{"id":31097,"date":"2018-11-02T14:00:28","date_gmt":"2018-11-02T14:00:28","guid":{"rendered":"https:\/\/www.eudonet.com\/dealing-with-blackmail-email\/"},"modified":"2025-11-26T14:06:47","modified_gmt":"2025-11-26T14:06:47","slug":"dealing-with-blackmail-email","status":"publish","type":"post","link":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/","title":{"rendered":"Dealing with blackmail email"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_77 et_section_regular\">\n<div class=\"et_pb_row et_pb_row_274\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_341  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_671  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>NetAnswer takes care of the security of your data every day. In particular, we have implemented irreversible password encryption that makes it impossible for even NetAnswer to access them. However, some of our customers, and probably some of their members, receive ransomware emails where their passwords are written in clear text. Here is the cause.<\/p>\n<p>For more than a year, a large e-mail scam campaign has been going on. It consists of blackmail in exchange for a payment via Bitcoin to ensure the hacker\u2019s silence.<\/p>\n<p>Here\u2019s what the email may look like:<\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_330\">\n<p><span class=\"et_pb_image_wrap \"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-15177\" title=\"mailChantage\" src=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/mailChantage.png\" sizes=\"(max-width: 1222px) 100vw, 1222px\" srcset=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/mailChantage.png 1222w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/mailChantage-300x265.png 300w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/mailChantage-768x679.png 768w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/mailChantage-1024x905.png 1024w\" alt=\"\" width=\"1222\" height=\"1080\" \/><\/span><\/p>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_672  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>The hacker claims that there was a security breach in your router, that a virus (trojan) infected your computer in order to retrieve your password and contacts, that screenshots of sites not divulgeable to your entourage were taken or that your webcam was monitored and images of you recorded during intimate moments.<\/p>\n<p>There are 3 reasons why this scam has been so successful:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">the sender of the e-mail usually uses the victim\u2019s address or a business address close to the victim, as its technicality allows it to pass the spam filters,<\/li>\n<li style=\"font-weight: 400;\">the allegations made against the victim are likely to be heard, as pornographic sites are among the most visited in the world<\/li>\n<li style=\"font-weight: 400;\">the sender of this e-mail claims to have hacked the recipient\u2019s account, providing his password as proof.<\/li>\n<\/ul>\n<p>If this last point has convinced many victims, rest assured, there is little chance that your computer has been infected and checked. Indeed, the fact that the hacker can display your password \u00ab\u00a0simply\u00a0\u00bb and unfortunately reveals a leak of your data on another site. Indeed in 2012, Linkedin, DropBox, Facebook have all been hacked, so there are historical databases of old passwords that surely look like recently used passwords\u2026 because very often passwords are not changed, or if they are, they vary very little (adding or changing one or more characters, changing the date\u2026).<\/p>\n<p>First thing to do, fill in your e-mail addresses using the same password on this site: https:\/\/haveibeenpwned.com\/ which lists all the addresses that have been leaked on sites of varying sizes, such as LinkedIn for example. If you use the same password as the leaked addresses, it is not surprising to see it displayed in the email you received.<\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_331\">\n<p><span class=\"et_pb_image_wrap \"><img decoding=\"async\" class=\"wp-image-15179\" title=\"haveibeenpwned\" src=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/haveibeenpwned-e1541173482546.png\" sizes=\"(max-width: 1920px) 100vw, 1920px\" srcset=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/haveibeenpwned-e1541173482546.png 1920w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/haveibeenpwned-e1541173482546-300x112.png 300w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/haveibeenpwned-e1541173482546-768x286.png 768w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/haveibeenpwned-e1541173482546-1024x381.png 1024w\" alt=\"\" width=\"1920\" height=\"715\" \/><\/span><\/p>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_673  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Then, make sure that all the accounts where you use the same password have not been altered and change your password immediately (we will carefully avoid birth dates or other \u00ab\u00a01234\u00a0\u00bb). We can only advise you to have different passwords per site.<\/p>\n<p>To manage your passwords, you can look at LastPass, Dashlane or 1Password.<\/p>\n<p>Finally, even if your computer has not been infected, you can scan your computer (for free) with Malwarebytes available for download here. Even if these emails are not risky in themselves, they remind us of the need not to take the management of our data lightly. To learn more, we invite you to take the ANSSI MOOC for free (until April 2019): https:\/\/secnumacademie.gouv.fr\/ which will train you in the basics of cybersecurity or allow you to deepen your knowledge.<\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_332\">\n<p><span class=\"et_pb_image_wrap \"><img decoding=\"async\" class=\"wp-image-15181\" title=\"moocANSSI\" src=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/moocANSSI.png\" sizes=\"(max-width: 1920px) 100vw, 1920px\" srcset=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/moocANSSI.png 1920w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/moocANSSI-300x169.png 300w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/moocANSSI-768x432.png 768w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/moocANSSI-1024x576.png 1024w\" alt=\"\" width=\"1920\" height=\"1080\" \/><\/span><\/p>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_674  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>In the meantime, you can follow some simple rules, namely not to use the same password for different sites, to ensure the complexity of these passwords, not to install pirate copies of games or software that may include a trojan and to regularly scan your system.<\/p>\n<p>A humorous note to finish, from the CommitStrip webcomic, which illustrates the most used password from 2013 to 2017 namely \u00ab\u00a0123456\u00a0\u00bb.