


{"id":24920,"date":"2020-12-03T09:00:37","date_gmt":"2020-12-03T17:00:37","guid":{"rendered":"https:\/\/expressplay.local\/?post_type=intertrustblog&#038;p=24920"},"modified":"2023-06-06T02:45:48","modified_gmt":"2023-06-06T09:45:48","slug":"common-attack-modes-used-in-the-piracy-ecosystem","status":"publish","type":"intertrustblog","link":"https:\/\/www.expressplay.com\/ko\/blog\/common-attack-modes-used-in-the-piracy-ecosystem\/","title":{"rendered":"\ubd88\ubc95 \ubcf5\uc81c \uc0dd\ud0dc\uacc4\uc5d0\uc11c \uc0ac\uc6a9\ub418\ub294 \uc77c\ubc18\uc801\uc778 \uacf5\uaca9 \ubaa8\ub4dc"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>In part three of this series, we\u2019ll look at the various attack modes used in the piracy ecosystem, including deceptive service facades and open software platforms. <\/p>","protected":false},"author":119,"featured_media":24922,"parent":0,"template":"","tax_solutions":[468],"coauthors":[609],"class_list":["post-24920","intertrustblog","type-intertrustblog","status-publish","has-post-thumbnail","hentry","tax_solutions-expressplay-drm"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/blog\/24920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/types\/intertrustblog"}],"author":[{"embeddable":true,"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/users\/119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/media\/24922"}],"wp:attachment":[{"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/media?parent=24920"}],"wp:term":[{"taxonomy":"tax_solutions","embeddable":true,"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/tax_solutions?post=24920"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.expressplay.com\/ko\/wp-json\/wp\/v2\/coauthors?post=24920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}