{"id":3994,"date":"2025-05-29T14:16:17","date_gmt":"2025-05-29T14:16:17","guid":{"rendered":"https:\/\/sharefoundation.info\/?p=3994"},"modified":"2025-05-29T14:16:22","modified_gmt":"2025-05-29T14:16:22","slug":"novispy-exposed-tracing-government-linked-surveillance-in-serbia","status":"publish","type":"post","link":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/","title":{"rendered":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><em>Unpacking the tools, tactics, and implications of Serbia\u2019s NoviSpy operation<\/em><\/h4>\n\n\n\n<p><em>By: David Stevanovi\u0107<\/em><\/p>\n\n\n\n<p>In an age of growing digital threats, the protection of personal data has become more urgent than ever. Recent research has uncovered a previously undocumented Android spyware, now known as <a href=\"https:\/\/securitylab.amnesty.org\/latest\/2024\/12\/tech-guide-detecting-novispy-spyware-with-androidqf-and-the-mobile-verification-toolkit-mvt\/\" target=\"_blank\" rel=\"noreferrer noopener\">NoviSpy<\/a>, which appears to be part of a troubling trend: the use of invasive mobile applications by local government actors to monitor individuals of interest. This blog post offers an overview of the findings on NoviSpy, examining its technical design, operational functionality, and the broader implications for cybersecurity and digital rights.\u00a0<\/p>\n\n\n\n<p>NoviSpy is the moniker of a recently discovered Android spyware linked to Serbian government agencies and used to surveil journalists, activists, and civil society members. The spyware was typically installed after a person&#8217;s phone was confiscated\u00a0 \u2013 either during arrest or when temporarily handed over prior to a police questioning \u2013 with the help of a <a href=\"https:\/\/securitylab.amnesty.org\/latest\/2025\/02\/serbia-cellebrite-halts-product-use-in-serbia-following-amnesty-surveillance-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">forensic tool<\/a> produced by Cellebrite. The investigation began when an individual suspected their phone was compromised. A forensic analysis using tools such as the Mobile Verification Toolkit and Androidqf confirmed the presence of NoviSpy. Although active deployment appears to have ceased following its exposure, the case raises ongoing concerns about targeted surveillance and digital security.<\/p>\n\n\n\n<p>NoviSpy operated through two main components:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>com.serv.services, referred to as NoviSpyAdmin, and<\/li>\n\n\n\n<li>com.accesibilityservice, referred to as NoviSpyAccess.<\/li>\n<\/ul>\n\n\n\n<p>These components worked in tandem to extract sensitive data from the device and to monitor nearly every aspect of the user\u2019s activity.<\/p>\n\n\n\n<p>NoviSpyAdmin relied on extensive system permissions \u2013 &nbsp;most notably the Device Admin privilege, from which it derives its name \u2013 to collect sensitive data. This included access to contacts, SMS messages, call logs, audio recordings, and even live&nbsp; phone call monitoring. It communicated with a remote server using FTP (File Transfer Protocol) and also responded to SMS-based commands. To secure the data in transit, NoviSpyAdmin used AES (Advanced Encryption Standard), a symmetric encryption method. However, the encryption key was hardcoded into the application, exposing a critical vulnerability and reflecting poor security design. Additionally, Serbian-language strings were found in the source code, further supporting the theory that NoviSpy was developed locally.&nbsp;<\/p>\n\n\n\n<p>More sophisticated than its counterpart, <em>NoviSpyAccess<\/em> was named for its exploitation of Android\u2019s accessibility services \u2013 features intended to support users with disabilities \u2013 to gain near-total control over the device. With these permissions, it could capture screenshots, record from the camera, read notifications, track the user\u2019s location, and exfiltrate all collected data to a remote server.<\/p>\n\n\n\n<p>The application also included several advanced features to enhance monitoring and evade detection. It used the Tor network to anonymize its communications and ADB (Android Debug Bridge) to execute shell commands remotely. Additionally, it employed a custom implementation of AES encryption to secure the data before transmission, further obscuring its presence and complicating forensic analysis.<\/p>\n\n\n\n<p>The research uncovered several critical aspects of both NoviSpyAdmin and NoviSpyAccess:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Difference in complexity<\/strong><\/li>\n<\/ol>\n\n\n\n<p>NoviSpyAdmin employed relatively simple methods for data extraction, making it more limited in scope. In contrast, NoviSpyAccess demonstrated a far more advanced architecture, reflecting its broader and more invasive functionalities.&nbsp;<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Hard-coded credentials<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Both components contained hard-coded values \u2013 including encryption keys, usernames, IP addresses, and other configuration parameters \u2013 used to facilitate their operation. While this design choice enabled quick deployment and potential mass compromise of devices, it also introduced significant security flaws, making the spyware easier to detect, reverse-engineer, and analyze.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Network infrastructure tied to the state<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Analysis of the IP addresses used by NoviSpy revealed links to state-operated internet service providers such as Telekom Srbija, as well as to infrastructure associated with government agencies, including the Security Information Agency (BIA). Combined with the use of state-affiliated forensic tools during phone extractions, these connections strongly indicate direct government involvement in the spyware\u2019s deployment.<\/p>\n\n\n\n<p>The investigation into NoviSpy highlights the evolving nature of spyware threats in modern mobile environments. While NoviSpyAdmin application represents a more traditional approach to data exfiltration and monitoring, NoviSpyAccess reveals the dangerous potential of sophisticated, multi-layered spyware, capable of seizing full control over a device.