{"id":2954,"date":"2018-03-05T09:44:24","date_gmt":"2018-03-05T09:44:24","guid":{"rendered":"https:\/\/anteus.hu\/?p=2954"},"modified":"2025-04-01T12:33:35","modified_gmt":"2025-04-01T10:33:35","slug":"why-is-everyone-talking-about-secrecy","status":"publish","type":"post","link":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/","title":{"rendered":"Why is everyone talking about encryption?"},"content":{"rendered":"<p>In a card-based access control system, it is essential to set up proper data security configurations, particularly the use of encryption. In this article, we will explain why this is the case.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-2955 size-full alignnone\" src=\"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg\" alt=\"\" width=\"850\" height=\"566\" srcset=\"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg 850w, https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w-300x200.jpg 300w, https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w-768x511.jpg 768w, https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w-18x12.jpg 18w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/p>\n<p>Let\u2019s illustrate the situation with a very simple, everyday example. Imagine an access control system where there is no human oversight, and access is granted exclusively via cards for authorized individuals to enter the building or certain sections. When the user scans their card, the card reader interprets the codes stored on the card and checks the database to determine whether the person is authorized to enter through that specific door or not.<\/p>\n<p>And this is the point that hackers can exploit to clone access cards and gain entry to the building or the company's computer system. If a device that detects the proximity of a code card is switched on near the card or card reader, it may start transmitting the card's fixed binary code number. If an unauthorized person obtains this information, they can easily use the card data to allow unauthorized individuals to enter the building.<\/p>\n<p>That\u2019s why it\u2019s important to use encryption and coding methods that make the numbers on the card unusable by themselves. In the case of an encrypted card, the system requests access to a secret key or password, which allows it to decrypt the access code and verify it. This is how credit cards typically work!<\/p>\n<p>In practice, this means that in the first case, the card contains a number sequence that the card reader checks to see if it allows entry through the door. In the second case, the card does not contain the final access code; instead, it contains another number, which was generated by a program from the original code. The encrypted card's code is transformed by the reader using an algorithm and a key (e.g., PIN code or password), and then it verifies whether the person is authorized to enter.<\/p>\n<p>There are several types of encryption: it can be symmetric (where the same key is used for both encryption and decryption) or asymmetric (where two different but mathematically linked keys are used).<\/p>\n<h4>Encryption for Access Control System Usage<\/h4>\n<p>One method is to use card readers that emit different signals than those used by the card verification sensors. Another important option is to store the card number in one of its sectors and encrypt the communication between the card and the reader (making it impossible\u2014or at least very difficult\u2014to clone the card). The latest standards now include an encryption module that is embedded in the card itself. These are perfectly suited to the requirements of fast and highly secure data transmission while being flexible enough to work with any infrastructure.<\/p>\n<p>Secure access control systems from Anteus Kft.!<\/p>\n<p>Contact us with confidence through our <a href=\"https:\/\/anteus.hu\/en\/contact-details\/\"><u>available channels<\/u><\/a> , and we\u2019ll help design and implement the access control system that best suits your needs.<\/p>","protected":false},"excerpt":{"rendered":"<p>Egy k\u00e1rty\u00e1s bel\u00e9ptet\u0151 rendszern\u00e9l elengedhetetlen a megfelel\u0151 adatbiztons\u00e1gi be\u00e1ll\u00edt\u00e1sok elv\u00e9gz\u00e9se, k\u00fcl\u00f6n\u00f6sen a titkos\u00edt\u00e1s haszn\u00e1lata. Cikk\u00fcnkben elmagyar\u00e1zzuk, hogy mi\u00e9rt van ez \u00edgy. Egy nagyon egyszer\u0171, mindennapos p\u00e9ld\u00e1val illusztr\u00e1ljuk a helyzetet. Adott egy bel\u00e9ptet\u0151 rendszer, ahol nincsen k\u00fcl\u00f6n emberi ellen\u0151rz\u00e9s, hanem kiz\u00e1r\u00f3lag k\u00e1rty\u00e1val l\u00e9ptetj\u00fck be az illet\u00e9keseket az \u00e9p\u00fcletbe, vagy bizonyos sz\u00e1rnyaiba. Amikor a felhaszn\u00e1l\u00f3 leolvassa a [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2955,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[26],"class_list":["post-2954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cikkek","tag-kartyas-belepteto-rendszer-titkositasa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l? - Anteus<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anteus.hu\/en\/why-is-everyone-talking-about-secrecy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?