{"id":7719,"date":"2019-01-09T18:03:06","date_gmt":"2019-01-09T17:03:06","guid":{"rendered":"http:\/\/blog.gerhardlink.com\/?p=7719"},"modified":"2019-01-10T09:07:09","modified_gmt":"2019-01-10T08:07:09","slug":"methoden-der-wirtschaftsspionage-aktuelles-von-sicherheitsberater-15","status":"publish","type":"post","link":"https:\/\/blog.gerhardlink.com\/?p=7719","title":{"rendered":"Methoden der Wirtschaftsspionage &#8211; Aktuelles von Sicherheitsberater #15"},"content":{"rendered":"\n<p>Wie wird Wirtschaftsspionage heute praktiziert? <\/p>\n\n\n\n<p>Wer denkt, dass Wirtschaftsspionage heutzutage nur noch \u00fcber digitalen Medien betrieben wird, ist im Irrglauben&#8230;&#8230;..weiter im Video!!<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/IOu77VSFRSw?rel=0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" width=\"560\" height=\"315\" frameborder=\"0\"><\/iframe>\n\n\n\n<!--more-->\n\n\n\n<p>Sollten Sie zum Thema <strong>SICHERHEIT<\/strong> Fragen haben,&nbsp;so k\u00f6nnen Sie gerne eine Mail senden (klicken Sie auf das Symbol):<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"mailto:%20g.link@gerhardlink.com?subject= Fragen zum Thema Sicherheit\"><\/a><\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">Weitere&nbsp; Videos zum Thema Sicherheit unter :<\/h4>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\" alt=\"\" class=\"wp-image-7150\" width=\"256\" height=\"57\" srcset=\"https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png 1024w, https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-150x34.png 150w, https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-300x67.png 300w, https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-768x172.png 768w, https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_.png 1280w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/blog.gerhardlink.com\/?p=7563\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Kann installierte Sicherheitstechnik ausgetrickst werden? \u2013 Aktuelles vom Sicherheitsberater #14 (\u00f6ffnet in neuem Tab)\">Kann installierte Sicherheitstechnik ausgetrickst werden? \u2013 Aktuelles vom Sicherheitsberater #14<\/a><\/li><li><a href=\"https:\/\/blog.gerhardlink.com\/?p=7543\">Einbruch trotz Alarm \u2013 Aktuelles vom Sicherheitsberater #13<\/a><\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/LZoHxrW64ag\" target=\"_blank\">Sicherheitsrisiko Mensch \u2013 Aktuelles vom Sicherheitsberater #12<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/1ppAYrvz5VA\" target=\"_blank\"><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Wie wird Wirtschaftsspionage heute praktiziert? Wer denkt, dass Wirtschaftsspionage heutzutage nur noch \u00fcber digitalen Medien betrieben wird, ist im Irrglauben&#8230;&#8230;..weiter im Video!!<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,14,79,463],"tags":[289,301,231,293,296,44,286,22,291,283,292,508,294,297,298,273,275,274,117,300,299,94,190,123,122,509,295,302,196,118],"class_list":["post-7719","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-sicherheitsberatung","category-wirtschaftsspionage","category-youtube","tag-angriffe","tag-auswirkungen","tag-bedrohungen","tag-betrug","tag-einbreccher","tag-einbruch","tag-entwicklung","tag-gerhard-link","tag-it-kriminalitaet","tag-knildrahregxxx","tag-kriminalitaet","tag-nachrichtendienst","tag-risikoanalyse","tag-sabotage","tag-saboteur","tag-security","tag-security-advisor","tag-security-consulting","tag-sicherheit","tag-sicherheitsanalyse","tag-sicherheitsbegehung","tag-sicherheitsberater","tag-sicherheitskonzept","tag-sicherheitsplanung","tag-sicherheitstechnik","tag-sicherheitsverantwortlicher","tag-spion","tag-wahrscheinlichkeit","tag-wirtschaftskriminalitaet","tag-wirtschaftsspionage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry<\/title>\n<meta name=\"description\" content=\"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gerhardlink.com\/?p=7719\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry\" \/>\n<meta property=\"og:description\" content=\"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gerhardlink.com\/?p=7719\" \/>\n<meta property=\"og:site_name\" content=\"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Gerhard.Link.Sicherheitsberatung\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-09T17:03:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-10T08:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\" \/>\n<meta name=\"author\" content=\"Gerhard Link\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Gerhard_Link\" \/>\n<meta name=\"twitter:site\" content=\"@Gerhard_Link\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gerhard