{"id":1729,"date":"2025-08-30T21:11:11","date_gmt":"2025-08-30T21:11:11","guid":{"rendered":"https:\/\/texc.net\/?p=1729"},"modified":"2025-08-30T21:11:14","modified_gmt":"2025-08-30T21:11:14","slug":"how-a-hacker-hijacked-an-ai-tool-for-cybercrime","status":"publish","type":"post","link":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/","title":{"rendered":"How a Hacker Hijacked an AI Tool for Cybercrime"},"content":{"rendered":"\n<p>Artificial intelligence tools are often praised for boosting productivity, powering creativity, and solving complex problems. But as with most technologies, what can be used for good can also be twisted for harm. Recently, cybersecurity researchers revealed that a hacker managed to repurpose a widely used AI platform into something far more dangerous\u2014a cybercrime machine.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How It Happened<\/h2>\n\n\n\n<p>The hacker didn\u2019t build a new tool from scratch. Instead, they exploited vulnerabilities in an existing AI service designed for legitimate purposes, like data analysis and workflow automation. By modifying its backend and injecting malicious prompts, the attacker transformed the tool into a system capable of generating phishing kits, crafting malware, and even automating scams at scale.<\/p>\n\n\n\n<p>This repurposing highlights a growing trend: <strong>AI is becoming part of the cybercriminal toolkit.<\/strong> Attackers don\u2019t need to design malware the old-fashioned way anymore\u2014they can now co-opt powerful AI engines to do the heavy lifting.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">From Helpful Assistant to Threat Actor<\/h2>\n\n\n\n<p>What makes this case so alarming is how seamless the shift was. The AI system, once trusted by businesses and individual users, now:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Writes convincing phishing emails<\/strong> that mimic corporate tone and language.<\/li>\n\n\n\n<li><strong>Generates malicious code<\/strong> tailored to exploit common software vulnerabilities.<\/li>\n\n\n\n<li><strong>Automates scams<\/strong> by creating fake websites, logos, and social media content.<\/li>\n<\/ul>\n\n\n\n<p>Essentially, the AI was hijacked to provide \u201ccybercrime-as-a-service.\u201d<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why It Matters<\/h2>\n\n\n\n<p>The incident underscores three major risks tied to today\u2019s AI landscape:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Accessibility<\/strong> \u2013 AI tools are everywhere, which means attackers don\u2019t need advanced skills to weaponize them.<\/li>\n\n\n\n<li><strong>Scalability<\/strong> \u2013 Once compromised, an AI platform can mass-produce scams and malware far faster than humans.<\/li>\n\n\n\n<li><strong>Trust Erosion<\/strong> \u2013 If users begin to question whether their favorite AI tools are safe, adoption rates could slow, hurting the broader industry.<\/li>\n<\/ol>\n\n\n\n<p>Cybercriminals thrive on exploiting trust. By taking over a reputable AI tool, the hacker didn\u2019t just build a machine for attacks\u2014they also struck at the credibility of AI itself.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Bigger Picture<\/h2>\n\n\n\n<p>This case isn\u2019t just about one hacker or one platform. It\u2019s a warning shot. As AI systems grow more powerful, they also become more attractive targets. A single breach can turn a productivity app into a weapon. Without robust safeguards, oversight, and transparency, the cycle will likely repeat across different platforms.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Needs to Change<\/h2>\n\n\n\n<p>To prevent AI from becoming a breeding ground for cybercrime, developers and regulators must act quickly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stronger security protocols<\/strong> for AI APIs and backends.<\/li>\n\n\n\n<li><strong>Continuous monitoring<\/strong> to detect unusual or malicious activity.<\/li>\n\n\n\n<li><strong>Transparency<\/strong> in how AI models are being updated and used.<\/li>\n\n\n\n<li><strong>User education<\/strong> to help people spot when AI-generated content might be harmful.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thought<\/h2>\n\n\n\n<p>AI\u2019s promise is immense\u2014but so is its risk when placed in the wrong hands. The story of a hacker turning a popular AI tool into a cybercrime machine proves that the future of AI isn\u2019t just about innovation. It\u2019s also about security, responsibility, and staying one step ahead of those eager to twist powerful tools for malicious gain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence tools are often praised for boosting productivity, powering creativity, and solving complex problems. But as with most technologies, what can be used for good can also be twisted for harm. Recently, cybersecurity researchers revealed that a hacker managed to repurpose a widely used AI platform into something far more dangerous\u2014a cybercrime machine. How&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1730,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[91,123,93,90],"tags":[348,347,349],"class_list":["post-1729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-app","category-security","category-tech","tag-ai-cybercrime","tag-hacked-ai-tool","tag-malicious-ai-use"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>how-a-hacker-hijacked an-AI-tool-for-cybercrime<\/title>\n<meta name=\"description\" content=\"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"how-a-hacker-hijacked an-AI-tool-for-cybercrime\" \/>\n<meta property=\"og:description\" content=\"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Texc\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Texc.