0131rmaya yan\u0131t olarak, baz\u0131 pop\u00fcler yapay zeka hizmetleri, bu sald\u0131r\u0131n\u0131n ger\u00e7ekle\u015ftirilmesini zorla\u015ft\u0131rmak i\u00e7in sunucu algoritmalar\u0131n\u0131 de\u011fi\u015ftirdi.<\/p>\n<h2>Kendinizi Whisper Leak sald\u0131r\u0131lar\u0131na kar\u015f\u0131 nas\u0131l koruyabilirsiniz?<\/h2>\n<p>Bu sald\u0131r\u0131ya kar\u015f\u0131 korunmada birincil sorumluluk yapay zeka modellerinin sa\u011flay\u0131c\u0131lar\u0131na aittir. Olu\u015fturulan metni, konunun belirte\u00e7 olu\u015fturma modellerinden ay\u0131rt edilmesini \u00f6nleyecek \u015fekilde sunmalar\u0131 gerekir. Microsoft\u2019un ara\u015ft\u0131rmas\u0131n\u0131n ard\u0131ndan OpenAI, Mistral, Microsoft Azure ve xAI gibi \u015firketler bu tehdidi \u00e7\u00f6zmeye \u00e7al\u0131\u015ft\u0131klar\u0131n\u0131 bildirdiler. Art\u0131k sinir a\u011f\u0131 taraf\u0131ndan g\u00f6nderilen paketlere k\u00fc\u00e7\u00fck bir miktar g\u00f6r\u00fcnmez dolgu ekliyorlar ve bu da Whisper Leak algoritmalar\u0131n\u0131 bozuyor. \u00d6zellikle, Anthropic\u2019in modelleri bu sald\u0131r\u0131ya kar\u015f\u0131 en ba\u015f\u0131ndan beri daha az hassast\u0131.<\/p>\n<p>Whisper Leak\u2019in endi\u015fe kayna\u011f\u0131 olmaya devam etti\u011fi bir model ve sunucu kullan\u0131yorsan\u0131z, daha az savunmas\u0131z bir sa\u011flay\u0131c\u0131ya ge\u00e7ebilir ya da ek \u00f6nlemler alabilirsiniz. Bu \u00f6nlemler, gelecekte bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 korunmak isteyen herkes i\u00e7in de ge\u00e7erlidir:<\/p>\n<ul>\n<li>Son derece hassas konular i\u00e7in yerel yapay zeka modelleri kullan\u0131n. Bunun i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-use-ai-locally-and-securely\/12058\/\" target=\"_blank\" rel=\"noopener\">k\u0131lavuzumuza<\/a> dan\u0131\u015fabilirsiniz.<\/li>\n<li>Modeli m\u00fcmk\u00fcn olan yerlerde ak\u0131\u015fs\u0131z \u00e7\u0131kt\u0131 kullanacak \u015fekilde yap\u0131land\u0131r\u0131n, b\u00f6ylece yan\u0131t\u0131n tamam\u0131 kelime kelime olarak de\u011fil, bir kerede iletilir.<\/li>\n<li>G\u00fcvenilir olmayan a\u011flara ba\u011fl\u0131yken sohbet robotlar\u0131yla hassas konular\u0131 tart\u0131\u015fmaktan ka\u00e7\u0131n\u0131n.<\/li>\n<li>Daha fazla ba\u011flant\u0131 g\u00fcvenli\u011fi i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/vpn-secure-connection?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener\">sa\u011flam ve g\u00fcvenilir bir VPN sa\u011flay\u0131c\u0131s\u0131<\/a>\u00a0kullan\u0131n.<\/li>\n<li>Herhangi bir sohbet bilgisi i\u00e7in en olas\u0131 s\u0131z\u0131nt\u0131 noktas\u0131n\u0131n kendi bilgisayar\u0131n\u0131z oldu\u011funu unutmay\u0131n. Bu nedenle, hem bilgisayar\u0131n\u0131zda hem de t\u00fcm ak\u0131ll\u0131 telefonlar\u0131n\u0131zda \u00e7al\u0131\u015fan <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a>\u00a0ile casus yaz\u0131l\u0131mlardan korunman\u0131z \u00e7ok \u00f6nemlidir.<\/li>\n<\/ul>\n<blockquote><p>Yapay zeka kullan\u0131m\u0131yla ili\u015fkili di\u011fer risklerin neler oldu\u011funu ve yapay zeka ara\u00e7lar\u0131n\u0131n nas\u0131l do\u011fru \u015fekilde yap\u0131land\u0131r\u0131laca\u011f\u0131n\u0131 a\u00e7\u0131klayan baz\u0131 makaleleri burada bulabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ai-sidebar-spoofing-atlas-comet\/14021\/\" target=\"_blank\" rel=\"noopener\">Yapay zeka kenar \u00e7ubu\u011fu aldatmacas\u0131: Yapay zeka taray\u0131c\u0131lar\u0131na y\u00f6nelik yeni bir sald\u0131r\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ai-browser-security-privacy-risks\/13779\/\" target=\"_blank\" rel=\"noopener\">Yapay zeka destekli taray\u0131c\u0131lar\u0131n art\u0131lar\u0131 ve eksileri<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ai-chatbot-side-channel-attack\/12312\/\" target=\"_blank\" rel=\"noopener\">Bilgisayar korsanlar\u0131 ChatGPT veya Microsoft Copilot ile sohbetlerinizi nas\u0131l okuyabilir?