{"id":1133,"date":"2017-10-16T23:14:40","date_gmt":"2017-10-16T21:14:40","guid":{"rendered":"http:\/\/gsservice.mazarashopping.com\/?p=1133"},"modified":"2017-10-16T23:14:40","modified_gmt":"2017-10-16T21:14:40","slug":"bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi","status":"publish","type":"post","link":"https:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/","title":{"rendered":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi"},"content":{"rendered":"<h2 class=\"summary\" style=\"box-sizing: border-box; margin-top: 0px; color: rgb(51, 53, 56); font-size: 18px; line-height: 26px; font-family: Roboto, sans-serif; font-weight: 500; font-style: normal; margin-bottom: 17px; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial;\"><span class=\"entry-summary\" style=\"box-sizing: border-box;\">Scoperta una vulnerabilit\u00e0 che permette ai pirati informatici di intercettare dati e dirottare la navigazione sulle reti senza fili.<\/span><\/h2>\n<p><span style=\"color: rgb(85, 91, 98); font-family: Roboto, sans-serif; font-size: 18px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\">Potenzialmente siamo di fronte a una vera apocalisse. Nella giornata di ieri, infatti, un gruppo di ricercatori ha annunciato di aver individuato<span> <\/span><\/span><b style=\"box-sizing: border-box; font-weight: 700; font-family: Roboto, sans-serif; font-style: normal; color: rgb(85, 91, 98); font-size: 18px; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial;\">una serie di falle di sicurezza all&#8217;interno di WPA2, il protocollo di crittografia che protegge la trasmissione dei dati nelle reti Wi-Fi<\/b><span style=\"color: rgb(85, 91, 98); font-family: Roboto, sans-serif; font-size: 18px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\">.<\/span><\/p>\n<p><span style=\"color: rgb(85, 91, 98); font-family: Roboto, sans-serif; font-size: 18px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\">Stiamo parlando del sistema di connessione pi\u00f9 utilizzato al mondo per comunicare su Internet attraverso<span> <\/span><\/span><span class=\"vm-hook-outer vm-hook-default\" style=\"box-sizing: border-box; display: inline-block; cursor: pointer; white-space: nowrap; color: rgb(85, 91, 98); font-family: Roboto, sans-serif; font-size: 18px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial;\"><span class=\"vm-hook\" style=\"box-sizing: border-box; border-width: 0px 0px 1px; border-style: none none solid; background-color: transparent; text-decoration: underline !important; padding: 0px 0px 1px !important; color: rgb(0, 153, 0); border-color: transparent transparent rgb(0, 153, 0);\">computer<\/span><\/span><span style=\"color: rgb(85, 91, 98); font-family: Roboto, sans-serif; font-size: 18px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\">, smartphone, tablet e in tutti i cosiddetti &#8220;dispositivi intelligenti&#8221;.<\/span><\/p>\n<p>L&#8217;allarme, ripreso anche dal CERT degli Stati Uniti, non specifica i dettagli delle vulnerabilit\u00e0 che verranno svelati soltanto nelle prossime ore. Stando alle prime indiscrezioni, per\u00f2, si tratterebbe di<span> <\/span><b style=\"box-sizing: border-box; font-weight: 700; font-family: Roboto, sans-serif; font-style: normal;\">un problema nel processo utilizzato per lo scambio delle chiavi crittografiche tra il dispositivo e l&#8217;access point<\/b>.<\/p>\n<p>Il risultato, per\u00f2, \u00e8 che un pirata informatico potrebbe sfruttare una nuova tecnica di attacco (battezzata con il nome di<span> <\/span><b style=\"box-sizing: border-box; font-weight: 700; font-family: Roboto, sans-serif; font-style: normal;\">KRACK, Key Reinstallation Attacks<\/b>) per intercettare il traffico o dirottare la navigazione.<\/p>\n<p>Per saperne di pi\u00f9 leggi<span> <\/span><a href=\"http:\/\/securityinfo.it\/2017\/10\/16\/krack-bucata-la-crittografia-wpa2-delle-reti-wi-fi\/\" style=\"box-sizing: border-box; background-color: transparent; color: rgb(85, 57, 130); text-decoration: underline; transition: color 0.2s ease-out; outline: 0px; font-family: Roboto, sans-serif; font-weight: 700; font-style: normal;\">l&#8217;articolo completo<\/a><span> <\/span>su<span> <\/span><b style=\"box-sizing: border-box; font-weight: 700; font-family: Roboto, sans-serif; font-style: normal;\">Security Info<\/b>, il sito Internet dedicato alla sicurezza informatica.