{"id":202,"date":"2024-05-18T20:41:12","date_gmt":"2024-05-18T18:41:12","guid":{"rendered":"https:\/\/www.williamhaks.com\/es\/glosario\/?post_type=glossary&#038;p=202"},"modified":"2024-05-18T20:41:12","modified_gmt":"2024-05-18T18:41:12","slug":"bluesnarfing","status":"publish","type":"glossary","link":"https:\/\/www.williamhaks.com\/es\/glosario\/palabra\/bluesnarfing","title":{"rendered":"Bluesnarfing"},"content":{"rendered":"\n<p>El robo de informaci\u00f3n de un dispositivo bluetooth sin permiso a trav\u00e9s de una vulnerabilidad en el protocolo de bluetooth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El robo de informaci\u00f3n de un dispositivo bluetooth sin permiso a trav\u00e9s de una vulnerabilidad en el protocolo de bluetooth.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"template":"","glossary-cat":[4],"class_list":["post-202","glossary","type-glossary","status-publish","hentry","glossary-cat-b"],"_links":{"self":[{"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/glossary\/202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/glossary\/202\/revisions"}],"predecessor-version":[{"id":203,"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/glossary\/202\/revisions\/203"}],"wp:attachment":[{"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/www.williamhaks.com\/es\/glosario\/wp-json\/wp\/v2\/glossary-cat?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}