{"id":3806,"date":"2025-07-26T10:00:00","date_gmt":"2025-07-26T08:00:00","guid":{"rendered":"https:\/\/www.interlink.ro\/blog\/?p=3806"},"modified":"2025-07-28T11:39:16","modified_gmt":"2025-07-28T09:39:16","slug":"o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj","status":"publish","type":"post","link":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj","title":{"rendered":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Cuprins:<\/p>\n<\/div><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Iata_o_scurta_lista_cu_cele_mai_de_succes_carti_despre_crima_cibernetica\" >Iat\u0103 o scurt\u0103 list\u0103 cu cele mai de succes c\u0103r\u021bi despre crim\u0103 cibernetic\u0103<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Countdown_to_Zero_Day_autor_Kim_Zetter\" >Countdown to Zero Day, autor Kim Zetter<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Dark_Wire_autor_Joseph_Cox\" >Dark Wire, autor Joseph Cox<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#The_Cuckoos_Egg_de_Cliff_Stoll\" >The Cuckoo\u2019s Egg, de Cliff Stoll<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Your_Face_Belongs_to_Us_autor_Kashmir_Hill\" >Your Face Belongs to Us, autor Kashmir Hill<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Cult_of_the_Dead_Cow_Joseph_Menn\" >Cult of the Dead Cow, Joseph Menn<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Hack_to_the_Future_autor_Emily_Crose\" >Hack to the Future, autor Emily Crose<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Tracers_in_the_Dark_de_Andy_Greenberg\" >Tracers in the Dark, de Andy Greenberg<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\/#Dark_Mirror_de_Barton_Gellman\" >Dark Mirror, de Barton Gellman<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Timp de citit: <\/span> <span class=\"rt-time\"> 5<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>\u00cen ultimii aproximativ 30 de ani, securitatea cibernetic\u0103 a trecut de la statutul de specialitate de ni\u0219\u0103 \u00een domeniul mai larg al informaticii, gener\u00e2nd o intreaga industrie ce graviteaz\u0103 in jurul conceptului de crim\u0103 cibernetic\u0103. Estimat\u0103 la peste 170 de miliarde de dolari, aceast\u0103 industrie, este format\u0103 dintr-o comunitate de hackeri care se \u00eentinde pe \u00eentregul mapamond. <\/p>\n\n\n\n<p>Dezvoltarea tehnologic\u0103 \u0219i hackurile de mare profil, cum ar fi incidentul Sony din 2015, opera\u021biunile de hack \u0219i scurgere de informa\u021bii ale alegerilor din 2016 din SUA, atacul de ransomware Colonial Pipeline \u0219i o list\u0103 aparent nesf\u00e2r\u0219it\u0103 de hack-uri guvernamentale chineze\u0219ti, au f\u0103cut ca securitatea cibernetic\u0103 \u0219i hacking-ul s\u0103 devin\u0103 ni\u0219te subiecte foarte populare in mass media contemporan\u0103.<\/p>\n\n\n\n<p>Cultura pop a portretizat hackerii in seriale de succes precum Mr. Robot \u0219i filme precum Leave The World Behind. Dar poate c\u0103 cel mai prolific mediu pentru pove\u0219tile despre crim\u0103 cibernetic\u0103 \u2013 at\u00e2t fic\u021bionale, c\u00e2t \u0219i cele bazate pe realitate \u2013 sunt c\u0103r\u021bile.<\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"Iata_o_scurta_lista_cu_cele_mai_de_succes_carti_despre_crima_cibernetica\"><\/span>Iat\u0103 o scurt\u0103 list\u0103 cu cele mai de succes c\u0103r\u021bi despre crim\u0103 cibernetic\u0103<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Lista este facut\u0103 pe baza recomandarilor facute de comunit\u0103tile de cititori de pe <a href=\"https:\/\/joinmastodon.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mastodon<\/a> \u0219i <a href=\"https:\/\/bsky.app\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bluesky<\/a>. Ordinea in care sunt listate este aleatorie.