<\/p>\n<p>Fonte tomshw.it<\/p>\n<p><img loading=\"lazy\" data-wpid=\"466\" src=\"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2017\/10\/1c306b-75688b10e7b340aeb6377e0eaecf2e5e-660x330-8956459cf80f7061732fc6ff95da775f0.jpg\" class=\"size-full\" width=\"528\" height=\"264\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scoperta una vulnerabilit\u00e0 che permette ai pirati informatici di intercettare dati e dirottare la navigazione sulle reti senza fili. Potenzialmente siamo di fronte a una vera apocalisse. Nella giornata di ieri, infatti, un gruppo di ricercatori ha annunciato di aver individuato una serie di falle di sicurezza all&#8217;interno di WPA2, il protocollo di crittografia che <a href=\"https:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\" rel=\"nofollow\"><span class=\"sr-only\">Leggi di pi\u00f9Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi<\/span>[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":1132,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[11,1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\" \/>\r\n<meta property=\"og:locale\" content=\"it_IT\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore\" \/>\r\n<meta property=\"og:description\" content=\"Scoperta una vulnerabilit\u00e0 che permette ai pirati informatici di intercettare dati e dirottare la navigazione sulle reti senza fili. Potenzialmente siamo di fronte a una vera apocalisse. Nella giornata di ieri, infatti, un gruppo di ricercatori ha annunciato di aver individuato una serie di falle di sicurezza all&#8217;interno di WPA2, il protocollo di crittografia che Leggi di pi\u00f9Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi[&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\" \/>\r\n<meta property=\"og:site_name\" content=\"GS Service di Gargano Salvatore\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/gsservicegargano\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-10-16T21:14:40+00:00\" \/>\r\n<meta property=\"og:image\" content=\"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2017\/10\/1c306b-75688b10e7b340aeb6377e0eaecf2e5e-660x330-8956459cf80f7061732fc6ff95da775f0.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"640\" \/>\r\n\t<meta property=\"og:image:height\" content=\"320\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"gianni\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"gianni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\"},\"author\":{\"name\":\"gianni\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/5e1bd73ec69a9aa469c01a85ddfaaf40\"},\"headline\":\"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi\",\"datePublished\":\"2017-10-16T21:14:40+00:00\",\"dateModified\":\"2017-10-16T21:14:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\"},\"wordCount\":194,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#organization\"},\"articleSection\":[\"news dal web\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\",\"url\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\",\"name\":\"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore\",\"isPartOf\":{\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#website\"},\"datePublished\":\"2017-10-16T21:14:40+00:00\",\"dateModified\":\"2017-10-16T21:14:40+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gsservice.mazarashopping.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#website\",\"url\":\"https:\/\/gsservice.mazarashopping.com\/\",\"name\":\"GS Service di Gargano Salvatore\",\"description\":\"macchine e mobili per ufficio\",\"publisher\":{\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gsservice.mazarashopping.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#organization\",\"name\":\"GS Service\",\"url\":\"https:\/\/gsservice.mazarashopping.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2016\/03\/logopng2.png\",\"contentUrl\":\"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2016\/03\/logopng2.png\",\"width\":300,\"height\":224,\"caption\":\"GS Service\"},\"image\":{\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/gsservicegargano\",\"https:\/\/www.instagram.com\/gsservicemazara\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/5e1bd73ec69a9aa469c01a85ddfaaf40\",\"name\":\"gianni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bbbbf348b49c6664e1900da7571a306f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bbbbf348b49c6664e1900da7571a306f?s=96&d=mm&r=g\",\"caption\":\"gianni\"},\"url\":\"https:\/\/gsservice.mazarashopping.com\/index.php\/author\/gianni\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/","og_locale":"it_IT","og_type":"article","og_title":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore","og_description":"Scoperta una vulnerabilit\u00e0 che permette ai pirati informatici di intercettare dati e dirottare