{"id":251,"date":"2022-06-22T16:29:01","date_gmt":"2022-06-22T16:29:01","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=251"},"modified":"2022-06-22T16:29:01","modified_gmt":"2022-06-22T16:29:01","slug":"cat-de-sigura-este-tehnologia-blockchain","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/","title":{"rendered":"C\u00e2t de sigur\u0103 este tehnologia Blockchain?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Ce este tehnologia blockchain? Este posibil s\u0103 fi auzit mult acest termen \u00een ultima vreme, dar ce \u00eenseamn\u0103 el? Pe scurt, tehnologia blockchain este o modalitate de partajare sigur\u0103 \u0219i transparent\u0103 a datelor \u00eentre dou\u0103 sau mai multe p\u0103r\u021bi. Tehnologia blockchain se bazeaz\u0103 pe reglement\u0103ri matematice \u0219i software extrem de restrictive care o fac dificil de piratat sau de falsificat, ceea ce o face o op\u021biune foarte sigur\u0103 pentru transmiterea datelor. Este deosebit de potrivit\u0103 pentru situa\u021biile \u00een care \u00eencrederea \u0219i verificarea sunt esen\u021biale, cum ar fi tranzac\u021biile financiare sau schimbul de informa\u021bii \u00eentre persoane care nu se cunosc.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">M\u0103surile de securitate ale Blockchain<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Unul dintre principalele avantaje ale tehnologiei blockchain este securitatea sa. Deoarece fiecare bloc dintr-un blockchain con\u021bine un hash criptografic al blocului anterior, introducerea de date frauduloase \u00een lan\u021b este o provocare. Pentru a reu\u0219i s\u0103 falsifice datele dintr-un blockchain, ar trebui s\u0103 schimbe datele din blocul curent \u0219i din toate blocurile care vin dup\u0103 acesta - ceea ce devine din ce \u00een ce mai dificil \u0219i mai costisitor pe m\u0103sur\u0103 ce se adaug\u0103 mai multe blocuri la lan\u021b.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">O alt\u0103 m\u0103sur\u0103 de securitate care face ca blockchain s\u0103 fie deosebit de potrivit pentru tranzac\u021biile financiare este natura sa descentralizat\u0103. Spre deosebire de sistemele bancare tradi\u021bionale, care se bazeaz\u0103 pe autorit\u0103\u021bile centrale pentru a verifica \u0219i aproba tranzac\u021biile, blockchain permite utilizatorilor s\u0103 tranzac\u021bioneze direct \u00eentre ei, f\u0103r\u0103 a fi nevoie de o ter\u021b\u0103 parte. Acest lucru face ca tranzac\u021biile s\u0103 fie mai rapide \u0219i mai eficiente \u0219i reduce riscul de fraud\u0103 sau manipulare, deoarece nu exist\u0103 un punct central de control.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Utiliz\u0103ri pentru tehnologia Blockchain<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">\u00cen plus fa\u021b\u0103 de avantajele sale \u00een materie de securitate, tehnologia blockchain are \u0219i alte poten\u021biale utiliz\u0103ri. De exemplu, ar putea fi utilizat\u0103 pentru a crea sisteme de vot, registre funciare sau fi\u0219e medicale inviolabile. De asemenea, ar putea fi utilizat\u0103 pentru a ra\u021bionaliza lan\u021burile de aprovizionare sau pentru a se asigura c\u0103 datele sensibile nu sunt divulgate. Posibilit\u0103\u021bile sunt nelimitate \u0219i, pe m\u0103sur\u0103 ce tehnologia continu\u0103 s\u0103 se dezvolte, vom vedea probabil utiliz\u0103ri \u0219i mai inovatoare ale acesteia.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Tehnologia Blockchain se afl\u0103 \u00eenc\u0103 \u00een stadiu incipient \u0219i trebuie s\u0103 fac\u0103 fa\u021b\u0103 unor provoc\u0103ri \u00eenainte de a putea fi adoptat\u0103 pe scar\u0103 larg\u0103. Cu toate acestea, poten\u021bialul s\u0103u este incontestabil \u0219i, pe m\u0103sur\u0103 ce din ce \u00een ce mai multe \u00eentreprinderi \u0219i organiza\u021bii \u00eencep s\u0103 exploreze cazurile sale de utilizare, este probabil s\u0103 o vedem juc\u00e2nd un rol semnificativ \u00een modul \u00een care tr\u0103im \u0219i muncim \u00een anii urm\u0103tori.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Provoc\u0103rile de securitate ale Blockchain<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">O provocare cu care se confrunt\u0103 tehnologia blockchain este scalabilitatea. Deoarece fiecare bloc dintr-un blockchain con\u021bine un hash criptografic al blocului anterior, dimensiunea lan\u021bului cre\u0219te pe m\u0103sur\u0103 ce se adaug\u0103 mai multe blocuri - ceea ce poate \u00eencetini \u00een cele din urm\u0103 sistemul. O alt\u0103 provocare este guvernan\u021ba. Deoarece nicio autoritate central\u0103 nu controleaz\u0103 un blockchain, efectuarea de modific\u0103ri sau actualiz\u0103ri ale sistemului poate fi dificil\u0103. Acest lucru poate face dificil\u0103 adaptarea la noi reglement\u0103ri sau nevoi.