{"id":1189,"date":"2024-08-02T14:51:10","date_gmt":"2024-08-02T14:51:10","guid":{"rendered":"https:\/\/battlestory.org\/uncategorized\/the-dark-reality-of-hacked-hotties-phenomenon\/"},"modified":"2024-08-02T14:51:10","modified_gmt":"2024-08-02T14:51:10","slug":"the-dark-reality-of-hacked-hotties-phenomenon","status":"publish","type":"post","link":"https:\/\/battlestory.org\/tr\/kadinlar-kanli\/hacklenmis-guzellerin-karanlik-gercekligi-fenomeni\/","title":{"rendered":"Hacklenmi\u015f G\u00fczeller Fenomeninin Karanl\u0131k Ger\u00e7ekli\u011fi"},"content":{"rendered":"<p>\u00dcnl\u00fclerin d\u00fcnyas\u0131 genellikle ihti\u015fam ve m\u00fckemmellik alan\u0131 olarak kabul edilir. Ancak \u015f\u00f6hret ve hayranl\u0131\u011f\u0131n alt\u0131nda daha karanl\u0131k bir ger\u00e7eklik yatmaktad\u0131r. Son y\u0131llar\u0131n en rahats\u0131z edici trendlerinden biri de &quot;hacklenmi\u015f g\u00fczeller&quot; fenomeni; bu terim, \u00fcnl\u00fclerin, modellerin ve di\u011fer kamu fig\u00fcrlerinin \u00f6zel, genellikle \u00e7\u0131plak g\u00f6r\u00fcnt\u00fclerinin ve videolar\u0131n\u0131n r\u0131zalar\u0131 olmadan s\u0131zd\u0131r\u0131lmas\u0131n\u0131 ifade eder.<\/p>\n<p>\u015eok Edici Ger\u00e7ek<\/p>\n<p>Bir sabah uyand\u0131\u011f\u0131n\u0131zda en \u00f6zel anlar\u0131n\u0131z\u0131n internette t\u00fcm d\u00fcnyan\u0131n g\u00f6rebilece\u011fi \u015fekilde yay\u0131nland\u0131\u011f\u0131n\u0131 hayal edin. Bu, bir\u00e7ok \u00fcnl\u00fc i\u00e7in ac\u0131mas\u0131z bir ger\u00e7ekli\u011fe d\u00f6n\u00fc\u015fm\u00fc\u015f bir kabus senaryosu. Ki\u015fisel mahremiyetlerinin ihlali sadece g\u00fcvenlerinin zedelenmesi de\u011fil; ayn\u0131 zamanda ruh sa\u011fl\u0131klar\u0131 ve ki\u015fisel ya\u015famlar\u0131 \u00fczerinde uzun s\u00fcreli etkileri olabilecek travmatik bir deneyimdir.<\/p>\n<p>\u00d6rne\u011fin, y\u0131llar boyunca man\u015fetlere \u00e7\u0131kan \u00e7ok say\u0131da s\u0131zd\u0131r\u0131lm\u0131\u015f \u00e7\u0131plak foto\u011fraf ve hacklenmi\u015f ki\u015fisel foto\u011fraf vakas\u0131n\u0131 ele alal\u0131m. Jennifer Lawrence, Kate Upton ve daha bir\u00e7ok isim bu t\u00fcr siber istismar\u0131n kurban\u0131 oldu. Sonras\u0131nda genellikle kamuoyunun sempatisi ve r\u00f6ntgenci merak\u0131 bir arada ya\u015fan\u0131rken, kurbanlar mahremiyetlerini ve onurlar\u0131n\u0131 geri kazanma gibi zorlu bir g\u00f6revle kar\u015f\u0131 kar\u015f\u0131ya kal\u0131yorlar.<\/p>\n<h2>S\u0131z\u0131nt\u0131n\u0131n Anatomisi<\/h2>\n<p>Bu \u00f6zel g\u00f6r\u00fcnt\u00fclerin ve videolar\u0131n nas\u0131l s\u0131zd\u0131r\u0131ld\u0131\u011f\u0131 s\u00fcreci, hem b\u00fcy\u00fcleyici hem de rahats\u0131z edici. Genellikle, kurbanlar\u0131n ki\u015fisel cihazlar\u0131na veya bulut depolama alanlar\u0131na s\u0131zmakla ba\u015flar. Failler eri\u015fim sa\u011flad\u0131ktan sonra, hassas i\u00e7eri\u011fi kendi tatminleri veya maddi kazan\u00e7lar\u0131 i\u00e7in \u00e7evrimi\u00e7i olarak s\u0131zd\u0131rarak kullan\u0131rlar.<\/p>\n<ul>\n<li>\u00dcnl\u00fclerin \u00e7\u0131plak foto\u011fraflar\u0131n\u0131n s\u0131zd\u0131r\u0131lmas\u0131 s\u0131k kar\u015f\u0131la\u015f\u0131lan bir durum ve bu g\u00f6r\u00fcnt\u00fcler sosyal medyada ve \u00f6zel internet sitelerinde h\u0131zla yay\u0131l\u0131yor.<\/li>\n<li>Ma\u011fdurlar, kamuoyu \u00f6n\u00fcnde utanma, duygusal travma ve hatta mesleki sonu\u00e7lar da dahil olmak \u00fczere, ya\u015fananlar\u0131n sonu\u00e7lar\u0131yla ba\u015fa \u00e7\u0131kmak zorunda kal\u0131yorlar.<\/li>\n<li>Bu konu siber g\u00fcvenlik, ki\u015fisel gizlilik ve bu t\u00fcr i\u00e7eriklerin t\u00fcketimi ve payla\u015f\u0131m\u0131n\u0131n eti\u011fi hakk\u0131nda \u00f6nemli sorular\u0131 g\u00fcndeme getiriyor.