la navigazione sulle reti senza fili. Potenzialmente siamo di fronte a una vera apocalisse. Nella giornata di ieri, infatti, un gruppo di ricercatori ha annunciato di aver individuato una serie di falle di sicurezza all&#8217;interno di WPA2, il protocollo di crittografia che Leggi di pi\u00f9Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi[&hellip;]","og_url":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/","og_site_name":"GS Service di Gargano Salvatore","article_publisher":"https:\/\/m.facebook.com\/gsservicegargano","article_published_time":"2017-10-16T21:14:40+00:00","og_image":[{"width":640,"height":320,"url":"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2017\/10\/1c306b-75688b10e7b340aeb6377e0eaecf2e5e-660x330-8956459cf80f7061732fc6ff95da775f0.jpg","type":"image\/jpeg"}],"author":"gianni","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"gianni","Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#article","isPartOf":{"@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/"},"author":{"name":"gianni","@id":"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/5e1bd73ec69a9aa469c01a85ddfaaf40"},"headline":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi","datePublished":"2017-10-16T21:14:40+00:00","dateModified":"2017-10-16T21:14:40+00:00","mainEntityOfPage":{"@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/"},"wordCount":194,"commentCount":0,"publisher":{"@id":"https:\/\/gsservice.mazarashopping.com\/#organization"},"articleSection":["news dal web"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/","url":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/","name":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi - GS Service di Gargano Salvatore","isPartOf":{"@id":"https:\/\/gsservice.mazarashopping.com\/#website"},"datePublished":"2017-10-16T21:14:40+00:00","dateModified":"2017-10-16T21:14:40+00:00","breadcrumb":{"@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/gsservice.mazarashopping.com\/index.php\/2017\/10\/16\/bucato-wpa2-gli-hacker-possono-violare-qualsiasi-rete-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gsservice.mazarashopping.com\/"},{"@type":"ListItem","position":2,"name":"Bucato WPA2, gli hacker possono violare qualsiasi rete Wi-Fi"}]},{"@type":"WebSite","@id":"https:\/\/gsservice.mazarashopping.com\/#website","url":"https:\/\/gsservice.mazarashopping.com\/","name":"GS Service di Gargano Salvatore","description":"macchine e mobili per ufficio","publisher":{"@id":"https:\/\/gsservice.mazarashopping.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gsservice.mazarashopping.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/gsservice.mazarashopping.com\/#organization","name":"GS Service","url":"https:\/\/gsservice.mazarashopping.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/gsservice.mazarashopping.com\/#\/schema\/logo\/image\/","url":"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2016\/03\/logopng2.png","contentUrl":"http:\/\/gsservice.mazarashopping.com\/wp-content\/uploads\/2016\/03\/logopng2.png","width":300,"height":224,"caption":"GS Service"},"image":{"@id":"https:\/\/gsservice.mazarashopping.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/gsservicegargano","https:\/\/www.instagram.com\/gsservicemazara\/"]},{"@type":"Person","@id":"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/5e1bd73ec69a9aa469c01a85ddfaaf40","name":"gianni","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/gsservice.mazarashopping.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bbbbf348b49c6664e1900da7571a306f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bbbbf348b49c6664e1900da7571a306f?s=96&d=mm&r=g","caption":"gianni"},"url":"https:\/\/gsservice.mazarashopping.com\/index.php\/author\/gianni\/"}]}},"_links":{"self":[{"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/posts\/1133"}],"collection":[{"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/comments?post=1133"}],"version-history":[{"count":1,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/posts\/1133\/revisions"}],"predecessor-version":[{"id":1134,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/posts\/1133\/revisions\/1134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/media\/1132"}],"wp:attachment":[{"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/media?parent=1133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/categories?post=1133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gsservice.mazarashopping.com\/index.php\/wp-json\/wp\/v2\/tags?post=1133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}