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-30T21:11:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-30T21:11:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5\"},\"headline\":\"How a Hacker Hijacked an AI Tool for Cybercrime\",\"datePublished\":\"2025-08-30T21:11:11+00:00\",\"dateModified\":\"2025-08-30T21:11:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\"},\"wordCount\":506,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/texc.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp\",\"keywords\":[\"AI cybercrime\",\"hacked AI tool\",\"malicious AI use\"],\"articleSection\":[\"A.I\",\"App\",\"Security\",\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\",\"url\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\",\"name\":\"how-a-hacker-hijacked an-AI-tool-for-cybercrime\",\"isPartOf\":{\"@id\":\"https:\/\/texc.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp\",\"datePublished\":\"2025-08-30T21:11:11+00:00\",\"dateModified\":\"2025-08-30T21:11:14+00:00\",\"description\":\"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage\",\"url\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp\",\"contentUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp\",\"width\":1536,\"height\":1024,\"caption\":\"How a Hacker Hijacked an AI Tool for Cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texc.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How a Hacker Hijacked an AI Tool for Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texc.net\/#website\",\"url\":\"https:\/\/texc.net\/\",\"name\":\"Texc\",\"description\":\"Decode the Future, One Byte at a Time\",\"publisher\":{\"@id\":\"https:\/\/texc.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texc.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texc.net\/#organization\",\"name\":\"Texc\",\"url\":\"https:\/\/texc.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png\",\"contentUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png\",\"width\":512,\"height\":512,\"caption\":\"Texc\"},\"image\":{\"@id\":\"https:\/\/texc.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Texc.net\/\",\"https:\/\/www.instagram.com\/texcstore\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/texc.net\"],\"url\":\"https:\/\/texc.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"how-a-hacker-hijacked an-AI-tool-for-cybercrime","description":"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"how-a-hacker-hijacked an-AI-tool-for-cybercrime","og_description":"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.","og_url":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/","og_site_name":"Texc","article_publisher":"https:\/\/www.facebook.com\/Texc.net\/","article_published_time":"2025-08-30T21:11:11+00:00","article_modified_time":"2025-08-30T21:11:14+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#article","isPartOf":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/"},"author":{"name":"admin","@id":"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5"},"headline":"How a Hacker Hijacked an AI Tool for Cybercrime","datePublished":"2025-08-30T21:11:11+00:00","dateModified":"2025-08-30T21:11:14+00:00","mainEntityOfPage":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/"},"wordCount":506,"commentCount":0,"publisher":{"@id":"https:\/\/texc.net\/#organization"},"image":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp","keywords":["AI cybercrime","hacked AI tool","malicious AI use"],"articleSection":["A.I","App","Security","Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/","url":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/","name":"how-a-hacker-hijacked an-AI-tool-for-cybercrime","isPartOf":{"@id":"https:\/\/texc.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp","datePublished":"2025-08-30T21:11:11+00:00","dateModified":"2025-08-30T21:11:14+00:00","description":"A hacker turned a popular AI tool into a cybercrime machine, using it to generate phishing emails, malware, and scams.","breadcrumb":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#primaryimage","url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp","contentUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-31-2025-02_03_28-AM.webp","width":1536,"height":1024,"caption":"How a Hacker Hijacked an AI Tool for Cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/texc.net\/index.php\/2025\/08\/30\/how-a-hacker-hijacked-an-ai-tool-for-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texc.net\/"},{"@type":"ListItem","position":2,"name":"How a Hacker Hijacked an AI Tool for Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/texc.net\/#website","url":"https:\/\/texc.net\/","name":"Texc","description":"Decode the Future, One Byte at a Time","publisher":{"@id":"https:\/\/texc.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texc.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texc.net\/#organization","name":"Texc","url":"https:\/\/texc.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/#\/schema\/logo\/image\/","url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png","contentUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png","width":512,"height":512,"caption":"Texc"},"image":{"@id":"https:\/\/texc.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Texc.net\/","https:\/\/www.instagram.com\/texcstore\/"]},{"@type":"Person","@id":"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/texc.net"],"url":"https:\/\/texc.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/comments?post=1729"}],"version-history":[{"count":1,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1729\/revisions"}],"predecessor-version":[{"id":1731,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1729\/revisions\/1731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/media\/1730"}],"wp:attachment":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/media?parent=1729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/categories?post=1729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/tags?post=1729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}