<\/li>\n<\/ul>\n<h3>R\u00f6ntgencilik K\u00fclt\u00fcr\u00fc<\/h3>\n<p>&quot;Hacklenmi\u015f g\u00fczeller&quot; fenomeni, daha geni\u015f bir k\u00fclt\u00fcrel soruna da i\u015faret ediyor: kolektif r\u00f6ntgencilik e\u011filimlerimiz. Kamusal ve \u00f6zel ya\u015fam aras\u0131ndaki s\u0131n\u0131rlar\u0131n giderek bulan\u0131kla\u015ft\u0131\u011f\u0131 bir \u00e7a\u011fda, \u00fcnl\u00fcler hakk\u0131nda \u00f6zel bilgilere duyulan i\u015ftah hi\u00e7 bu kadar b\u00fcy\u00fck olmam\u0131\u015ft\u0131.<\/p>\n<p>Peki, toplum olarak neden bu t\u00fcr i\u00e7erikleri t\u00fcketiyoruz? Sadece merak m\u0131, yoksa daha derin bir anlam m\u0131 ta\u015f\u0131yor? S\u0131zd\u0131r\u0131lm\u0131\u015f \u00f6zel g\u00f6r\u00fcnt\u00fcleri veya hacklenip s\u0131zd\u0131r\u0131lan modelleri izlemek, ba\u015fkalar\u0131n\u0131n mahrem hayatlar\u0131n\u0131 metala\u015ft\u0131ran bir k\u00fclt\u00fcre kat\u0131lman\u0131n bir bi\u00e7imi olarak g\u00f6r\u00fclebilir.<\/p>\n<p>Empatiye \u00c7a\u011fr\u0131<\/p>\n<p>Bu karma\u015f\u0131k sorunu ele al\u0131rken, man\u015fetlerin ard\u0131ndaki insani etkiyi g\u00f6z \u00f6n\u00fcnde bulundurmak \u00e7ok \u00f6nemlidir. Bu s\u0131z\u0131nt\u0131lar\u0131n kurbanlar\u0131 sadece \u00fcnl\u00fcler de\u011fil; g\u00fcvenleri k\u0131r\u0131lm\u0131\u015f ve mahremiyetleri ihlal edilmi\u015f bireylerdir.<\/p>\n<p>Peki, \u00e7\u00f6z\u00fcm nedir? Kolay bir cevap olmasa da, sayg\u0131 ve empati k\u00fclt\u00fcr\u00fcn\u00fc te\u015fvik etmek do\u011fru y\u00f6nde at\u0131lm\u0131\u015f bir ad\u0131md\u0131r. Bu, daha g\u00fc\u00e7l\u00fc siber g\u00fcvenlik \u00f6nlemlerini savunmay\u0131, gizlilik ihlallerinin ma\u011fdurlar\u0131na destek vermeyi ve kendi t\u00fcketim al\u0131\u015fkanl\u0131klar\u0131m\u0131z \u00fczerinde d\u00fc\u015f\u00fcnmeyi i\u00e7erir.<\/p>\n<h4>\u0130leriye Giden Yol<\/h4>\n<p>&quot;Hacklenmi\u015f g\u00fczeller&quot; sorunu, teknolojik, sosyal ve etik boyutlar\u0131 i\u00e7eren \u00e7ok y\u00f6nl\u00fc bir konudur. \u0130lerlerken, bu konuyu hem karma\u015f\u0131kl\u0131\u011f\u0131 hem de \u015fefkatli bir yan\u0131t ihtiyac\u0131n\u0131 g\u00f6z \u00f6n\u00fcnde bulundurarak, d\u00fc\u015f\u00fcnceli bir \u015fekilde ele almak \u00e7ok \u00f6nemlidir.<\/p>\n<p>Sonu\u00e7 olarak, &quot;hacklenen g\u00fczeller&quot; hikayesi, \u015f\u00f6hret, mahremiyet ve ortak insanl\u0131\u011f\u0131m\u0131z konusunda daha incelikli bir anlay\u0131\u015fa duyulan ihtiyac\u0131 hat\u0131rlat\u0131yor. Bu, ba\u015fkalar\u0131n\u0131n \u00f6zel hayatlar\u0131na y\u00f6nelik davran\u0131\u015flar\u0131m\u0131z ve tutumlar\u0131m\u0131z hakk\u0131nda ele\u015ftirel d\u00fc\u015f\u00fcnmeye bizi zorlayan bir anlat\u0131.<\/p>\n<p>Sonu\u00e7 olarak, &quot;hacklenen g\u00fczeller&quot; hakk\u0131ndaki tart\u0131\u015fma sadece s\u0131zd\u0131r\u0131lan g\u00f6r\u00fcnt\u00fclerin ve videolar\u0131n sansasyonel y\u00f6n\u00fcyle ilgili de\u011fil; bu ihlallerden etkilenen ger\u00e7ek insanlarla ve gizlili\u011fe sayg\u0131 duyan ve empatiyi te\u015fvik eden bir k\u00fclt\u00fcr\u00fc geli\u015ftirme konusundaki kolektif sorumlulu\u011fumuzla ilgili.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00dcnl\u00fclerin \u00f6zel g\u00f6r\u00fcnt\u00fc ve videolar\u0131n\u0131n r\u0131zalar\u0131 olmadan s\u0131zd\u0131r\u0131lmas\u0131n\u0131n ard\u0131ndaki \u015fok edici ger\u00e7e\u011fi ve bunun hayatlar\u0131 \u00fczerindeki y\u0131k\u0131c\u0131 etkisini ke\u015ffedin.