{"id":4687,"date":"2009-04-19T23:22:23","date_gmt":"2009-04-19T22:22:23","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/?p=4687"},"modified":"2009-05-02T18:23:55","modified_gmt":"2009-05-02T17:23:55","slug":"usa-allo-studio-il-cyber-security-act-2009","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/","title":{"rendered":"Usa: allo studio il Cyber Security Act 2009"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><a href=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1973\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg\" alt=\"web\" width=\"240\" height=\"180\" \/><\/a>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nIl Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato all\u2019assemblea da un esponente Repubblicano e da un Democratico, ha il nome di <strong>Cyber Security Act 2009<\/strong>.<\/p>\n<p>La bozza, che discute l\u2019annoso problema della sicurezza informatica, contiene misure che stanno facendo discutere i politici e gli attivisti statunitensi.<strong> La legge propone che il completo controllo del web, sul territorio degli Stati Uniti, sia affidato al presidente in carica. <\/strong><\/p>\n<p>Il capo si stato avrebbe ampia e indiscussa facolt\u00e0 di dichiarare lo stato di emergenza nazionale e quindi rallentare il traffico internet, fino a bloccarlo, in network considerati infrastrutturali, d&#8217;importanza critica. <strong>La Casa Bianca potrebbe ordinare alle reti di aziende private (tra cui banche e ospedali) o governative di disconnettersi da internet<\/strong>, se reputate a rischio di attacchi informatici.<\/p>\n<p>Un\u2019altra novit\u00e0 riguarderebbe la funzione del Dipartimento del Commercio, vero e proprio organo di controllo secondo i dettami il nuovo Act: questo sarebbe in grado di monitorare i network contenenti dati personali privati considerati parte delle infrastrutture critiche per la sicurezza. Il Dipartimento potrebbe dunque, nelle sue attivit\u00e0 di monitoraggio, <strong>utilizzare le informazioni scovate contro gli stessi utenti,<\/strong> qualora le ritenesse importanti per la salvaguardia della sicurezza nazionale.<\/p>\n<p><!--more-->Il risultato \u00e8 che i cittadini potranno finire incriminati in qualsiasi momento per le informazioni presenti nelle banche dati, senza pi\u00f9 alcuna garanzia costituzionale. <strong>A venir meno, sarebbero anzitutto il diritto alla privacy<\/strong> e quelli che regolano la posizione dei cittadini come figure da tutelare durante le indagini di polizia, gi\u00e0 severamente calpestati dal Patriot Act del 2001.<\/p>\n<p>I senatori promotori del Cyber Security Act difendono la proposta, dicendo che \u00e8 venuto il momento di difendere le infrastrutture internet dagli attacchi, con la stessa gravit\u00e0 che gi\u00e0 ora si usa per le reti elettriche e gli acquedotti.<\/p>\n<p>Il rischio \u00e8 per\u00f2 quello di un ulteriore rinforzarsi dei poteri statali e delle forze dell\u2019ordine a danno della libert\u00e0 dei singoli cittadini, con tutte le derive strumentali e laterali immaginabili.<\/p>\n<p>Fonte: <a href=\"http:\/\/quomedia.diesis.it\/\" target=\"_blank\"><em><strong>Quo Media<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Il Senato americano sta discutendo una nuova legge sulla sicurezza<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[2855],"class_list":["post-4687","post","type-post","status-publish","format-standard","hentry","category-web","tag-cyber-security-act-2009"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2009-04-19T22:22:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2009-05-02T17:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Usa: allo studio il Cyber Security Act 2009\",\"datePublished\":\"2009-04-19T22:22:23+00:00\",\"dateModified\":\"2009-05-02T17:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/\"},\"wordCount\":346,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/web3.jpg\",\"keywords\":[\"Cyber Security Act 2009\"],\"articleSection\":[\"Dal web\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/\",\"name\":\"Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/web3.jpg\",\"datePublished\":\"2009-04-19T22:22:23+00:00\",\"dateModified\":\"2009-05-02T17:23:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/web3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/05\\\/web3.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/4687\\\/usa-allo-studio-il-cyber-security-act-2009\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Usa: allo studio il Cyber Security Act 2009\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine","description":"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/","og_locale":"it_IT","og_type":"article","og_title":"Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine","og_description":"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato","og_url":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/","og_site_name":"TecnoMagazine","article_published_time":"2009-04-19T22:22:23+00:00","article_modified_time":"2009-05-02T17:23:55+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Usa: allo studio il Cyber Security Act 2009","datePublished":"2009-04-19T22:22:23+00:00","dateModified":"2009-05-02T17:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/"},"wordCount":346,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg","keywords":["Cyber Security Act 2009"],"articleSection":["Dal web"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/","url":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/","name":"Usa: allo studio il Cyber Security Act 2009 - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg","datePublished":"2009-04-19T22:22:23+00:00","dateModified":"2009-05-02T17:23:55+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Il Senato americano sta discutendo una nuova legge sulla sicurezza di internet e sul controllo della rete a scopi cautelativi. Il progetto, presentato","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/05\/web3.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/4687\/usa-allo-studio-il-cyber-security-act-2009\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Usa: allo studio il Cyber Security Act 2009"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/4687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=4687"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/4687\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=4687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=4687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=4687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}