{"id":6206,"date":"2019-07-24T13:26:31","date_gmt":"2019-07-24T10:26:31","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6206"},"modified":"2020-05-13T18:49:07","modified_gmt":"2020-05-13T15:49:07","slug":"digital-steganography","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/digital-steganography\/6206\/","title":{"rendered":"Dijital steganografi nedir?"},"content":{"rendered":"<p>Mecazi anlamda \u201csat\u0131r aralar\u0131n\u0131 okumak\u201d deyiminin ne demek oldu\u011funu hepimiz biliyoruz. Ancak modern teknolojiyi ileti\u015fim kurmak i\u00e7in kullanmadan \u00f6nce, insanlar normal bir mektubun sat\u0131rlar\u0131 aras\u0131na g\u00f6r\u00fcnmez m\u00fcrekkeple gizli mesajlar yazarken oldu\u011fu gibi bu deyimi bazen tam anlam\u0131yla uygulam\u0131\u015flard\u0131r.<\/p>\n<p>Bir mesaj\u0131n yazar\u0131n\u0131n, y\u00fczeysel olarak masum g\u00f6r\u00fcnen bir \u015feyin i\u00e7indeki bilgileri gizledi\u011fi teknik, <em> steganografi <\/em> olarak bilinir ve bu kelime yaz\u0131 t\u00fcr\u00fcn\u00fcn kendisi kadar eskidir. \u015eifre \u00e7\u00f6zme anahtar\u0131 olmadan okunamaz hale getirmek i\u00e7in mesaj\u0131 karma\u015f\u0131k hale getiren kriptografiden farkl\u0131 olarak, steganografinin amac\u0131 adeta mesaj\u0131n varl\u0131\u011f\u0131n\u0131 merakl\u0131 g\u00f6zlerden gizlemektir. Di\u011fer bir\u00e7ok bilgi i\u015flem y\u00f6nteminde oldu\u011fu gibi, steganografi de art\u0131k dijital teknolojilerde kullan\u0131lmaktad\u0131r.<\/p>\n<h2>Dijital steganografi nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/h2>\n<p>Gizli bir mesaj, herhangi bir dijital nesnede; bir <a href=\"http:\/\/www.ijettjournal.org\/volume-4\/issue-7\/IJETT-V4I7P186.pdf\" target=\"_blank\" rel=\"noopener nofollow\">metin belgesi<\/a>, <a href=\"https:\/\/threatpost.com\/malware-wordpress-license-key\/141315\/\" target=\"_blank\" rel=\"noopener nofollow\">lisans anahtar\u0131<\/a> ve hatta dosya uzant\u0131s\u0131 i\u00e7erisine bile gizlenebilir. \u00d6rne\u011fin, rap sanat\u00e7\u0131lar\u0131n\u0131n par\u00e7alar\u0131n\u0131 analiz eden bir web sitesi olan Genius.com\u2019un edit\u00f6rleri, \u00e7evrimi\u00e7i s\u00f6zlerinde iki t\u00fcr kesme i\u015fareti kulland\u0131lar ve birle\u015ftirildi\u011finde, Mors alfabesinde \u201csu\u00e7\u00fcst\u00fc\u201d s\u00f6zc\u00fc\u011f\u00fcn\u00fc elde ederek benzersiz <a href=\"https:\/\/www.businessinsider.com\/genius-accuses-google-of-copying-its-lyrics-and-diverting-traffic-2019-6\" target=\"_blank\" rel=\"noopener nofollow\">i\u00e7eriklerinin kopyalanmas\u0131n\u0131n \u00f6n\u00fcne ge\u00e7tiler<\/a>.<\/p>\n<p>Steganograflar i\u00e7in en uygun \u201csaklama yerleri\u201dnden biri medya dosyalar\u0131d\u0131r. (g\u00f6r\u00fcnt\u00fcler, ses, video vb.) Ancak bu dosyalar genellikle ba\u015flang\u0131\u00e7 i\u00e7in olduk\u00e7a b\u00fcy\u00fckt\u00fcrler. Bu durum da ilave yap\u0131n\u0131n \u00f6rne\u011fin bir metin belgesinden daha etken olmas\u0131 anlam\u0131na gelmektedir.<\/p>\n<p>Gizli bilgiler, <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener nofollow\">dosya meta verilerine<\/a> veya do\u011frudan ana i\u00e7eri\u011fe yaz\u0131labilir. \u00d6rnek olarak bir g\u00f6r\u00fcnt\u00fc se\u00e7elim. Bilgisayar\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131ndan bu, y\u00fczbinlerce piksel toplulu\u011fudur. Her pikselin rengi ile ilgili bir \u201ca\u00e7\u0131klama\u201ds\u0131 vard\u0131r.<\/p>\n<p>Renkli resimlerin \u00e7o\u011funda kullan\u0131lan RGB format\u0131 i\u00e7in bu a\u00e7\u0131klama 24 bit yer kaplar. G\u00f6rselin a\u00e7\u0131klamas\u0131ndaki sadece 1 ila 3 bitin, hatta t\u00fcm piksellerin gizli bilgileri al\u0131nd\u0131\u011f\u0131 takdirde bile resimdeki de\u011fi\u015fiklikler bir b\u00fct\u00fcn olarak alg\u0131lanamaz. G\u00f6r\u00fcnt\u00fcdeki dev piksel say\u0131s\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, bunlara olduk\u00e7a fazla veri yaz\u0131labilir.