{"id":6055,"date":"2025-09-10T12:31:47","date_gmt":"2025-09-10T10:31:47","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=6055"},"modified":"2026-03-27T12:30:21","modified_gmt":"2026-03-27T11:30:21","slug":"deploying-honeypots-and-honeynets-issue-of-privacy","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issue-of-privacy\/","title":{"rendered":"Deploying Honeypots and Honeynets: Issue of Privacy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6055\" class=\"elementor elementor-6055\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f6d137 e-con-full e-flex e-con e-child\" data-id=\"9f6d137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd553b0 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"dd553b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_dd553b0 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_dd553b0{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_dd553b0:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_dd553b0:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_dd553b0\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7299942\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tArticle\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5fbe9 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"ad5fbe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_ad5fbe9 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_ad5fbe9{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_ad5fbe9:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_ad5fbe9\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;#038;hl=sk&amp;#038;user=JXxir4oAAAAJ&amp;#038;cstart=20&amp;#038;pagesize=80&amp;#038;sortby=pubdate&amp;#038;citation_for_view=JXxir4oAAAAJ:UebtZRa9Y70C\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-link'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tLink to Google Scholar\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Authors: <\/b>Pavol Sokol, Martin Hus\u00e1k, Franti\u0161ek Lipt\u00e1k<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e945b elementor-widget elementor-widget-heading\" data-id=\"79e945b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Honey pots and honey nets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered together. In this paper, we outline privacy issues of honey pots and honey nets with respect to technical aspects. The paper discusses the legal framework of privacy, legal ground to data processing, and data collection. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues. This paper is one of the first papers which discuss in detail privacy issues of honey pots and honey nets in accordance with EU law.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-413ae1c elementor-widget elementor-widget-text-editor\" data-id=\"413ae1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Traditional means of defence are becoming less and less effective since attackers behaviour, methods, and tools are changing. Therefore, we need to find new approaches to protect the information and infrastructure of organizations. One useful approach to protect them is the concept of honeypots and honeynets.<\/p><p>Lance Spitzner defines\u00a0<b>honeypots<\/b>\u00a0as an information system resource whose value lies in unauthorized or illicit use of that resource\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1]. It can also be defined as a computing resource, whose value is in being attacked\u00a0<a id=\"context_ref_2_1\" data-range=\"ref2\"><\/a>[2]. Honeypots are a very useful framework for learning about the attackers and their targets, procedures, tools, and methods.<\/p><p>For the purpose of this paper, we classify honeypots according to their level of interaction and purpose. The first classification is based on\u00a0<b>level of interaction.<\/b>\u00a0The level of interaction can be defined as the range of possibilities that a honeypot allows an attacker to have.\u00a0<b>Low-interaction honeypots<\/b>\u00a0detect attackers using software emulation of characteristics of a particular operating system and network services on the host operating system. The advantage of this approach is better control of attacker activities, since the attacker is limited to software running on a host operating system. On the other hand, this approach has a disadvantage: la low-interaction honeypot emulates a service, or a couple of services, but it does not emulate a complete operating system. Examples of this type of honeypot are Dionaea\u00a0<a id=\"context_ref_3_1\" data-range=\"ref3\"><\/a>[3]\u00a0and Glastopf\u00a0<a id=\"context_ref_4_1\" data-range=\"ref4\"><\/a>[4].<\/p><p>In order to get more information about attackers, their methods and attacks, we use a complete operating system with all services. This type of honeypot is called a\u00a0<b>high-interaction honeypot.<\/b>\u00a0This type of honeypot aims to give the attacker access to a real operating system, where nothing is emulated or restricted\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1]. Examples of this type of honeypot are Sebek\u00a0<a id=\"context_ref_5_1\" data-range=\"ref5\"><\/a>[5]\u00a0and NonSSH\u00a0<a id=\"context_ref_6_1\" data-range=\"ref6\"><\/a>[6].<\/p><p>Spitzner suggests classification of honeypots by purpose\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1]. There are research honeypots and production honeypots. The\u00a0<b>research honeypot<\/b>\u00a0is designed to gain information about the blackhat community and it does not add any direct value to the organization, which has to protect its information\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7]. The main aim here is to get maximum information about the blackhats by giving them full access to penetrate the security system and infiltrate it\u00a0<a id=\"context_ref_8_1\" data-range=\"ref8\"><\/a>[8]. A second type of purpose-classified honeypot is the\u00a0<b>production honeypot,<\/b>\u00a0used within an organizations environment to protect the organization and help mitigate risk\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7]. An example of the production honeypot is a honeypot which captures, collects, and analyses malware for anti-virus, intrusion detection system signatures, etc.