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Countdown_to_Zero_Day_autor_Kim_Zetter\"><\/span>Countdown to Zero Day, autor Kim Zetter<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Atacul cibernetic coordonat de hackeri guvernamentali israelieni \u0219i americani, cunoscu\u021bi sub numele de Stuxnet, care a deteriorat centrifugele de la instala\u021bia nuclear\u0103 iranian\u0103 din Natanz, este aproape sigur cel mai cunoscut hack din istorie. Datorit\u0103 impactului s\u0103u, sofistic\u0103rii \u0219i \u00eendr\u0103znelii, atacul a captat  nu numai imagina\u021bia comunit\u0103\u021bii de securitate cibernetic\u0103, ci \u0219i a publicului larg.<\/p>\n\n\n\n<p>Jurnalistul veteran Kim Zetter spune povestea Stuxnet trat\u00e2nd malware-ul ca pe un personaj care merit\u0103 a fi portretizat. Pentru a realiza acest lucru, Zetter intervieveaz\u0103 practic to\u021bi investigatorii principali care au g\u0103sit codul malicios, au analizat cum a func\u021bionat \u0219i au realizat scopul acestuia. Este o lectura obligatorie pentru oricine lucreaz\u0103 \u00een domeniul cibernetic, dar serve\u0219te \u0219i ca o introducere excelent\u0103 \u00een lumea securit\u0103\u021bii cibernetice \u0219i a spionajului cibernetic pentru cititorii obi\u0219nui\u021bi.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Dark_Wire_autor_Joseph_Cox\"><\/span>Dark Wire, autor Joseph Cox<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Nu au existat opera\u021biuni mai \u00eendr\u0103zne\u021be \u0219i mai extinse dec\u00e2t Opera\u021biunea Trojan Shield condus\u0103 de c\u0103tre FBI, \u00een care agen\u021bii federalii au condus un startup numit Anom, care vindea, sub acoperire, telefoane criptate unora dintre cei mai inr\u0103i\u021bi criminali din lume, de la trafican\u021bi de droguri de mare profil p\u00e2n\u0103 la mafio\u021bi evazivi.<\/p>\n\n\n\n<p>Criminalii credeau c\u0103 folosesc dispozitive de comunicare special concepute pentru a evita supravegherea. \u00cen realitate, toate mesajele, imaginile \u0219i notele lor audio presupus sigure erau transmise c\u0103tre FBI \u0219i c\u0103tre partenerii interna\u021bionali de aplicare a legii. Jurnalistul 404 Media, Joseph Cox, poveste\u0219te cu m\u0103iestrie povestea lui Anom, cu interviuri cu coordonatorii opera\u021biunii de la FBI, dezvoltatorii \u0219i lucr\u0103torii care au condus startup-ul \u0219i criminalii care au folosit dispozitivele.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"The_Cuckoos_Egg_de_Cliff_Stoll\"><\/span>The Cuckoo\u2019s Egg, de Cliff Stoll<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00cen 1986, astronomul Cliff Stoll a fost \u00eens\u0103rcinat s\u0103 identifice o discrepan\u021b\u0103 de 0,75 USD \u00een utilizarea re\u021belei de calculatoare a laboratorului s\u0103u. La momentul respectiv, internetul era, \u00een mare parte, o re\u021bea pentru institu\u021bii guvernamentale \u0219i academice. Aeste organiza\u021bii pl\u0103teau accesul la internet \u00een func\u021bie de c\u00e2t timp petreceau online. \u00cen anul urm\u0103tor, Stoll a analizat cu meticulozitate ceea ce p\u0103rea a fi un incident minor \u0219i a ajuns s\u0103 descopere unul dintre primele cazuri \u00eenregistrate de spionaj cibernetic guvernamental, \u00een acest caz efectuat de catre KGB.<\/p>\n\n\n\n<p>Stoll nu numai c\u0103 a rezolvat misterul, dar l-a \u0219i transformat \u00eentr-un thriller captivant despre spioni. Este greu de subestimat c\u00e2t de important\u0103 a fost aceast\u0103 carte. C\u00e2nd a ap\u0103rut, \u00een 1989, hackerii abia daca erau prezen\u021bi \u00een imagina\u021bia publicului. The Cuckoo\u2019s Egg le-a ar\u0103tat tinerilor pasiona\u021bi de securitate cibernetic\u0103 cum s\u0103 investigheze un incident cibernetic \u0219i a demontrat c\u0103 pove\u0219tile despre spionii informatici pot fi la fel de incitante ca \u0219i cele ale personajelor tip James Bond.