<\/p>\n<p>\u00a0<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"border-bottom: none\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/07\/23170547\/Lenna.bmp\"><\/td>\n<td style=\"border-bottom: none\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/07\/24111258\/Lenna_stego.bmp\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Soldaki g\u00f6r\u00fcnt\u00fcn\u00fcn hi\u00e7bir gizli mesaj\u0131 yoktur; Sa\u011fdaki g\u00f6r\u00fcnt\u00fc ise, Nabokov\u2019un Lolita\u2019s\u0131n\u0131n ilk 10 b\u00f6l\u00fcm\u00fcn\u00fc i\u00e7erir<\/em><\/p>\n<p>\u00c7o\u011fu durumda, bilgiler piksellerde gizlenir ve \u00f6zel ara\u00e7lar kullan\u0131larak elde edilir. Bunun i\u00e7in, modern steganograflar bazen \u00f6zel komut dosyalar\u0131 yazarlar veya ba\u015fka ama\u00e7lara y\u00f6nelik programlara gerekli i\u015flevleri eklerler. Zaman zaman ise, \u00e7evrimi\u00e7i ortamda bolca bulunan haz\u0131r kodlardan kullan\u0131rlar.<\/p>\n<h3>Dijital steganografi nas\u0131l kullan\u0131l\u0131r?<\/h3>\n<p>Steganografi bilgisayar teknolojilerinde say\u0131s\u0131z yolla uygulanabilir. Bir g\u00f6r\u00fcnt\u00fc, video veya m\u00fczikteki metni e\u011flence i\u00e7in veya yukar\u0131daki \u00f6rnekte oldu\u011fu gibi yasa d\u0131\u015f\u0131 kopyalamaya kar\u015f\u0131 korumak i\u00e7in gizlemek m\u00fcmk\u00fcnd\u00fcr.<\/p>\n<p>Gizli filigranlar da bir ba\u015fka steganografi \u00f6rne\u011fidir. Ancak, gizli mesajlar konusunda hem fiziksel hem de dijital olarak akla gelen ilk \u015fey, her t\u00fcrl\u00fc gizli yaz\u0131\u015fma ve casusluktur.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n<h3>Siberler i\u00e7in bir mucize<\/h3>\n<p><a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2017_kaspersky-lab-identifies-worrying-trend-in-hackers-using-steganography\" target=\"_blank\" rel=\"noopener\">Uzmanlar\u0131m\u0131z 18 ay \u00f6nce, steganografide siber su\u00e7 e\u011filiminde art\u0131\u015f kaydetti<\/a>. O zamanlar, \u00fc\u00e7ten fazla casus yaz\u0131l\u0131m\u0131, ma\u011fdurlar\u0131n verilerinin foto\u011fraf ve videolar\u0131n\u0131 kullanarak C&amp;C sunucular\u0131na g\u00f6nderildi\u011fi halinin g\u00f6r\u00fcn\u00fcm\u00fcne giriyor.<\/p>\n<p>G\u00fcvenlik sistemleri ve i\u015fi trafik ak\u0131\u015f\u0131n\u0131 g\u00f6r\u00fcnt\u00fclemek olan \u00e7al\u0131\u015fanlar a\u00e7\u0131s\u0131ndan, medya dosyalar\u0131n\u0131n \u00e7evrimi\u00e7i olarak y\u00fcklenmesinde \u015f\u00fcpheli bir durum bulunmuyordu. Su\u00e7lular\u0131n g\u00fcvendi\u011fi \u015fey, kesinlikle buydu.<\/p>\n<h3>\u0130nce yollardan ince d\u00fc\u015f\u00fcnceler<\/h3>\n<p>Bu s\u0131rada, bir ba\u015fka merakl\u0131 <a href=\"https:\/\/www.pcmag.com\/news\/365516\/hacker-uses-internet-meme-to-send-hidden-commands-to-malware\" target=\"_blank\" rel=\"noopener nofollow\">casus yaz\u0131l\u0131m<\/a> ise g\u00f6r\u00fcnt\u00fcler arac\u0131l\u0131\u011f\u0131yla emir ald\u0131. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, siber su\u00e7 i\u015fleyicileriyle en olas\u0131 olmayan kaynak \u00fczerinden ileti\u015fim kurdu: Twitter\u2019da yay\u0131nlanan g\u00f6nderiler.<\/p>\n<p>Ma\u011fdurun bilgisayar\u0131na girdikten sonra, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ilgili tweet\u2019i a\u00e7t\u0131 ve komik g\u00f6r\u00fcnt\u00fc \u00fczerinden talimatlar\u0131n\u0131 \u00e7ekti. Komutlar aras\u0131nda \u015funlar vard\u0131:<\/p>\n<ul>\n<li>Masa\u00fcst\u00fcn\u00fcn ekran g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fc al\u0131n,<\/li>\n<li>\u00c7al\u0131\u015fan i\u015flemler hakk\u0131nda bilgi toplay\u0131n,<\/li>\n<li>Panodan veri kopyalay\u0131n,<\/li>\n<li>Belirtilen klas\u00f6rden dosya isimlerini yaz\u0131n.