\" \/>\n<meta property=\"og:description\" content=\"Egy k\u00e1rty\u00e1s bel\u00e9ptet\u0151 rendszern\u00e9l elengedhetetlen a megfelel\u0151 adatbiztons\u00e1gi be\u00e1ll\u00edt\u00e1sok elv\u00e9gz\u00e9se, k\u00fcl\u00f6n\u00f6sen a titkos\u00edt\u00e1s haszn\u00e1lata. Cikk\u00fcnkben elmagyar\u00e1zzuk, hogy mi\u00e9rt van ez \u00edgy. Egy nagyon egyszer\u0171, mindennapos p\u00e9ld\u00e1val illusztr\u00e1ljuk a helyzetet. Adott egy bel\u00e9ptet\u0151 rendszer, ahol nincsen k\u00fcl\u00f6n emberi ellen\u0151rz\u00e9s, hanem kiz\u00e1r\u00f3lag k\u00e1rty\u00e1val l\u00e9ptetj\u00fck be az illet\u00e9keseket az \u00e9p\u00fcletbe, vagy bizonyos sz\u00e1rnyaiba. Amikor a felhaszn\u00e1l\u00f3 leolvassa a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anteus.hu\/en\/why-is-everyone-talking-about-secrecy\/\" \/>\n<meta property=\"og:site_name\" content=\"Anteus\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anteushungary\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-05T09:44:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T10:33:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"anteus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anteus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/\"},\"author\":{\"name\":\"anteus\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/#\\\/schema\\\/person\\\/1ce2f90bba68107f628c4e0c48ebb7a7\"},\"headline\":\"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?\",\"datePublished\":\"2018-03-05T09:44:24+00:00\",\"dateModified\":\"2025-04-01T10:33:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/\"},\"wordCount\":657,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-attack-data-breach-w.jpg\",\"keywords\":[\"k\u00e1rty\u00e1s bel\u00e9ptet\u0151 rendszer titkos\u00edt\u00e1sa\"],\"articleSection\":[\"Cikkek\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/\",\"url\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/\",\"name\":\"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l? - Anteus\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-attack-data-breach-w.jpg\",\"datePublished\":\"2018-03-05T09:44:24+00:00\",\"dateModified\":\"2025-04-01T10:33:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#primaryimage\",\"url\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-attack-data-breach-w.jpg\",\"contentUrl\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-attack-data-breach-w.jpg\",\"width\":850,\"height\":566},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/en\\\/miert-beszel-mindenki-a-titkositasrol\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/anteus.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/#website\",\"url\":\"https:\\\/\\\/anteus.hu\\\/\",\"name\":\"Anteus\",\"description\":\"Maxim\u00e1lis biztons\u00e1g. G\u00f6rd\u00fcl\u00e9keny parkol\u00e1s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/anteus.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/#organization\",\"name\":\"Anteus\",\"url\":\"https:\\\/\\\/anteus.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-anteus-logo.png\",\"contentUrl\":\"https:\\\/\\\/anteus.hu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-anteus-logo.png\",\"width\":365,\"height\":96,\"caption\":\"Anteus\"},\"image\":{\"@id\":\"https:\\\/\\\/anteus.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/anteushungary\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/anteus.hu\\\/#\\\/schema\\\/person\\\/1ce2f90bba68107f628c4e0c48ebb7a7\",\"name\":\"anteus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g\",\"caption\":\"anteus\"},\"url\":\"https:\\\/\\\/anteus.hu\\\/en\\\/author\\\/anteus\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why is everyone talking about encryption? - Anteus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anteus.hu\/en\/why-is-everyone-talking-about-secrecy\/","og_locale":"en_GB","og_type":"article","og_title":"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?","og_description":"Egy k\u00e1rty\u00e1s bel\u00e9ptet\u0151 rendszern\u00e9l elengedhetetlen a megfelel\u0151 adatbiztons\u00e1gi be\u00e1ll\u00edt\u00e1sok elv\u00e9gz\u00e9se, k\u00fcl\u00f6n\u00f6sen a titkos\u00edt\u00e1s