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Your_Face_Belongs_to_Us_autor_Kashmir_Hill\"><\/span>Your Face Belongs to Us, autor Kashmir Hill<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Recunoa\u0219terea facial\u0103 a trecut rapid de la o tehnologie care p\u0103rea atotputernic\u0103 \u00een filme \u0219i emisiuni TV &#8211; dar era de fapt nepl\u0103cut\u0103 \u0219i imprecis\u0103 \u00een via\u021ba real\u0103 &#8211; la un instrument important \u0219i relativ precis pentru aplicarea legii \u00een opera\u021biuni zilnice. Experimentatul reporterul Kashmir Hill ne spune istoria acestei tehnologii prin ascensiunea unuia dintre startup-urile controversate care a f\u0103cut-o mainstream: Clearview AI.<\/p>\n\n\n\n<p>Spre deosebire de alte c\u0103r\u021bi care analizeaza un start-up, cel pu\u021bin unul dintre fondatorii Clearview AI s-a implicat par\u021bial, \u00eempreun\u0103 cu Hill, \u00een \u00eencercarea de a-\u0219i prezenta propriul punct de vedere asupra subiectului dar jurnalistul a muncit din greu pentru a verifica faptele &#8211; \u0219i, \u00een unele cazuri, a dezmin\u021bi &#8211; o parte din declara\u021biile surselor oficiale are companiei. Hill este scriitorul cel mai potrivit pentru a spune povestea Clearview AI, dup\u0103 ce i-a dezv\u0103luit pentru prima dat\u0103 existen\u021ba \u00een 2020, ceea ce ofer\u0103 c\u0103r\u021bii o nara\u021biune captivant\u0103 la persoana \u00eent\u00e2i \u00een unele sec\u021biuni.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Cult_of_the_Dead_Cow_Joseph_Menn\"><\/span>Cult of the Dead Cow, Joseph Menn<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Reporterul de investiga\u021bie Joseph Menn descrie incredibila poveste adev\u0103rat\u0103 a influentului Cult of the Dead Cow, unul dintre cele mai vechi supergrupuri de hacking din anii \u201980 \u0219i \u201990, \u0219i cum au contribuit la transformarea internetului timpuriu \u00een ceea ce este ast\u0103zi. Membrii grupului includ nume populare, de la directori generali de tehnologie \u0219i activi\u0219ti, dintre care unii au continuat s\u0103-i consilieze pe pre\u0219edin\u021bii SUA \u0219i s\u0103 depun\u0103 m\u0103rturie \u00een fa\u021ba parlamentarilor, p\u00e2n\u0103 la eroii care au ajutat la securizarea multor tehnologii \u0219i comunica\u021bii moderne ale lumii.<\/p>\n\n\n\n<p>Cartea lui Menn celebreaz\u0103 at\u00e2t ceea ce hackerii au realizat, construit \u0219i distrus pe parcurs, \u00een numele \u00eembun\u0103t\u0103\u021birii securit\u0103\u021bii cibernetice, a libert\u0103\u021bii de exprimare \u0219i a dreptului la confiden\u021bialitate \u0219i codific\u0103 istoria scenei timpurii de hacking pe internet, m\u0103rturisit\u0103 de unii dinte cei care au tr\u0103it-o.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Hack_to_the_Future_autor_Emily_Crose\"><\/span>Hack to the Future, autor Emily Crose<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>&#8220;Hack to the Future&#8221; este o lectur\u0103 esen\u021bial\u0103 pentru oricine dore\u0219te s\u0103 \u00een\u021beleag\u0103 istoria incredibil\u0103 \u0219i bogat\u0103 a lumii hackingului, a conceptului de crim\u0103 cibernetic\u0103 \u0219i a numeroaselor sale sub-culturi. Autoarea c\u0103r\u021bii, Emily Crose, un hacker \u0219i cercet\u0103tor profesional \u00een domeniul securit\u0103\u021bii, abordeaz\u0103 subiectul unelor dintre cele mai vechi hack-uri care au avut r\u0103d\u0103cini malicioase, si descrie evolu\u021bia fenomenului p\u00e2n\u0103 \u00een zilele noastre, f\u0103r\u0103 a omite nici un detaliu al celor \u00eent\u00e2mplate in deceniile intermediare.<\/p>\n\n\n\n<p>Aceast\u0103 carte analizeaz\u0103 fenomenul de crim\u0103 cibernetic\u0103, este foarte bine documentat\u0103, bine reprezentat\u0103 \u0219i este par\u021bial istoria \u0219i par\u021bial o celebrare a comunit\u0103\u021bii hackerilor, care s-a transformat de la neadapta\u021bii geniali curio\u0219i, care fluierau \u00eentr-un telefon pentru a ob\u021bine apeluri la distan\u021b\u0103 lung\u0103 gratuite, p\u00e2n\u0103 la a deveni o comunitate puternic\u0103, care de\u021bine putere geopolitic\u0103 \u0219i un loc proeminent \u00een cultura mainstream.