Link\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719\"},\"author\":{\"name\":\"Gerhard Link\",\"@id\":\"https:\/\/blog.gerhardlink.com\/#\/schema\/person\/c41a41c1a727e12227eaaef7453cfecc\"},\"headline\":\"Methoden der Wirtschaftsspionage &#8211; Aktuelles von Sicherheitsberater #15\",\"datePublished\":\"2019-01-09T17:03:06+00:00\",\"dateModified\":\"2019-01-10T08:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719\"},\"wordCount\":77,\"publisher\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\",\"keywords\":[\"angriffe\",\"auswirkungen\",\"bedrohungen\",\"betrug\",\"einbreccher\",\"Einbruch\",\"entwicklung\",\"Gerhard Link\",\"it-kriminalit\u00e4t\",\"knildrahregxxx\",\"kriminalit\u00e4t\",\"nachrichtendienst\",\"risikoanalyse\",\"sabotage\",\"saboteur\",\"security\",\"security advisor\",\"security consulting\",\"Sicherheit\",\"sicherheitsanalyse\",\"sicherheitsbegehung\",\"Sicherheitsberatung\",\"Sicherheitskonzept\",\"Sicherheitsplanung\",\"Sicherheitstechnik\",\"sicherheitsverantwortlicher\",\"spion\",\"wahrscheinlichkeit\",\"Wirtschaftskriminalit\u00e4t\",\"Wirtschaftsspionage\"],\"articleSection\":[\"Keine Kategorie\",\"Sicherheitsberatung\",\"Wirtschaftsspionage\",\"Youtube\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719\",\"url\":\"https:\/\/blog.gerhardlink.com\/?p=7719\",\"name\":\"Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\",\"datePublished\":\"2019-01-09T17:03:06+00:00\",\"dateModified\":\"2019-01-10T08:07:09+00:00\",\"description\":\"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gerhardlink.com\/?p=7719\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage\",\"url\":\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\",\"contentUrl\":\"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gerhardlink.com\/?p=7719#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.gerhardlink.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Methoden der Wirtschaftsspionage &#8211; Aktuelles von Sicherheitsberater #15\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gerhardlink.com\/#website\",\"url\":\"https:\/\/blog.gerhardlink.com\/\",\"name\":\"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry\",\"description\":\"von Gerhard Link\",\"publisher\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gerhardlink.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.gerhardlink.com\/#organization\",\"name\":\"Gerhard Link Sicherheitsberatung\",\"url\":\"https:\/\/blog.gerhardlink.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.gerhardlink.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/10\/Logo-Gerhard-Link-Sicherheitsberatung.jpg\",\"contentUrl\":\"https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/10\/Logo-Gerhard-Link-Sicherheitsberatung.jpg\",\"width\":902,\"height\":440,\"caption\":\"Gerhard Link Sicherheitsberatung\"},\"image\":{\"@id\":\"https:\/\/blog.gerhardlink.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Gerhard.Link.Sicherheitsberatung\",\"https:\/\/x.com\/Gerhard_Link\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gerhardlink.com\/#\/schema\/person\/c41a41c1a727e12227eaaef7453cfecc\",\"name\":\"Gerhard Link\",\"description\":\"Gerhard Link verf\u00fcgt \u00fcber 20 Jahre Knowhow im Bereich der organisatorischen, physischen und personellen Sicherheit. - Gerhard Link has over 20 years expertise in the field of organizational, physical and personnel security.\",\"sameAs\":[\"https:\/\/www.gerhardlink.com\"],\"url\":\"https:\/\/blog.gerhardlink.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry","description":"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gerhardlink.com\/?p=7719","og_locale":"de_DE","og_type":"article","og_title":"Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry","og_description":"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -","og_url":"https:\/\/blog.gerhardlink.com\/?p=7719","og_site_name":"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry","article_publisher":"https:\/\/www.facebook.com\/Gerhard.Link.Sicherheitsberatung","article_published_time":"2019-01-09T17:03:06+00:00","article_modified_time":"2019-01-10T08:07:09+00:00","og_image":[{"url":"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png","type":"","width":"","height":""}],"author":"Gerhard Link","twitter_card":"summary_large_image","twitter_creator":"@Gerhard_Link","twitter_site":"@Gerhard_Link","twitter_misc":{"Verfasst von":"Gerhard Link"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.gerhardlink.com\/?p=7719#article","isPartOf":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719"},"author":{"name":"Gerhard