{"id":12055,"date":"2024-10-04T19:59:47","date_gmt":"2024-10-04T16:59:47","guid":{"rendered":"https:\/\/diagnozabam.ro\/sfaturi\/?p=12055"},"modified":"2025-04-02T12:28:54","modified_gmt":"2025-04-02T09:28:54","slug":"vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii","status":"publish","type":"post","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/","title":{"rendered":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii"},"content":{"rendered":"<h1>Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii<\/h1>\n<p><img decoding=\"async\" class=\"size-full wp-image-12056 aligncenter\" src=\"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/Cat-de-sigur-e-Tor-780x470-1.webp\" alt=\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Cat de sigur e Tor 780x470 1\" width=\"780\" height=\"470\" title=\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Cat de sigur e Tor 780x470 1\"><\/p>\n<p>Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi ale re\u021belei. Autorit\u0103\u021bile, inclusiv cele germane, au reu\u0219it s\u0103 identifice utilizatori ai re\u021belei Tor folosind o tehnic\u0103 denumit\u0103 \u201etiming analysis\u201d, care p\u00e2n\u0103 recent era considerat\u0103 doar teoretic posibil\u0103.<\/p>\n<h3>Cum Func\u021bioneaz\u0103 Tor?<\/h3>\n<p>Tor (The Onion Router) func\u021bioneaz\u0103 prin redirec\u021bionarea traficului utilizatorilor prin multiple servere, fiecare aplic\u00e2nd un strat suplimentar de criptare, pentru a face dificil\u0103 urm\u0103rirea originii pachetelor de date. Sistemul se bazeaz\u0103 pe:<\/p>\n<ul>\n<li><strong>Noduri de intrare, intermediare \u0219i ie\u0219ire<\/strong> care anonimizeaz\u0103 traseul traficului.<\/li>\n<li><strong>Tor Browser<\/strong>, care permite accesul la re\u021bea f\u0103r\u0103 a l\u0103sa urme vizibile.<\/li>\n<li><strong>Directory Authorities<\/strong>, ce men\u021bin o list\u0103 actualizat\u0103 a nodurilor de \u00eencredere.<\/li>\n<li><strong>Serviciile .onion<\/strong>, care asigur\u0103 anonimatul at\u00e2t pentru utilizatori, c\u00e2t \u0219i pentru furnizorii de con\u021binut.<\/li>\n<\/ul>\n<h3>Vulnerabilitatea prin \u201eTiming Analysis\u201d<\/h3>\n<p>Aceast\u0103 tehnic\u0103 permite corelarea pachetelor de date criptate cu o adres\u0103 IP real\u0103, chiar dac\u0103 con\u021binutul comunic\u0103rii r\u0103m\u00e2ne criptat. De\u0219i atacul nu necesit\u0103 exploatarea direct\u0103 a vulnerabilit\u0103\u021bilor software, el poate dezv\u0103lui cine comunic\u0103 pe Tor, baz\u00e2ndu-se pe analiza metadatelor \u0219i tiparelor de trafic.<\/p>\n<h3>R\u0103spunsul Echipei Tor<\/h3>\n<p>Tor Project a confirmat c\u0103 atacul a vizat un utilizator care folosea o versiune veche a aplica\u021biei Ricochet, f\u0103r\u0103 m\u0103surile de securitate introduse ulterior, cum ar fi protec\u021biile Vanguards-lite. Totu\u0219i, echipa a asigurat c\u0103 re\u021beaua Tor \u0219i browserul r\u0103m\u00e2n sigure pentru utilizatori, cu condi\u021bia de a men\u021bine software-ul actualizat.<\/p>\n<h3>Centralizarea Nodurilor \u0219i Alte Riscuri<\/h3>\n<p>Un alt pericol pentru securitatea Tor este centralizarea nodurilor \u00een m\u00e2inile unui num\u0103r redus de operatori, ceea ce poate compromite securitatea \u00eentregii re\u021bele. \u00centr-o re\u021bea cu un num\u0103r constant de noduri \u0219i distribu\u021bie limitat\u0103, anonimatul utilizatorilor poate fi afectat.<\/p>\n<h3>Concluzie<\/h3>\n<p>De\u0219i re\u021beaua Tor continu\u0103 s\u0103 ofere anonimitate pentru utilizatori, cercet\u0103rile recente ridic\u0103 \u00eentreb\u0103ri cu privire la securitatea deplin\u0103 a acesteia. Actualizarea constant\u0103 a software-ului \u0219i diversificarea nodurilor r\u0103m\u00e2n esen\u021biale pentru men\u021binerea protec\u021biei.<\/p>\n<p><a href=\"https:\/\/zonait.ro\/atacurile-timing-analysis-confidentialitate-tor\/\">Sursa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi&hellip;<\/p>\n","protected":false},"author":1,"featured_media":12056,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[357],"tags":[11783,11789,11786,11787,11785,11784,11782,11788,11781],"class_list":["post-12055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-stiri","tag-anonimat-online","tag-atac-anonimat","tag-edward-snowden","tag-protectia-datelor-criptate","tag-ricochet-aplicatie","tag-securitate-retea-tor","tag-timing-analysis","tag-tor-project","tag-tor-vulnerabilitate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Diagnoza BAM<\/title>\n<meta name=\"description\" content=\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/\" \/>\n<meta property=\"og:site_name\" content=\"Diagnoza