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Tracers_in_the_Dark_de_Andy_Greenberg\"><\/span>Tracers in the Dark, de Andy Greenberg<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Conceptul de cripto-moned\u0103 a luat na\u0219tere \u00een 2008, aparent inventat\u0103 de Satoshi Nakamoto; o figur\u0103 misterioas\u0103 (\u00eenc\u0103 necunoscut\u0103 \u0219i posibil fictiv\u0103). Acest concept a pus bazele pentru Bitcoin, iar acum, aproape 20 de ani mai t\u00e2rziu, cripto-moneda a dat na\u0219tere propriei sale industrii \u0219i a fost \u00eencorporat\u0103 \u00een sistemul financiar global. Monedele cripto sunt, de asemenea, foarte populare \u00een r\u00e2ndul hackerilor, de la escrocii de duzin\u0103, la spionii \u0219i ho\u021bii sofistica\u021bi ai guvernului nord-coreean.<\/p>\n\n\n\n<p>\u00cen aceast\u0103 carte, Andy Greenberg de la Wired detaliaz\u0103 o serie de investiga\u021bii importante care s-au bazat pe urm\u0103rirea banilor digitali prin blockchain. Interviev\u00e2nd anchetatorii care au lucrat la aceste cazuri, Greenberg descrie culisele distrugerii pie\u021bei de pionierat Dark Web Silk Road, precum \u0219i opera\u021biunile \u00eempotriva pie\u021belor de hacking din dark web (Alpha Bay) \u0219i &#8220;celui mai mare&#8221; site de abuz sexual asupra copiilor din lume numit &#8220;Welcome to Video&#8221;.<\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Dark_Mirror_de_Barton_Gellman\"><\/span>Dark Mirror, de Barton Gellman<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00cen urm\u0103 cu mai bine de un deceniu, fostul angajat NSA Edward Snowden a lansat o bomb\u0103 informatic\u0103 care a dezvaluit amploarea a opera\u021biunilor globale de supraveghere ale guvernului SUA, direc\u021bion\u00e2nd mii de fi\u0219iere secrete c\u0103tre un grup de jurnali\u0219ti. Unul dintre ace\u0219ti jurnali\u0219ti a fost Barton Gellman, un reporter, pe atunci, al Washington Post, care mai t\u00e2rziu a descris \u00een cartea sa Dark Mirror povestea contactului ini\u021bial al lui Snowden \u0219i a procesului de verificare \u0219i raportare a dosarelor guvernamentale clasificate, furnizate de catre denun\u021b\u0103tor.<\/p>\n\n\n\n<p>De la monitorizarea \u00een secret a cablurilor private de fibr\u0103 optic\u0103 care conecteaz\u0103 centrele de date ale unora dintre cele mai mari companii din lume, p\u00e2n\u0103 la supravegherea ilicit\u0103 a parlamentarilor \u0219i liderilor mondiali, fi\u0219ierele detaliaz\u0103 modul \u00een care Agen\u021bia Na\u021bional\u0103 de Securitate \u0219i alia\u021bii s\u0103i globali au fost capabili s\u0103 spioneze pe aproape oricine din lume. Dark Mirror nu este doar o privire \u00eenapoi \u00eentr-un moment al istoriei, ci o relatare la persoana \u00eent\u00e2i a modului \u00een care Gellman a investigat, raportat \u0219i explorat noi perspective asupra uneia dintre cele mai influente \u0219i mai importante subiecte jurnalistice ale secolului XXI. Ar trebui s\u0103 fie o lectur\u0103 obligatorie pentru to\u021bi jurnali\u0219tii cibernetici si pasiona\u021bii de literatur\u0103 despre crim\u0103 cibernetic\u0103.<\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-icons quickshare-effect-expand quickshare-small\">\r\n\t\t<li class=\"quickshare-share\">Distribuie:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;t=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj+<+Blog+Interlink\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;text=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj+<+Blog+Interlink&amp;via=interlinkro\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;media=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fwp-content%2Fuploads%2F2025%2F07%2FO-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj-300x185.jpg&amp;description=%C3%8En+ultimii+aproximativ+30+de+ani%2C+securitatea+cibernetic%C4%83+a+trecut+de+la+statutul+de+specialitate+de+ni%C8%99%C4%83+%C3%AEn+domeniul+mai+larg+al+informaticii%2C+gener%C3%A2nd+o+intreaga+industrie+ce+graviteaz%C4%83+in+jurul+conceptului+de+crim%C4%83+cibernetic%C4%83.