Link","@id":"https:\/\/blog.gerhardlink.com\/#\/schema\/person\/c41a41c1a727e12227eaaef7453cfecc"},"headline":"Methoden der Wirtschaftsspionage &#8211; Aktuelles von Sicherheitsberater #15","datePublished":"2019-01-09T17:03:06+00:00","dateModified":"2019-01-10T08:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719"},"wordCount":77,"publisher":{"@id":"https:\/\/blog.gerhardlink.com\/#organization"},"image":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage"},"thumbnailUrl":"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png","keywords":["angriffe","auswirkungen","bedrohungen","betrug","einbreccher","Einbruch","entwicklung","Gerhard Link","it-kriminalit\u00e4t","knildrahregxxx","kriminalit\u00e4t","nachrichtendienst","risikoanalyse","sabotage","saboteur","security","security advisor","security consulting","Sicherheit","sicherheitsanalyse","sicherheitsbegehung","Sicherheitsberatung","Sicherheitskonzept","Sicherheitsplanung","Sicherheitstechnik","sicherheitsverantwortlicher","spion","wahrscheinlichkeit","Wirtschaftskriminalit\u00e4t","Wirtschaftsspionage"],"articleSection":["Keine Kategorie","Sicherheitsberatung","Wirtschaftsspionage","Youtube"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/blog.gerhardlink.com\/?p=7719","url":"https:\/\/blog.gerhardlink.com\/?p=7719","name":"Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 - Themen und News aus der Sicherheitsbranche - Topics and news from the security industry","isPartOf":{"@id":"https:\/\/blog.gerhardlink.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage"},"image":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage"},"thumbnailUrl":"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png","datePublished":"2019-01-09T17:03:06+00:00","dateModified":"2019-01-10T08:07:09+00:00","description":"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry Methoden der Wirtschaftsspionage - Aktuelles von Sicherheitsberater #15 -","breadcrumb":{"@id":"https:\/\/blog.gerhardlink.com\/?p=7719#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gerhardlink.com\/?p=7719"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.gerhardlink.com\/?p=7719#primaryimage","url":"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png","contentUrl":"http:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/04\/1280px-YouTube_Logo_2017.svg_-1024x229.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gerhardlink.com\/?p=7719#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.gerhardlink.com\/"},{"@type":"ListItem","position":2,"name":"Methoden der Wirtschaftsspionage &#8211; Aktuelles von Sicherheitsberater #15"}]},{"@type":"WebSite","@id":"https:\/\/blog.gerhardlink.com\/#website","url":"https:\/\/blog.gerhardlink.com\/","name":"Themen und News aus der Sicherheitsbranche - Topics and news from the security industry","description":"von Gerhard Link","publisher":{"@id":"https:\/\/blog.gerhardlink.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gerhardlink.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/blog.gerhardlink.com\/#organization","name":"Gerhard Link Sicherheitsberatung","url":"https:\/\/blog.gerhardlink.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.gerhardlink.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/10\/Logo-Gerhard-Link-Sicherheitsberatung.jpg","contentUrl":"https:\/\/blog.gerhardlink.com\/wp-content\/uploads\/2018\/10\/Logo-Gerhard-Link-Sicherheitsberatung.jpg","width":902,"height":440,"caption":"Gerhard Link Sicherheitsberatung"},"image":{"@id":"https:\/\/blog.gerhardlink.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Gerhard.Link.Sicherheitsberatung","https:\/\/x.com\/Gerhard_Link"]},{"@type":"Person","@id":"https:\/\/blog.gerhardlink.com\/#\/schema\/person\/c41a41c1a727e12227eaaef7453cfecc","name":"Gerhard Link","description":"Gerhard Link verf\u00fcgt \u00fcber 20 Jahre Knowhow im Bereich der organisatorischen, physischen und personellen Sicherheit. - Gerhard Link has over 20 years expertise in the field of organizational, physical and personnel security.","sameAs":["https:\/\/www.gerhardlink.com"],"url":"https:\/\/blog.gerhardlink.com\/?author=1"}]}},"views":279,"_links":{"self":[{"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/posts\/7719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7719"}],"version-history":[{"count":3,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/posts\/7719\/revisions"}],"predecessor-version":[{"id":7724,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=\/wp\/v2\/posts\/7719\/revisions\/7724"}],"wp:attachment":[{"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gerhardlink.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}