BAM\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/diagnozabam\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T16:59:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T09:28:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"470\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Bejenaru Alexandru Ionut\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bejenaru Alexandru Ionut\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/\"},\"author\":{\"name\":\"Bejenaru Alexandru Ionut\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#\\\/schema\\\/person\\\/77202adf825f4528d9ba9ab5b4ffafec\"},\"headline\":\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii\",\"datePublished\":\"2024-10-04T16:59:47+00:00\",\"dateModified\":\"2025-04-02T09:28:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/\"},\"wordCount\":383,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp\",\"keywords\":[\"anonimat online\",\"atac anonimat\",\"Edward Snowden\",\"protec\u021bia datelor criptate\",\"Ricochet aplica\u021bie\",\"securitate re\u021bea Tor\",\"timing analysis\",\"Tor Project\",\"Tor vulnerabilitate\"],\"articleSection\":[\"\u0218tiri\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/\",\"name\":\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Diagnoza BAM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp\",\"datePublished\":\"2024-10-04T16:59:47+00:00\",\"dateModified\":\"2025-04-02T09:28:54+00:00\",\"description\":\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi&hellip;\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#primaryimage\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp\",\"contentUrl\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp\",\"width\":780,\"height\":470,\"caption\":\"vulnerabilitatea retelei tor securitatea anonimatului sub semnul intrebarii mfrh original\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/ro\\\/blog\\\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#website\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/\",\"name\":\"Diagnoza BAM\",\"description\":\"Independent Auto Diagnostics, Tech Analysis and Smart Insights\",\"publisher\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#organization\"},\"alternateName\":\"DBAM\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#organization\",\"name\":\"Diagnoza BAM\",\"alternateName\":\"DBAM\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-diagnoza-bam-imagine.webp\",\"contentUrl\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-diagnoza-bam-imagine.webp\",\"width\":512,\"height\":512,\"caption\":\"Diagnoza BAM\"},\"image\":{\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/diagnozabam\",\"https:\\\/\\\/mastodon.social\\\/@diagnozabam\",\"https:\\\/\\\/bsky.app\\\/profile\\\/did:plc:f4cmgfa3nv33bch7p3wgwchr\",\"https:\\\/\\\/www.tumblr.com\\\/diagbam\"],\"description\":\"Independent publishing platform focused on automotive diagnostics, OBD2 analysis, repair cost breakdowns, technology insights and practical technical guides.\",\"email\":\"redactie@diagnozabam.ro\",\"foundingDate\":\"2023-02-16\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/#\\\/schema\\\/person\\\/77202adf825f4528d9ba9ab5b4ffafec\",\"name\":\"Bejenaru Alexandru Ionut\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g\",\"caption\":\"Bejenaru Alexandru Ionut\"},\"sameAs\":[\"https:\\\/\\\/diagnozabam.ro\"],\"honorificPrefix\":\"Mr.\",\"birthDate\":\"1997-12-23\",\"url\":\"https:\\\/\\\/diagnozabam.ro\\\/sfaturi\\\/blog\\\/author\\\/bejenaru-alexandru-ionut\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Diagnoza BAM","description":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/","og_locale":"ro_RO","og_type":"article","og_title":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii","og_description":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi&hellip;","og_url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/","og_site_name":"Diagnoza BAM","article_publisher":"https:\/\/www.facebook.com\/diagnozabam","article_published_time":"2024-10-04T16:59:47+00:00","article_modified_time":"2025-04-02T09:28:54+00:00","og_image":[{"width":780,"height":470,"url":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii.webp","type":"image\/webp"}],"author":"Bejenaru Alexandru Ionut","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"Bejenaru Alexandru Ionut","Timp estimat pentru citire":"2 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#article","isPartOf":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/"},"author":{"name":"Bejenaru Alexandru