haszn\u00e1lata. Cikk\u00fcnkben elmagyar\u00e1zzuk, hogy mi\u00e9rt van ez \u00edgy. Egy nagyon egyszer\u0171, mindennapos p\u00e9ld\u00e1val illusztr\u00e1ljuk a helyzetet. Adott egy bel\u00e9ptet\u0151 rendszer, ahol nincsen k\u00fcl\u00f6n emberi ellen\u0151rz\u00e9s, hanem kiz\u00e1r\u00f3lag k\u00e1rty\u00e1val l\u00e9ptetj\u00fck be az illet\u00e9keseket az \u00e9p\u00fcletbe, vagy bizonyos sz\u00e1rnyaiba. Amikor a felhaszn\u00e1l\u00f3 leolvassa a [&hellip;]","og_url":"https:\/\/anteus.hu\/en\/why-is-everyone-talking-about-secrecy\/","og_site_name":"Anteus","article_publisher":"https:\/\/www.facebook.com\/anteushungary","article_published_time":"2018-03-05T09:44:24+00:00","article_modified_time":"2025-04-01T10:33:35+00:00","og_image":[{"width":850,"height":566,"url":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg","type":"image\/jpeg"}],"author":"anteus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"anteus","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#article","isPartOf":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/"},"author":{"name":"anteus","@id":"https:\/\/anteus.hu\/#\/schema\/person\/1ce2f90bba68107f628c4e0c48ebb7a7"},"headline":"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?","datePublished":"2018-03-05T09:44:24+00:00","dateModified":"2025-04-01T10:33:35+00:00","mainEntityOfPage":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/"},"wordCount":657,"commentCount":0,"publisher":{"@id":"https:\/\/anteus.hu\/#organization"},"image":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#primaryimage"},"thumbnailUrl":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg","keywords":["k\u00e1rty\u00e1s bel\u00e9ptet\u0151 rendszer titkos\u00edt\u00e1sa"],"articleSection":["Cikkek"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/","url":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/","name":"Why is everyone talking about encryption? - Anteus","isPartOf":{"@id":"https:\/\/anteus.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#primaryimage"},"image":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#primaryimage"},"thumbnailUrl":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg","datePublished":"2018-03-05T09:44:24+00:00","dateModified":"2025-04-01T10:33:35+00:00","breadcrumb":{"@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#primaryimage","url":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg","contentUrl":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/12\/cyber-attack-data-breach-w.jpg","width":850,"height":566},{"@type":"BreadcrumbList","@id":"https:\/\/anteus.hu\/en\/miert-beszel-mindenki-a-titkositasrol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/anteus.hu\/"},{"@type":"ListItem","position":2,"name":"Mi\u00e9rt besz\u00e9l mindenki a titkos\u00edt\u00e1sr\u00f3l?"}]},{"@type":"WebSite","@id":"https:\/\/anteus.hu\/#website","url":"https:\/\/anteus.hu\/","name":"Anteus","description":"Maximum security. Smooth parking.","publisher":{"@id":"https:\/\/anteus.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anteus.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/anteus.hu\/#organization","name":"Anteus","url":"https:\/\/anteus.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/anteus.hu\/#\/schema\/logo\/image\/","url":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/10\/cropped-anteus-logo.png","contentUrl":"https:\/\/anteus.hu\/wp-content\/uploads\/2024\/10\/cropped-anteus-logo.png","width":365,"height":96,"caption":"Anteus"},"image":{"@id":"https:\/\/anteus.hu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/anteushungary"]},{"@type":"Person","@id":"https:\/\/anteus.hu\/#\/schema\/person\/1ce2f90bba68107f628c4e0c48ebb7a7","name":"Anteus","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a35e304b3f956940ce272187a6a475ce96de20d461fb8cdbda1a8b523cd5dfa5?s=96&d=mm&r=g","caption":"anteus"},"url":"https:\/\/anteus.hu\/en\/author\/anteus\/"}]}},"_links":{"self":[{"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/posts\/2954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/comments?post=2954"}],"version-history":[{"count":3,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/posts\/2954\/revisions"}],"predecessor-version":[{"id":4861,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/posts\/2954\/revisions\/4861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/media\/2955"}],"wp:attachment":[{"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/media?parent=2954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/categories?post=2954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anteus.hu\/en\/wp-json\/wp\/v2\/tags?post=2954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}