<\/p>","protected":false},"author":1,"featured_media":1970,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-1189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-women-bloody"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beneath the Glamour: The Dark Reality of Hacked Celebrities<\/title>\n<meta name=\"description\" content=\"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/battlestory.org\/tr\/kadinlar-kanli\/hacklenmis-guzellerin-karanlik-gercekligi-fenomeni\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beneath the Glamour: The Dark Reality of Hacked Celebrities\" \/>\n<meta property=\"og:description\" content=\"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/battlestory.org\/tr\/kadinlar-kanli\/hacklenmis-guzellerin-karanlik-gercekligi-fenomeni\/\" \/>\n<meta property=\"og:site_name\" content=\"Independent catalog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T14:51:10+00:00\" \/>\n<meta name=\"author\" content=\"battlestory\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"battlestory\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/\"},\"author\":{\"name\":\"battlestory\",\"@id\":\"https:\/\/battlestory.org\/#\/schema\/person\/c2f706e81999507735d6c407565a5751\"},\"headline\":\"The Dark Reality of Hacked Hotties Phenomenon\",\"datePublished\":\"2024-08-02T14:51:10+00:00\",\"dateModified\":\"2024-08-02T14:51:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/\"},\"wordCount\":631,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/battlestory.org\/#organization\"},\"articleSection\":[\"Women in Bloody Battles\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/\",\"url\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/\",\"name\":\"Beneath the Glamour: The Dark Reality of Hacked Celebrities\",\"isPartOf\":{\"@id\":\"https:\/\/battlestory.org\/#website\"},\"datePublished\":\"2024-08-02T14:51:10+00:00\",\"dateModified\":\"2024-08-02T14:51:10+00:00\",\"description\":\"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.\",\"breadcrumb\":{\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/battlestory.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dark Reality of Hacked Hotties Phenomenon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/battlestory.org\/#website\",\"url\":\"https:\/\/battlestory.org\/\",\"name\":\"Independent catalog\",\"description\":\"Best adult catalog of the most popular sex video chats and chatroulettes on the Internet.  At BattleStory, we&#039;ve curated the finest selection of chat roulette experiences for those who like to take control of their own destiny. Dive into a wide array of blogs, articles, and even groundbreaking scientific publications that delve deep into the world of online chatting.\",\"publisher\":{\"@id\":\"https:\/\/battlestory.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/battlestory.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/battlestory.org\/#organization\",\"name\":\"Independent catalog\",\"url\":\"https:\/\/battlestory.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/battlestory.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/battlestory.org\/wp-content\/uploads\/2023\/08\/logo-1.png\",\"contentUrl\":\"https:\/\/battlestory.org\/wp-content\/uploads\/2023\/08\/logo-1.png\",\"width\":220,\"height\":27,\"caption\":\"Independent catalog\"},\"image\":{\"@id\":\"https:\/\/battlestory.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/battlestory.org\/#\/schema\/person\/c2f706e81999507735d6c407565a5751\",\"name\":\"battlestory\",\"sameAs\":[\"https:\/\/battlestory.org\"],\"url\":\"https:\/\/battlestory.org\/tr\/author\/battlestory\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beneath the Glamour: The Dark Reality of Hacked Celebrities","description":"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/battlestory.org\/tr\/kadinlar-kanli\/hacklenmis-guzellerin-karanlik-gercekligi-fenomeni\/","og_locale":"tr_TR","og_type":"article","og_title":"Beneath the Glamour: The Dark Reality of Hacked