Ionut","@id":"https:\/\/diagnozabam.ro\/sfaturi\/#\/schema\/person\/77202adf825f4528d9ba9ab5b4ffafec"},"headline":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii","datePublished":"2024-10-04T16:59:47+00:00","dateModified":"2025-04-02T09:28:54+00:00","mainEntityOfPage":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/"},"wordCount":383,"commentCount":0,"publisher":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/#organization"},"image":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#primaryimage"},"thumbnailUrl":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp","keywords":["anonimat online","atac anonimat","Edward Snowden","protec\u021bia datelor criptate","Ricochet aplica\u021bie","securitate re\u021bea Tor","timing analysis","Tor Project","Tor vulnerabilitate"],"articleSection":["\u0218tiri"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/#organization"}},{"@type":"WebPage","@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/","url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/","name":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii - Diagnoza BAM","isPartOf":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/#website"},"primaryImageOfPage":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#primaryimage"},"image":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#primaryimage"},"thumbnailUrl":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp","datePublished":"2024-10-04T16:59:47+00:00","dateModified":"2025-04-02T09:28:54+00:00","description":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii Tor, un instrument consacrat pentru protejarea anonimatului online, a devenit subiect de \u00eengrijorare dup\u0103 dezv\u0103luirile unor echipe jurnalistice care au descoperit vulnerabilit\u0103\u021bi&hellip;","breadcrumb":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#primaryimage","url":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp","contentUrl":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp","width":780,"height":470,"caption":"vulnerabilitatea retelei tor securitatea anonimatului sub semnul intrebarii mfrh original"},{"@type":"BreadcrumbList","@id":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/diagnozabam.ro\/sfaturi\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilitatea Re\u021belei Tor: Securitatea Anonimatului Sub Semnul \u00centreb\u0103rii"}]},{"@type":"WebSite","@id":"https:\/\/diagnozabam.ro\/sfaturi\/#website","url":"https:\/\/diagnozabam.ro\/sfaturi\/","name":"Diagnoza BAM","description":"Independent Auto Diagnostics, Tech Analysis and Smart Insights","publisher":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/#organization"},"alternateName":"DBAM","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/diagnozabam.ro\/sfaturi\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/diagnozabam.ro\/sfaturi\/#organization","name":"Diagnoza BAM","alternateName":"DBAM","url":"https:\/\/diagnozabam.ro\/sfaturi\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/diagnozabam.ro\/sfaturi\/#\/schema\/logo\/image\/","url":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/11\/logo-diagnoza-bam-imagine.webp","contentUrl":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/11\/logo-diagnoza-bam-imagine.webp","width":512,"height":512,"caption":"Diagnoza BAM"},"image":{"@id":"https:\/\/diagnozabam.ro\/sfaturi\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/diagnozabam","https:\/\/mastodon.social\/@diagnozabam","https:\/\/bsky.app\/profile\/did:plc:f4cmgfa3nv33bch7p3wgwchr","https:\/\/www.tumblr.com\/diagbam"],"description":"Independent publishing platform focused on automotive diagnostics, OBD2 analysis, repair cost breakdowns, technology insights and practical technical guides.","email":"redactie@diagnozabam.ro","foundingDate":"2023-02-16"},{"@type":"Person","@id":"https:\/\/diagnozabam.ro\/sfaturi\/#\/schema\/person\/77202adf825f4528d9ba9ab5b4ffafec","name":"Bejenaru Alexandru Ionut","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/secure.gravatar.com\/avatar\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96634b44a266a571c59a5e82fc6f12edfb6876914735dbc57aa2348d11395470?s=96&d=mm&r=g","caption":"Bejenaru Alexandru Ionut"},"sameAs":["https:\/\/diagnozabam.ro"],"honorificPrefix":"Mr.","birthDate":"1997-12-23","url":"https:\/\/diagnozabam.ro\/sfaturi\/blog\/author\/bejenaru-alexandru-ionut\/"}]}},"lang":"ro","translations":{"ro":12055},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/10\/vulnerabilitatea-retelei-tor-securitatea-anonimatului-sub-semnul-intrebarii-mfrh-original.webp","jetpack-related-posts":[{"id":11714,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitatile-retelelor-5g-si-impactul-asupra-securitatii-dispozitivelor\/","url_meta":{"origin":12055,"position":0},"title":"Vulnerabilit\u0103\u021bile Re\u021belelor 5G \u0219i Impactul Asupra Securit\u0103\u021bii