<\/p><p><b>Honeynet<\/b>\u00a0extends the concept of a single honeypot to a highly controlled network of honeypots\u00a0<a id=\"context_ref_9_1\" data-range=\"ref9\"><\/a>[9]. The honeynet is composed of four core elements\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7],\u00a0<a id=\"context_ref_10_1\" data-range=\"ref10\"><\/a>[10]:<\/p><ul><li><p><b>Data control-<\/b>\u00a0monitors and logs all of the activities of an attacker within the honeynet;<\/p><\/li><li><p><b>Data capture &#8211;<\/b>\u00a0controls and contains the activity of an attacker;<\/p><\/li><li><p><b>Data collection &#8211;<\/b>\u00a0stores all captured data in one central location;<\/p><\/li><li><p><b>Data analysis &#8211;<\/b>\u00a0an ability of the honeynet to analyse the data being collected from it.<\/p><\/li><\/ul><p>\u00a0<\/p><p>Deployment and usage of honeypots bring many benefits, e.g. the possibility of discovering new forms of attacks. In addition, low-interaction honeypots are easy to deploy, undemanding resource-wise, and simple to use\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7]. On the other hand, a number of issues need to be addressed during deployment and usage.<\/p><p>The most frequent problems are\u00a0<a id=\"context_ref_11_1\" data-range=\"ref11\"><\/a>[11]:<\/p><ul><li><p><b>inaccurate results &#8211;<\/b>\u00a0in some cases, data obtained from the honeypots lead to poor results, due to a limited amount of data;<\/p><\/li><li><p><b>discovery and fingerprinting &#8211;<\/b>\u00a0the attackers can detect the honeypots;<\/p><\/li><li><p><b>risk of takeover &#8211;<\/b>\u00a0the honeypot may be used to attack against the real (no-honeypots) systems.<\/p><\/li><\/ul><p>\u00a0<\/p><p>The\u00a0<b>quantity and quality of the data collected<\/b>\u00a0from honeypots belong to the problems associated with their usage. This problem is closely linked to the issue of privacy. It represents one of the most significant concepts in the field of law, and it was set forth in Article 8 of the European Convention on Human Rights.\u00a0<b>Privacy<\/b>\u00a0can be defined as the right to be left alone and to have a private life is\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7]. It can also be defined as the right of a person to be free from unwarranted publicity\u00a0<a id=\"context_ref_9_1\" data-range=\"ref9\"><\/a>[9].<\/p><p>It includes some individual privacy, such as privacy of the home and office, the protection of physical integrity and also privacy of communications (telephone calls, chats, emails etc.). Therefore, the primary motivation for elaborating this paper is the fact that an administrator has to take into account the issue of privacy and related issues in the process of data collection. The failure of an administrator to meet that responsibility leaves him open to a lawsuit for any disruption of privacy and resulting damages.<\/p><p>To formalize the scope of our work, two research questions are stated:<\/p><ol><li value=\"1\" data-list-item-label=\"1)\"><p><b>What data can honeypot administrators collect?<\/b><\/p><\/li><li value=\"2\" data-list-item-label=\"2)\"><p><b>What are the conditions for the collection of data and data retention?<\/b><\/p><\/li><\/ol><p>\u00a0<\/p><p>In this paper, the authors focus on European Union (EU) regulations, EU directives and international agreements. National legislation of EU Member States is based on these legal documents (EU directives, international agreements) or legal documents are an integral part of national legislation (EU regulations, international agreements). Therefore, some national legislation may be slightly different from the concept found in EU law or international law.<\/p><p>This paper is organized into seven sections. In\u00a0<a class=\"fulltext-link\">Section II<\/a>, the paper focuses on previous writings related to legal aspects of honeypots and honeynets. In this section we discuss the related papers focus on the issue of privacy.\u00a0<a class=\"fulltext-link\">Section III<\/a>\u00a0is the main part of paper. It provides an overview of privacy in the field of honeypots, including the issue of collected data and the legal ground to collect data. This section answers the first research question and partially the second research question.\u00a0<a class=\"fulltext-link\">Section IV<\/a>\u00a0outlines data retention in honeypots. In\u00a0<a class=\"fulltext-link\">Section V<\/a>, the paper outlines the relationship between network monitoring and honeypots.\u00a0<a class=\"fulltext-link\">Section IV<\/a>\u00a0and\u00a0<a class=\"fulltext-link\">Section V<\/a>\u00a0answer the second research question.\u00a0<a class=\"fulltext-link\">Section VI<\/a>\u00a0focuses on issues related to honeypots &#8211; publication of the results and intellectual property issues.\u00a0<a class=\"fulltext-link\">Section VII<\/a>\u00a0concludes the paper and contains suggestions for future work.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Authors: Pavol Sokol, Martin Hus\u00e1k, Franti\u0161ek Lipt\u00e1k<\/p>","protected":false},"author":9,"featured_media":5713,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[15],"tags":[],"class_list":["post-6055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=6055"}],"version-history":[{"count":5,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6055\/revisions"}],"predecessor-version":[{"id":8858,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6055\/revisions\/8858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/5713"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=6055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=6055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=6055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}