<\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_333\">\n<p><span class=\"et_pb_image_wrap \"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15207\" title=\"comicMotDePasse\" src=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/comicMotDePasse.png\" sizes=\"(max-width: 800px) 100vw, 800px\" srcset=\"https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/comicMotDePasse.png 800w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/comicMotDePasse-300x255.png 300w, https:\/\/www.netanswer.fr\/wp-content\/uploads\/2018\/11\/comicMotDePasse-768x652.png 768w\" alt=\"\" width=\"800\" height=\"679\" \/><\/span><\/p>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_675  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Useful links:<\/p>\n<ul>\n<li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.arnaque-chantage-webcam.com\/blog\/fausse-arnaque-webcam-bitcoin-rdp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.arnaque-chantage-webcam.com\/blog\/fausse-arnaque-webcam-bitcoin-rdp\/<\/span><\/a><\/span><\/li>\n<li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/withoutbullshit.com\/blog\/a-second-bitcoin-blackmail-scam-based-on-hacked-passwords\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/withoutbullshit.com\/blog\/a-second-bitcoin-blackmail-scam-based-on-hacked-passwords<\/span><\/a><\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_275\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_342  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_676  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p style=\"text-align: center;\">\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NetAnswer takes care of the security of your data every day. In particular, we have implemented irreversible password encryption that makes it impossible for even NetAnswer to access them. However, some of our customers, and probably some of their members, receive ransomware emails where their passwords are written in clear text. Here is the cause. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":27860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"How to Deal With Blackmail Email? | Eudonet","_yoast_wpseo_metadesc":"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.","footnotes":""},"tags":[],"sectors":[88],"solutions":[96],"class_list":["post-31097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"article_suptitle":"","article_short_desc":"","article_caption":"","article_related":"","author_name":"Karima BOUCHEHAIT","author_link":"https:\/\/www.linkedin.com\/in\/karima-bouchehait-b2b-sales\/","author_photo":31302,"author_bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Deal With Blackmail Email? | Eudonet<\/title>\n<meta name=\"description\" content=\"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dealing with blackmail email\" \/>\n<meta property=\"og:description\" content=\"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Eudonet\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-02T14:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T14:06:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Willy Bellony\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Willy Bellony\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/\",\"url\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/\",\"name\":\"How to Deal With Blackmail Email? | Eudonet\",\"isPartOf\":{\"@id\":\"https:\/\/www.eudonet.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png\",\"datePublished\":\"2018-11-02T14:00:28+00:00\",\"dateModified\":\"2025-11-26T14:06:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/b2495db7ff9b68cf8a934e142f1d53d0\"},\"description\":\"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage\",\"url\":\"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png\",\"contentUrl\":\"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png\",\"width\":800,\"height\":525},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.eudonet.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dealing with blackmail email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eudonet.com\/en\/#website\",\"url\":\"https:\/\/www.eudonet.com\/en\/\",\"name\":\"Eudonet\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eudonet.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/b2495db7ff9b68cf8a934e142f1d53d0\",\"name\":\"Willy Bellony\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a77ef4b5b407ec5c311be341cc26e77a93bb0f64280bac5ceb05494a217bba8c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a77ef4b5b407ec5c311be341cc26e77a93bb0f64280bac5ceb05494a217bba8c?s=96&d=mm&r=g\",\"caption\":\"Willy Bellony\"}},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Eudonet\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Deal With Blackmail Email? | Eudonet","description":"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/","og_locale":"en_US","og_type":"article","og_title":"Dealing with blackmail email","og_description":"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.","og_url":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/","og_site_name":"Eudonet","article_published_time":"2018-11-02T14:00:28+00:00","article_modified_time":"2025-11-26T14:06:47+00:00","og_image":[{"width":800,"height":525,"url":"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png","type":"image\/png"}],"author":"Willy Bellony","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Willy Bellony","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/","url":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/","name":"How to Deal With Blackmail Email? | Eudonet","isPartOf":{"@id":"https:\/\/www.eudonet.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage"},"image":{"@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png","datePublished":"2018-11-02T14:00:28+00:00","dateModified":"2025-11-26T14:06:47+00:00","author":{"@id":"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/b2495db7ff9b68cf8a934e142f1d53d0"},"description":"Large e-mail scam campaigns have been underway. With Eudonet, learn what it consists of and how to protect your data from this threat.","breadcrumb":{"@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#primaryimage","url":"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png","contentUrl":"https:\/\/www.eudonet.com\/wp-content\/uploads\/2025\/09\/001-general-blog-3.png","width":800,"height":525},{"@type":"BreadcrumbList","@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.eudonet.com\/en\/"},{"@type":"ListItem","position":2,"name":"Dealing with blackmail email"}]},{"@type":"WebSite","@id":"https:\/\/www.eudonet.com\/en\/#website","url":"https:\/\/www.eudonet.com\/en\/","name":"Eudonet","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eudonet.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/b2495db7ff9b68cf8a934e142f1d53d0","name":"Willy Bellony","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eudonet.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a77ef4b5b407ec5c311be341cc26e77a93bb0f64280bac5ceb05494a217bba8c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a77ef4b5b407ec5c311be341cc26e77a93bb0f64280bac5ceb05494a217bba8c?s=96&d=mm&r=g","caption":"Willy Bellony"}},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eudonet.com\/en\/resources\/blog\/dealing-with-blackmail-email\/#local-main-organization-logo","url":"","contentUrl":"","caption":"Eudonet"}]}},"_links":{"self":[{"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/posts\/31097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/comments?post=31097"}],"version-history":[{"count":1,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/posts\/31097\/revisions"}],"predecessor-version":[{"id":32282,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/posts\/31097\/revisions\/32282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/media\/27860"}],"wp:attachment":[{"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/media?parent=31097"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/tags?post=31097"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/sectors?post=31097"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/www.eudonet.com\/en\/wp-json\/wp\/v2\/solutions?post=31097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}