<\/li>\n<\/ul>\n<h3>G\u00f6r\u00fcnt\u00fc temelli kod<\/h3>\n<p>Medya dosyalar\u0131 sadece metinleri gizlemekle kalmaz, k\u00f6t\u00fc niyetli kod par\u00e7alar\u0131n\u0131 da gizleyebilir ve b\u00f6ylece di\u011fer siber su\u00e7lular da bu casuslar\u0131 takip etmeye ba\u015flar. Steganografi kullanmak g\u00f6r\u00fcnt\u00fc, video veya m\u00fczik par\u00e7alar\u0131n\u0131 b\u00fct\u00fcn\u00fcyle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara d\u00f6n\u00fc\u015ft\u00fcrmez, ancak antivir\u00fcs taramalar\u0131ndan g\u00f6r\u00fclen bir y\u00fck\u00fc gizlemek i\u00e7in kullan\u0131labilir.<\/p>\n<p>\u00d6rne\u011fin Ocak ay\u0131nda, sald\u0131rganlar \u00e7evrimi\u00e7i reklam a\u011flar\u0131 \u00fczerinden e\u011flenceli bir man\u015fet att\u0131lar. Ger\u00e7ek bir reklam i\u00e7ermiyor ve k\u00fc\u00e7\u00fck beyaz dikd\u00f6rtgen bir sayfa a\u00e7\u0131l\u0131yordu. Ancak i\u00e7erisinde, taray\u0131c\u0131 taraf\u0131ndan y\u00fcr\u00fct\u00fclebilmesi i\u00e7in gereken bir komut dosyas\u0131 bulunuyordu. Bu, do\u011fru! \u00d6rne\u011fin komut dosyalar\u0131, \u015firketlerin reklam g\u00f6r\u00fcnt\u00fcleme istatistiklerini toplamas\u0131 gibi ama\u00e7larla bu sayfalara y\u00fcklenebilir.<\/p>\n<div id=\"attachment_6225\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6225\" class=\"wp-image-6225 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/07\/23174806\/digital-steganography-3.png\" alt=\"\" width=\"800\" height=\"489\"><p id=\"caption-attachment-6225\" class=\"wp-caption-text\">Gizli kodlu man\u015fet. Kaynak: <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"noopener nofollow\">Confiant blogu<\/a><\/p><\/div>\n<p>Siber su\u00e7lular\u0131n komut dosyas\u0131, g\u00f6r\u00fcnt\u00fc piksellerinin rengini tan\u0131d\u0131 ve bir harf ve say\u0131 k\u00fcmesi olarak kay\u0131t alt\u0131na ald\u0131. Bu, beyaz bir dikd\u00f6rtgenden ba\u015fka g\u00f6r\u00fclecek bir \u015fey olmad\u0131\u011f\u0131 d\u00fc\u015f\u00fcn\u00fcld\u00fc\u011f\u00fcnde, anlams\u0131z bir egzersiz gibi g\u00f6r\u00fcn\u00fcyor. Ancak, program\u0131n g\u00f6z\u00fcnden bak\u0131ld\u0131\u011f\u0131nda, pikseller beyaz de\u011fildi ,sadece <em>beyaza yak\u0131n<\/em> say\u0131ld\u0131lar ve bu \u201cbeyaza yak\u0131n\u201dl\u0131k, usul\u00fcne uygun olarak y\u00fcr\u00fct\u00fclen <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"noopener nofollow\">k\u00f6t\u00fc ama\u00e7l\u0131 kodlara<\/a> d\u00f6n\u00fc\u015ft\u00fcr\u00fcld\u00fc.<\/p>\n<p>Resimden \u00e7ekilen kod, kullan\u0131c\u0131y\u0131 direkt olarak siber su\u00e7lular\u0131n web sitesine y\u00f6nlendirdi. Bu web sitesinde ma\u011fdur, Adobe Flash Player g\u00fcncellemesi olarak gizlenmi\u015f bir Trojan ile kar\u015f\u0131la\u015ft\u0131 ve daha sonra, \u00f6zellikle adware gibi di\u011fer pislikleri de indirmeye devam etti.<\/p>\n<h3>Steganografiyi tespit etmek kolay de\u011fil<\/h3>\n<p>Uzman Simon Wiseman\u2019\u0131n 2018 RSA Konferans\u0131\u2019nda belirtti\u011fi gibi, <a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hta-w02_poison-pixels-combatting-image-steganography-in-cybercrime.pdf\" target=\"_blank\" rel=\"noopener nofollow\">kaliteli steganografiyi bulmak olduk\u00e7a zordur<\/a>. Ve ondan kurtulmak \u00f6yle kolay de\u011fil. Mesajlar\u0131 g\u00f6r\u00fcnt\u00fclere derinlemesine g\u00f6mmek i\u00e7in <a href=\"https:\/\/benthamopen.com\/contents\/pdf\/TOAUTOCJ\/TOAUTOCJ-6-84.pdf\" target=\"_blank\" rel=\"noopener nofollow\">yazd\u0131rma ve tarama,<\/a> yeniden boyutland\u0131rma veya <a href=\"https:\/\/www.hindawi.com\/journals\/scn\/2018\/6256872\/\" target=\"_blank\" rel=\"noopener nofollow\">di\u011fer d\u00fczenlemelerden<\/a> sonra bile ayn\u0131 \u015fekilde kalacak \u00e7ok derin y\u00f6ntemler vard\u0131r.