<\/p>\n\n\n\n<p>For everyday users, this serves as a critical reminder to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Stay informed about emerging digital threats\u00a0<\/li>\n\n\n\n<li>Use security tools and applications that provide layered protection<\/li>\n\n\n\n<li>Advocate for stronger privacy regulations to safeguard against invasive technologies<\/li>\n<\/ul>\n\n\n\n<p>As technology continues to evolve, so must our efforts to protect personal data from increasingly sophisticated threats like NoviSpy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unpacking the tools, tactics, and implications of Serbia\u2019s NoviSpy operation By: David Stevanovi\u0107 In an age of growing digital threats, the protection of personal data has become more urgent than ever. Recent research has uncovered a previously undocumented Android spyware, now known as NoviSpy, which appears to be part of a troubling trend: the use [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3995,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[33,34],"class_list":["post-3994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-digital-security","tag-information-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija\" \/>\n<meta property=\"og:description\" content=\"Unpacking the tools, tactics, and implications of Serbia\u2019s NoviSpy operation By: David Stevanovi\u0107 In an age of growing digital threats, the protection of personal data has become more urgent than ever. Recent research has uncovered a previously undocumented Android spyware, now known as NoviSpy, which appears to be part of a troubling trend: the use [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/\" \/>\n<meta property=\"og:site_name\" content=\"SHARE Fondacija\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-29T14:16:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T14:16:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-fb-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"b p\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-x-2.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"b p\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/\"},\"author\":{\"name\":\"b p\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/d8ca06ccf338cd33904919ba1237e0d8\"},\"headline\":\"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia\",\"datePublished\":\"2025-05-29T14:16:17+00:00\",\"dateModified\":\"2025-05-29T14:16:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/\"},\"wordCount\":735,\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-2.png\",\"keywords\":[\"digital security\",\"information privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/\",\"name\":\"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-2.png\",\"datePublished\":\"2025-05-29T14:16:17+00:00\",\"dateModified\":\"2025-05-29T14:16:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-2.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-2.png\",\"width\":1200,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"name\":\"Share Foundation\",\"description\":\"Dru\u0161tvo, tehnologija, sajberspejs\",\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sharefoundation.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\",\"name\":\"Share Foundation\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Share Foundation\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/d8ca06ccf338cd33904919ba1237e0d8\",\"name\":\"b p\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"caption\":\"b p\"},\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/author\\\/bojanperkovsharedefense-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/","og_locale":"en_US","og_type":"article","og_title":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija","og_description":"Unpacking the tools, tactics, and implications of Serbia\u2019s NoviSpy operation By: David Stevanovi\u0107 In an age of growing digital threats, the protection of personal data has become more urgent than ever. Recent research has uncovered a previously undocumented Android spyware, now known as NoviSpy, which appears to be part of a troubling trend: the use [&hellip;]","og_url":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/","og_site_name":"SHARE Fondacija","article_published_time":"2025-05-29T14:16:17+00:00","article_modified_time":"2025-05-29T14:16:22+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-fb-2.png","type":"image\/png"}],"author":"b p","twitter_card":"summary_large_image","twitter_image":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-x-2.png","twitter_misc":{"Written by":"b p","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#article","isPartOf":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/"},"author":{"name":"b p","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/d8ca06ccf338cd33904919ba1237e0d8"},"headline":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia","datePublished":"2025-05-29T14:16:17+00:00","dateModified":"2025-05-29T14:16:22+00:00","mainEntityOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/"},"wordCount":735,"publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-2.png","keywords":["digital security","information privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/","url":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/","name":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia - SHARE Fondacija","isPartOf":{"@id":"https:\/\/sharefoundation.info\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#primaryimage"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-2.png","datePublished":"2025-05-29T14:16:17+00:00","dateModified":"2025-05-29T14:16:22+00:00","breadcrumb":{"@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#primaryimage","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-2.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-2.png","width":1200,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/sharefoundation.info\/en\/novispy-exposed-tracing-government-linked-surveillance-in-serbia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sharefoundation.info\/en\/"},{"@type":"ListItem","position":2,"name":"NoviSpy Exposed: Tracing Government-Linked Surveillance in Serbia"}]},{"@type":"WebSite","@id":"https:\/\/sharefoundation.info\/#website","url":"https:\/\/sharefoundation.info\/","name":"Share Foundation","description":"Dru\u0161tvo, tehnologija, sajberspejs","publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sharefoundation.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sharefoundation.info\/#organization","name":"Share Foundation","url":"https:\/\/sharefoundation.info\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","width":512,"height":512,"caption":"Share Foundation"},"image":{"@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/d8ca06ccf338cd33904919ba1237e0d8","name":"b p","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","caption":"b p"},"url":"https:\/\/sharefoundation.info\/en\/author\/bojanperkovsharedefense-org\/"}]}},"_links":{"self":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/comments?post=3994"}],"version-history":[{"count":7,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3994\/revisions"}],"predecessor-version":[{"id":4007,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3994\/revisions\/4007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media\/3995"}],"wp:attachment":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media?parent=3994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/categories?post=3994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/tags?post=3994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}