Dispozitivelor","author":"Bejenaru Alexandru Ionut","date":"15 octombrie 2024","format":false,"excerpt":"Vulnerabilit\u0103\u021bile Re\u021belelor 5G \u0219i Impactul Asupra Securit\u0103\u021bii Dispozitivelor La cea mai recent\u0103 conferin\u021b\u0103 Black Hat din Las Vegas, cercet\u0103torii de la Pennsylvania State University au prezentat un studiu amplu privind\u2026","rel":"","context":"\u00cen \u201e\u0218tiri\u201d","block_context":{"text":"\u0218tiri","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/stiri\/"},"img":{"alt_text":"vulnerabilitatile retelelor 5g si impactul asupra securitatii dispozitivelor mfrh original","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitatile-retelelor-5g-si-impactul-asupra-securitatii-dispozitivelor-mfrh-original.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitatile-retelelor-5g-si-impactul-asupra-securitatii-dispozitivelor-mfrh-original.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitatile-retelelor-5g-si-impactul-asupra-securitatii-dispozitivelor-mfrh-original.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitatile-retelelor-5g-si-impactul-asupra-securitatii-dispozitivelor-mfrh-original.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":9798,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/atentie-masinile-de-spalat-cu-wi-fi-consuma-gb-de-date-descopera-cum-conexiunea-la-internet-poate-creste-costurile-nebanuite\/","url_meta":{"origin":12055,"position":1},"title":"ATEN\u021aIE: Ma\u0219inile de Sp\u0103lat cu Wi-Fi Consum\u0103 GB de Date! Descoper\u0103 Cum Conexiunea la Internet Poate Cre\u0219te Costurile Neb\u0103nuite.","author":"Bejenaru Alexandru Ionut","date":"29 ianuarie 2024","format":false,"excerpt":"Electrocasnicele conectate la internet, denumite \u0219i \"smart appliances\", aduc cu sine avantaje precum controlul de la distan\u021b\u0103 \u0219i automatizarea func\u021biilor. Cu toate acestea, exist\u0103 \u0219i poten\u021biale riscuri \u0219i provoc\u0103ri asociate\u2026","rel":"","context":"\u00cen \u201eIT-RO\u201d","block_context":{"text":"IT-RO","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/it\/"},"img":{"alt_text":"atentie masinile de spalat cu wi fi consuma gb de date descopera cum conexiunea la internet poate creste costurile nebanuite","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/01\/atentie-masinile-de-spalat-cu-wi-fi-consuma-gb-de-date-descopera-cum-conexiunea-la-internet-poate-creste-costurile-nebanuite.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/01\/atentie-masinile-de-spalat-cu-wi-fi-consuma-gb-de-date-descopera-cum-conexiunea-la-internet-poate-creste-costurile-nebanuite.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/01\/atentie-masinile-de-spalat-cu-wi-fi-consuma-gb-de-date-descopera-cum-conexiunea-la-internet-poate-creste-costurile-nebanuite.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/01\/atentie-masinile-de-spalat-cu-wi-fi-consuma-gb-de-date-descopera-cum-conexiunea-la-internet-poate-creste-costurile-nebanuite.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":13052,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/controlerul-usb-c-al-iphone-15-vulnerabilitati-si-riscuri-identificate-la-38c3\/","url_meta":{"origin":12055,"position":2},"title":"Controlerul USB-C al iPhone 15: Vulnerabilit\u0103\u021bi \u0219i riscuri identificate la 38C3","author":"Bejenaru Alexandru Ionut","date":"26 ianuarie 2025","format":false,"excerpt":"Controlerul USB-C al iPhone 15: Vulnerabilit\u0103\u021bi \u0219i riscuri identificate la 38C3 Controlerul USB-C al iPhone 15, denumit ACE3, a devenit subiectul unei demonstra\u021bii tehnice \u00een cadrul conferin\u021bei de securitate Chaos\u2026","rel":"","context":"\u00cen \u201e\u0218tiri\u201d","block_context":{"text":"\u0218tiri","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/stiri\/"},"img":{"alt_text":"controlerul usb c al iphone 15 vulnerabilitati si riscuri identificate la 38c3 mfrh original","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/01\/controlerul-usb-c-al-iphone-15-vulnerabilitati-si-riscuri-identificate-la-38c3-mfrh-original.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/01\/controlerul-usb-c-al-iphone-15-vulnerabilitati-si-riscuri-identificate-la-38c3-mfrh-original.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/01\/controlerul-usb-c-al-iphone-15-vulnerabilitati-si-riscuri-identificate-la-38c3-mfrh-original.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/01\/controlerul-usb-c-al-iphone-15-vulnerabilitati-si-riscuri-identificate-la-38c3-mfrh-original.