<\/p>\n<p>Ancak, daha \u00f6nce de belirtti\u011fimiz gibi, \u00f6zel bir ara\u00e7 ile g\u00f6r\u00fcnt\u00fclerden ve videolardan bilgi (kod dahil) edinilebilir. Ba\u015fka bir deyi\u015fle medya dosyalar\u0131, kendi ba\u015flar\u0131na bilgisayardan bir \u015feyler \u00e7almaz veya bilgisayar\u0131n\u0131za bir \u015fey indirmezler. B\u00f6ylece, cihaz\u0131n\u0131z\u0131 medya dosyalar\u0131na metin veya kodlar gizleyen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bile\u015fenlerine kar\u015f\u0131 koruyarak g\u00fcvence alt\u0131na alabilirsiniz:<\/p>\n<ul>\n<li>E-postalardaki ba\u011flant\u0131 ve ekleri a\u00e7mak i\u00e7in acele etmeyin. Mesaj\u0131 dikkatlice okuyun. G\u00f6nderenin adresi veya i\u00e7eri\u011fi \u015f\u00fcpheli g\u00f6r\u00fcn\u00fcyorsa, dikkate almamak daha do\u011fru olacakt\u0131r.<\/li>\n<li>Bir \u015fey indirmeniz gerekirse, her zaman g\u00fcvenilir kaynaklar\u0131 kullan\u0131n. \u00d6rne\u011fin, resmi ma\u011fazalardan veya geli\u015ftirici web sitelerinden uygulamalar indirin. Ayn\u0131 \u015fey, film ve m\u00fczikler i\u00e7in de ge\u00e7erlidir. Bilmedi\u011finiz kaynaklardan hi\u00e7bir \u015fey indirmeyin.<\/li>\n<li><a href=\"https:\/\/kas.pr\/kdksctr\" target=\"_blank\" rel=\"noopener\">Sa\u011flam bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullan\u0131n<\/a>. G\u00f6r\u00fcnt\u00fc temelli kodu tan\u0131m\u0131yor olsa bile, di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m mod\u00fcllerinin \u015f\u00fcpheli eylemlerini yakalayabilir.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Bilgi gizlemenin olduk\u00e7a yarat\u0131c\u0131 bir yolu.<\/p>\n","protected":false},"author":2049,"featured_media":6217,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[995],"tags":[1965,1964,878],"class_list":{"0":"post-6206","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-dijital-steganografi","9":"tag-steganografi","10":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/digital-steganography\/6206\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/digital-steganography\/16084\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/digital-steganography\/13590\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/digital-steganography\/17980\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/digital-steganography\/16118\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/digital-steganography\/14859\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/digital-steganography\/18791\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/digital-steganography\/17552\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/digital-steganography\/23025\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/digital-steganography\/27474\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/digital-steganography\/12132\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/digital-steganography\/10912\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/digital-steganography\/19652\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/digital-steganography\/23548\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/digital-steganography\/18611\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/digital-steganography\/22902\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/digital-steganography\/22844\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/teknoloji\/","name":"teknoloji"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2049"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"predecessor-version":[{"id":8237,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6206\/revisions\/8237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6217"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}