+Estimat%C4%83+la+peste+170+de%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;title=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj&amp;source=Blog+Interlink&amp;summary=%C3%8En+ultimii+aproximativ+30+de+ani%2C+securitatea+cibernetic%C4%83+a+trecut+de+la+statutul+de+specialitate+de+ni%C8%99%C4%83+%C3%AEn+domeniul+mai+larg+al+informaticii%2C+gener%C3%A2nd+o+intreaga+industrie+ce+graviteaz%C4%83+in+jurul+conceptului+de+crim%C4%83+cibernetic%C4%83.+Estimat%C4%83+la+peste+170+de%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/tumblr.com\/share\/link?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;name=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj+<+Blog+Interlink&amp;description=%C3%8En+ultimii+aproximativ+30+de+ani%2C+securitatea+cibernetic%C4%83+a+trecut+de+la+statutul+de+specialitate+de+ni%C8%99%C4%83+%C3%AEn+domeniul+mai+larg+al+informaticii%2C+gener%C3%A2nd+o+intreaga+industrie+ce+graviteaz%C4%83+in+jurul+conceptului+de+crim%C4%83+cibernetic%C4%83.+Estimat%C4%83+la+peste+170+de%26hellip%3B\" title=\"Share on Tumblr\" target=\"_blank\"><span class=\"quickshare-tumblr\">Tumblr<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/reddit.com\/submit?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;title=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj+<+Blog+Interlink\" title=\"Submit to Reddit\" target=\"_blank\"><span class=\"quickshare-reddit\">Reddit<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/stumbleupon.com\/submit?url=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj&amp;title=O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj+<+Blog+Interlink\" target=\"_blank\" title=\"Share on StumbleUpon\"><span class=\"quickshare-stumbleupon\">Stumble Upon<\/span><\/a><\/li>\t\t<li><a href=\"mailto:?subject=Blog+Interlink:+O+scurt%C4%83+list%C4%83+de+c%C4%83r%C8%9Bi+despre+crim%C4%83+cibernetic%C4%83+si+spionaj&amp;body=https%3A%2F%2Fwww.interlink.ro%2Fblog%2Fo-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Timp de citit: <\/span> <span class=\"rt-time\"> 5<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\u00cen ultimii aproximativ 30 de ani, securitatea cibernetic\u0103 a trecut de la statutul de specialitate de ni\u0219\u0103 \u00een domeniul mai larg al informaticii, gener\u00e2nd o intreaga industrie ce graviteaz\u0103 in jurul conceptului de crim\u0103 cibernetic\u0103. Estimat\u0103 la peste 170 de miliarde de dolari, aceast\u0103 industrie, este format\u0103 dintr-o comunitate de hackeri care se \u00eentinde pe &hellip; <a href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj<\/span><\/a><\/p>\n","protected":false},"author":11805,"featured_media":3850,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[2799,2801,2800,2802],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj - Interlink.ro<\/title>\n<meta name=\"description\" content=\"O scurta lista de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103, recomandate de comunit\u0103tile de cititori de pe Mastodon \u0219i Bluesky\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj - Interlink.ro\" \/>\n<meta property=\"og:description\" content=\"O scurta lista de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103, recomandate de comunit\u0103tile de cititori de pe Mastodon \u0219i Bluesky\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\" \/>\n<meta property=\"og:site_name\" content=\"Blog Interlink\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/interlinksrl\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-26T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T09:39:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandru C\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/#organization\",\"name\":\"INTERLINK GROUP SRL\",\"url\":\"https:\/\/www.interlink.ro\/blog\/\",\"sameAs\":[\"http:\/\/facebook.com\/interlinksrl\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2022\/02\/logo.png\",\"contentUrl\":\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2022\/02\/logo.png\",\"width\":175,\"height\":76,\"caption\":\"INTERLINK