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/chatgpt-privacy-and-security\/54607\/\" target=\"_blank\" rel=\"noopener nofollow\">ChatGPT\u2019deki gizlilik ayarlar\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/deepseek-privacy-and-security\/54643\/\" target=\"_blank\" rel=\"noopener nofollow\">DeepSeek: gizlilik yap\u0131land\u0131rmas\u0131 ve yerel s\u00fcr\u00fcm\u00fcn da\u011f\u0131t\u0131m\u0131<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Whisper Leak sald\u0131r\u0131s\u0131, sald\u0131rgan\u0131n trafi\u011fin \u015fifresini \u00e7\u00f6zmeden yapay zeka asistan\u0131yla yapt\u0131\u011f\u0131n\u0131z konu\u015fman\u0131n konusunu tahmin etmesini sa\u011flar. Bunun nas\u0131l m\u00fcmk\u00fcn oldu\u011funu ve yapay zeka sohbetlerinizi korumak i\u00e7in neler yapabilece\u011finizi inceliyoruz.<\/p>\n","protected":false},"author":2722,"featured_media":14113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1425,2831,818,2607,500,22,519,2802,2730,550,794,537,878,1424],"class_list":{"0":"post-14112","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-ai","9":"tag-anthropic","10":"tag-bilgi-guvenligi","11":"tag-chatgpt","12":"tag-gizlilik","13":"tag-google","14":"tag-ipuclari-2","15":"tag-llm","16":"tag-openai","17":"tag-siber-guvenlik","18":"tag-sifreleme","19":"tag-tehditler","20":"tag-teknoloji","21":"tag-yapay-zeka"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/chatbot-eavesdropping-whisper-leak-protection\/14112\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/chatbot-eavesdropping-whisper-leak-protection\/29909\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/chatbot-eavesdropping-whisper-leak-protection\/24979\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/chatbot-eavesdropping-whisper-leak-protection\/29785\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/chatbot-eavesdropping-whisper-leak-protection\/28839\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/chatbot-eavesdropping-whisper-leak-protection\/31723\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/chatbot-eavesdropping-whisper-leak-protection\/30365\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/chatbot-eavesdropping-whisper-leak-protection\/40994\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/chatbot-eavesdropping-whisper-leak-protection\/54905\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/chatbot-eavesdropping-whisper-leak-protection\/23471\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/chatbot-eavesdropping-whisper-leak-protection\/24593\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/chatbot-eavesdropping-whisper-leak-protection\/33005\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/chatbot-eavesdropping-whisper-leak-protection\/29999\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/chatbot-eavesdropping-whisper-leak-protection\/35708\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/chatbot-eavesdropping-whisper-leak-protection\/35336\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/yapay-zeka\/","name":"yapay zeka"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14112"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14112\/revisions"}],"predecessor-version":[{"id":14118,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14112\/revisions\/14118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14113"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}