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11840,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/vulnerabilitate-critica-pe-telefoane-pixel-aplicatia-showcase-apk-permite-atacuri-de-tip-man-in-the-middle\/","url_meta":{"origin":12055,"position":3},"title":"Vulnerabilitate Critic\u0103 pe Telefoane Pixel: Aplica\u021bia Showcase.apk Permite Atacuri de Tip Man-in-the-Middle","author":"Bejenaru Alexandru Ionut","date":"19 septembrie 2024","format":false,"excerpt":"Vulnerabilitate Critic\u0103 pe Telefoane Pixel: Aplica\u021bia Showcase.apk Permite Atacuri de Tip Man-in-the-Middle O vulnerabilitate major\u0103 afecteaz\u0103 milioane de telefoane Pixel, produse de Google, conform unei descoperiri recente a platformei de\u2026","rel":"","context":"\u00cen \u201e\u0218tiri\u201d","block_context":{"text":"\u0218tiri","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/stiri\/"},"img":{"alt_text":"vulnerabilitate critica pe telefoane pixel aplicatia showcaseapk permite atacuri de tip man in the middle mfrh original","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitate-critica-pe-telefoane-pixel-aplicatia-showcaseapk-permite-atacuri-de-tip-man-in-the-middle-mfrh-original.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitate-critica-pe-telefoane-pixel-aplicatia-showcaseapk-permite-atacuri-de-tip-man-in-the-middle-mfrh-original.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitate-critica-pe-telefoane-pixel-aplicatia-showcaseapk-permite-atacuri-de-tip-man-in-the-middle-mfrh-original.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/08\/vulnerabilitate-critica-pe-telefoane-pixel-aplicatia-showcaseapk-permite-atacuri-de-tip-man-in-the-middle-mfrh-original.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10883,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/windows-totalrecall\/","url_meta":{"origin":12055,"position":4},"title":"Windows TotalRecall","author":"Bejenaru Alexandru Ionut","date":"7 iunie 2024","format":false,"excerpt":"Recent, Microsoft a introdus func\u021bia Windows Recall, o caracteristic\u0103 de c\u0103utare AI bazat\u0103 pe \u00eenregistrarea sistematic\u0103 a activit\u0103\u021bilor utilizatorilor pe PC-uri. Aceasta a fost descris\u0103 ca fiind perfect sigur\u0103, cu\u2026","rel":"","context":"\u00cen \u201eIT-RO\u201d","block_context":{"text":"IT-RO","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/it\/"},"img":{"alt_text":"Windows TotalRecall - TotalRecall","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/06\/TotalRecall.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/06\/TotalRecall.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/06\/TotalRecall.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/06\/TotalRecall.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2024\/06\/TotalRecall.webp?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":13313,"url":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/blog\/deepseek-compromis-de-o-bresa-majora-de-securitate-peste-un-milion-de-conversatii-expuse-online\/","url_meta":{"origin":12055,"position":5},"title":"DeepSeek, Compromis de o Bre\u0219\u0103 Major\u0103 de Securitate: Peste un Milion de Conversa\u021bii Expuse Online","author":"Bejenaru Alexandru Ionut","date":"10 februarie 2025","format":false,"excerpt":"DeepSeek, Compromis de o Bre\u0219\u0103 Major\u0103 de Securitate: Peste un Milion de Conversa\u021bii Expuse Online \ud83d\udea8 Un nou scandal de securitate zguduie lumea AI: DeepSeek, startup-ul chinez care a provocat\u2026","rel":"","context":"\u00cen \u201e\u0218tiri\u201d","block_context":{"text":"\u0218tiri","link":"https:\/\/diagnozabam.ro\/sfaturi\/ro\/category\/stiri\/"},"img":{"alt_text":"deepseek compromis de o bresa majora de securitate peste un milion de conversatii expuse online mfrh original","src":"https:\/\/i0.wp.com\/diagnozabam.ro\/sfaturi\/wp-content\/uploads\/2025\/02\/deepseek-compromis-de-o-bresa-majora-de-securitate-peste-un-milion-de-conversatii-expuse-online-mfrh-original.webp?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pf97go-38r","jetpack_sharing_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/posts\/12055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/comments?post=12055"}],"version-history":[{"count":4,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/posts\/12055\/revisions"}],"predecessor-version":[{"id":16658,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/posts\/12055\/revisions\/16658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/media\/12056"}],"wp:attachment":[{"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/media?parent=12055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/categories?post=12055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diagnozabam.ro\/sfaturi\/wp-json\/wp\/v2\/tags?post=12055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}