GROUP SRL\"},\"image\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/#website\",\"url\":\"https:\/\/www.interlink.ro\/blog\/\",\"name\":\"Blog Interlink\",\"description\":\"Stiri It, Informatii, Anunturi, Produse\",\"publisher\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.interlink.ro\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg\",\"contentUrl\":\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg\",\"width\":825,\"height\":510,\"caption\":\"O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage\",\"url\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\",\"name\":\"O scurt\\u0103 list\\u0103 de c\\u0103r\\u021bi despre crim\\u0103 cibernetic\\u0103 si spionaj - Interlink.ro\",\"isPartOf\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage\"},\"datePublished\":\"2025-07-26T08:00:00+00:00\",\"dateModified\":\"2025-07-28T09:39:16+00:00\",\"description\":\"O scurta lista de c\\u0103r\\u021bi despre crim\\u0103 cibernetic\\u0103, recomandate de comunit\\u0103tile de cititori de pe Mastodon \\u0219i Bluesky\",\"breadcrumb\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.interlink.ro\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Diverse\",\"item\":\"https:\/\/www.interlink.ro\/blog\/category\/diverse\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"O scurt\\u0103 list\\u0103 de c\\u0103r\\u021bi despre crim\\u0103 cibernetic\\u0103 si spionaj\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage\"},\"author\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/#\/schema\/person\/126d8be5dc3dc73c4ff3e4ec6a6a627f\"},\"headline\":\"O scurt\\u0103 list\\u0103 de c\\u0103r\\u021bi despre crim\\u0103 cibernetic\\u0103 si spionaj\",\"datePublished\":\"2025-07-26T08:00:00+00:00\",\"dateModified\":\"2025-07-28T09:39:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage\"},\"wordCount\":1598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg\",\"keywords\":[\"crim\\u0103 cibernetic\\u0103\",\"literatur\\u0103\",\"securitate cibernetic\\u0103\",\"spionaj\"],\"articleSection\":[\"Diverse\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/#\/schema\/person\/126d8be5dc3dc73c4ff3e4ec6a6a627f\",\"name\":\"Alexandru C\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.interlink.ro\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4798bc5da087bb02d31f0a4c0712c3c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4798bc5da087bb02d31f0a4c0712c3c?s=96&d=mm&r=g\",\"caption\":\"Alexandru C\"},\"url\":\"https:\/\/www.interlink.ro\/blog\/author\/alexandruc\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj - Interlink.ro","description":"O scurta lista de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103, recomandate de comunit\u0103tile de cititori de pe Mastodon \u0219i Bluesky","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj","og_locale":"en_US","og_type":"article","og_title":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj - Interlink.ro","og_description":"O scurta lista de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103, recomandate de comunit\u0103tile de cititori de pe Mastodon \u0219i Bluesky","og_url":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj","og_site_name":"Blog Interlink","article_publisher":"http:\/\/facebook.com\/interlinksrl","article_published_time":"2025-07-26T08:00:00+00:00","article_modified_time":"2025-07-28T09:39:16+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Alexandru C","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.interlink.ro\/blog\/#organization","name":"INTERLINK GROUP SRL","url":"https:\/\/www.interlink.ro\/blog\/","sameAs":["http:\/\/facebook.com\/interlinksrl"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.interlink.ro\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2022\/02\/logo.png","contentUrl":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2022\/02\/logo.png","width":175,"height":76,"caption":"INTERLINK GROUP SRL"},"image":{"@id":"https:\/\/www.interlink.ro\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.interlink.ro\/blog\/#website","url":"https:\/\/www.interlink.ro\/blog\/","name":"Blog Interlink","description":"Stiri It, Informatii, Anunturi, Produse","publisher":{"@id":"https:\/\/www.interlink.