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u00cen ciuda acestor provoc\u0103ri, tehnologia blockchain are un poten\u021bial enorm - \u0219i abia acum \u00eencepem s\u0103 zg\u00e2riem suprafa\u021ba a ceea ce poate face. Pe m\u0103sur\u0103 ce mai multe \u00eentreprinderi \u0219i organiza\u021bii exploreaz\u0103 cazurile sale de utilizare \u0219i g\u0103sesc modalit\u0103\u021bi de a dep\u0103\u0219i provoc\u0103rile sale, vom vedea probabil \u0219i mai multe aplica\u021bii inovatoare pentru aceast\u0103 tehnologie transformatoare \u00een anii urm\u0103tori.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Concluzie<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Tehnologia Blockchain este o modalitate sigur\u0103 \u0219i transparent\u0103 de a partaja date \u00eentre dou\u0103 sau mai multe p\u0103r\u021bi. Ea se bazeaz\u0103 pe reglement\u0103ri matematice \u0219i software extrem de restrictive care o fac dificil de falsificat, ceea ce o face o op\u021biune excelent\u0103 pentru transmiterea datelor. \u00cen plus, natura descentralizat\u0103 a blockchain face ca tranzac\u021biile s\u0103 fie mai rapide \u0219i mai eficiente, reduc\u00e2nd \u00een acela\u0219i timp riscul de fraud\u0103 sau manipulare. De\u0219i tehnologia blockchain se afl\u0103 \u00eenc\u0103 \u00een stadiu incipient, are un poten\u021bial enorm \u0219i abia acum \u00eencepem s\u0103 zg\u00e2riem suprafa\u021ba a ceea ce poate face.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Ce este tehnologia blockchain? Este posibil s\u0103 fi auzit acest termen foarte des \u00een ultima vreme, dar ce \u00eenseamn\u0103 el? Pe scurt, tehnologia blockchain este o modalitate de a partaja \u00een mod sigur \u0219i transparent... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/\">Continue reading <span class=\"screen-reader-text\">C\u00e2t de sigur\u0103 este tehnologia Blockchain?<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Secure is Blockchain Technology? | Security Briefing<\/title>\n<meta name=\"description\" content=\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is Blockchain Technology? | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T16:29:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"How Secure is Blockchain Technology?\",\"datePublished\":\"2022-06-22T16:29:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"articleSection\":[\"Cryptocurrency\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\",\"name\":\"How Secure is Blockchain Technology? | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"datePublished\":\"2022-06-22T16:29:01+00:00\",\"description\":\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"width\":1000,\"height\":563,\"caption\":\"How-secure-is-Blockchain-technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure is Blockchain Technology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00e2t de sigur\u0103 este tehnologia blockchain? | Informare de securitate","description":"Afla\u021bi ce este tehnologia blockchain, c\u00e2t de sigur\u0103 este \u0219i diferitele moduri \u00een care o pute\u021bi utiliza ast\u0103zi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/","og_locale":"ro_RO","og_type":"article","og_title":"How Secure is Blockchain Technology? | Security Briefing","og_description":"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.","og_url":"https:\/\/securitybriefing.net\/ro\/criptomoneda\/cat-de-sigura-este-tehnologia-blockchain\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T16:29:01+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"How Secure is Blockchain Technology?","datePublished":"2022-06-22T16:29:01+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"},"wordCount":605,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","articleSection":["Cryptocurrency"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/","name":"C\u00e2t de sigur\u0103 este tehnologia blockchain? | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","datePublished":"2022-06-22T16:29:01+00:00","description":"Afla\u021bi ce este tehnologia blockchain, c\u00e2t de sigur\u0103 este \u0219i diferitele moduri \u00een care o pute\u021bi utiliza ast\u0103zi.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","width":1000,"height":563,"caption":"How-secure-is-Blockchain-technology"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Secure is Blockchain Technology?"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/252"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}