Celebrities","og_description":"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.","og_url":"https:\/\/battlestory.org\/tr\/kadinlar-kanli\/hacklenmis-guzellerin-karanlik-gercekligi-fenomeni\/","og_site_name":"Independent catalog","article_published_time":"2024-08-02T14:51:10+00:00","author":"battlestory","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"battlestory","Tahmini okuma s\u00fcresi":"3 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#article","isPartOf":{"@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/"},"author":{"name":"battlestory","@id":"https:\/\/battlestory.org\/#\/schema\/person\/c2f706e81999507735d6c407565a5751"},"headline":"The Dark Reality of Hacked Hotties Phenomenon","datePublished":"2024-08-02T14:51:10+00:00","dateModified":"2024-08-02T14:51:10+00:00","mainEntityOfPage":{"@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/"},"wordCount":631,"commentCount":2,"publisher":{"@id":"https:\/\/battlestory.org\/#organization"},"articleSection":["Women in Bloody Battles"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/","url":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/","name":"Beneath the Glamour: The Dark Reality of Hacked Celebrities","isPartOf":{"@id":"https:\/\/battlestory.org\/#website"},"datePublished":"2024-08-02T14:51:10+00:00","dateModified":"2024-08-02T14:51:10+00:00","description":"Discover the shocking truth behind the non-consensual leaking of intimate images and videos of celebrities, and the devastating impact on their lives.","breadcrumb":{"@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/battlestory.org\/women-bloody\/the-dark-reality-of-hacked-hotties-phenomenon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/battlestory.org\/"},{"@type":"ListItem","position":2,"name":"The Dark Reality of Hacked Hotties Phenomenon"}]},{"@type":"WebSite","@id":"https:\/\/battlestory.org\/#website","url":"https:\/\/battlestory.org\/","name":"Independent catalog","description":"Best adult catalog of the most popular sex video chats and chatroulettes on the Internet.  At BattleStory, we&#039;ve curated the finest selection of chat roulette experiences for those who like to take control of their own destiny. Dive into a wide array of blogs, articles, and even groundbreaking scientific publications that delve deep into the world of online chatting.","publisher":{"@id":"https:\/\/battlestory.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/battlestory.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/battlestory.org\/#organization","name":"Independent catalog","url":"https:\/\/battlestory.org\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/battlestory.org\/#\/schema\/logo\/image\/","url":"https:\/\/battlestory.org\/wp-content\/uploads\/2023\/08\/logo-1.png","contentUrl":"https:\/\/battlestory.org\/wp-content\/uploads\/2023\/08\/logo-1.png","width":220,"height":27,"caption":"Independent catalog"},"image":{"@id":"https:\/\/battlestory.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/battlestory.org\/#\/schema\/person\/c2f706e81999507735d6c407565a5751","name":"battlestory","sameAs":["https:\/\/battlestory.org"],"url":"https:\/\/battlestory.org\/tr\/author\/battlestory\/"}]}},"_links":{"self":[{"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/posts\/1189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/comments?post=1189"}],"version-history":[{"count":0,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/posts\/1189\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/media\/1970"}],"wp:attachment":[{"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/media?parent=1189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/categories?post=1189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/battlestory.org\/tr\/wp-json\/wp\/v2\/tags?post=1189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}