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.interlink.ro\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage","inLanguage":"en-US","url":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg","contentUrl":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg","width":825,"height":510,"caption":"O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj"},{"@type":"WebPage","@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage","url":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj","name":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj - Interlink.ro","isPartOf":{"@id":"https:\/\/www.interlink.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage"},"datePublished":"2025-07-26T08:00:00+00:00","dateModified":"2025-07-28T09:39:16+00:00","description":"O scurta lista de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103, recomandate de comunit\u0103tile de cititori de pe Mastodon \u0219i Bluesky","breadcrumb":{"@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.interlink.ro\/blog"},{"@type":"ListItem","position":2,"name":"Diverse","item":"https:\/\/www.interlink.ro\/blog\/category\/diverse"},{"@type":"ListItem","position":3,"name":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj"}]},{"@type":"Article","@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#article","isPartOf":{"@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage"},"author":{"@id":"https:\/\/www.interlink.ro\/blog\/#\/schema\/person\/126d8be5dc3dc73c4ff3e4ec6a6a627f"},"headline":"O scurt\u0103 list\u0103 de c\u0103r\u021bi despre crim\u0103 cibernetic\u0103 si spionaj","datePublished":"2025-07-26T08:00:00+00:00","dateModified":"2025-07-28T09:39:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#webpage"},"wordCount":1598,"commentCount":0,"publisher":{"@id":"https:\/\/www.interlink.ro\/blog\/#organization"},"image":{"@id":"https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#primaryimage"},"thumbnailUrl":"https:\/\/www.interlink.ro\/blog\/wp-content\/uploads\/2025\/07\/O-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj.jpg","keywords":["crim\u0103 cibernetic\u0103","literatur\u0103","securitate cibernetic\u0103","spionaj"],"articleSection":["Diverse"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.interlink.ro\/blog\/o-scurta-lista-de-carti-despre-crima-cibernetica-si-spionaj#respond"]}]},{"@type":"Person","@id":"https:\/\/www.interlink.ro\/blog\/#\/schema\/person\/126d8be5dc3dc73c4ff3e4ec6a6a627f","name":"Alexandru C","image":{"@type":"ImageObject","@id":"https:\/\/www.interlink.ro\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/c4798bc5da087bb02d31f0a4c0712c3c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4798bc5da087bb02d31f0a4c0712c3c?s=96&d=mm&r=g","caption":"Alexandru C"},"url":"https:\/\/www.interlink.ro\/blog\/author\/alexandruc"}]}},"_links":{"self":[{"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/posts\/3806"}],"collection":[{"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/users\/11805"}],"replies":[{"embeddable":true,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/comments?post=3806"}],"version-history":[{"count":6,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/posts\/3806\/revisions"}],"predecessor-version":[{"id":3814,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/posts\/3806\/revisions\/3814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/media\/3850"}],"wp:attachment":[{"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/media?parent=3806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/categories?post=3806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.interlink.ro\/blog\/wp-json\/wp\/v2\/tags?post=3806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}