{"id":407,"date":"2010-06-27T12:39:15","date_gmt":"2010-06-27T17:39:15","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=407"},"modified":"2010-06-27T12:39:15","modified_gmt":"2010-06-27T17:39:15","slug":"gsm-a5-realtime-cell-phone-interceptor","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=407","title":{"rendered":"GSM A5 Realtime Cell Phone Interceptor"},"content":{"rendered":"<p><object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" width=\"480\" height=\"288\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"allowScriptAccess\" value=\"always\" \/><param name=\"src\" value=\"http:\/\/www.youtube.com\/v\/1eJ-WGpNQko&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\" \/><param name=\"allowfullscreen\" value=\"true\" \/><embed type=\"application\/x-shockwave-flash\" width=\"480\" height=\"288\" src=\"http:\/\/www.youtube.com\/v\/1eJ-WGpNQko&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\" allowscriptaccess=\"always\" allowfullscreen=\"true\"><\/embed><\/object><\/p>\n<p><a title=\"http:\/\/www.securitytube.net\/GSM-A5-Realtime-Cell-Phone-Interceptor-video.aspx\" href=\"http:\/\/www.securitytube.net\/GSM-A5-Realtime-Cell-Phone-Interceptor-video.aspx\" target=\"_blank\">http:\/\/www.securitytube.net\/GSM-A5-Realtime-Cell-Phone-Interceptor-video.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.securitytube.net\/GSM-A5-Realtime-Cell-Phone-Interceptor-video.aspx<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,16],"tags":[237,235,238,45,46,236],"class_list":["post-407","post","type-post","status-publish","format-standard","hentry","category-posts","category-videos","tag-cell","tag-cell-phone","tag-cell-phone-hacking","tag-gsm","tag-gsm-hacking","tag-intercepter"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=407"}],"version-history":[{"count":4,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/407\/revisions"}],"predecessor-version":[{"id":411,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/407\/revisions\/411"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=407"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}