{"id":3323,"date":"2017-03-31T21:47:02","date_gmt":"2017-04-01T01:47:02","guid":{"rendered":"\/wp-content\/uploads\/green-lock-blur.jpg"},"modified":"2017-03-31T21:47:02","modified_gmt":"2017-04-01T01:47:02","slug":"protection-concept-of-digital-and-technological-2","status":"inherit","type":"attachment","link":"https:\/\/www.connectalk.com\/fr\/protection-concept-of-digital-and-technological-2\/","title":{"rendered":"Protection concept of digital and technological."},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false},"class_list":["post-3323","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='\/wp-content\/uploads\/green-lock-blur.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"190\" src=\"\/wp-content\/uploads\/green-lock-blur-300x190.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"\/wp-content\/uploads\/green-lock-blur-300x190.jpg 300w, \/wp-content\/uploads\/green-lock-blur-768x486.jpg 768w, \/wp-content\/uploads\/green-lock-blur-1024x649.jpg 1024w, \/wp-content\/uploads\/green-lock-blur-1080x684.jpg 1080w, \/wp-content\/uploads\/green-lock-blur.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Protection concept of digital and technological. Protect mechanism, system privacy, vector illustration<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":1920,"height":1216,"file":"green-lock-blur.jpg","sizes":{"thumbnail":{"file":"green-lock-blur-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-150x150.jpg"},"medium":{"file":"green-lock-blur-300x190.jpg","width":300,"height":190,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-300x190.jpg"},"medium_large":{"file":"green-lock-blur-768x486.jpg","width":768,"height":486,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-768x486.jpg"},"large":{"file":"green-lock-blur-1024x649.jpg","width":1024,"height":649,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-1024x649.jpg"},"et-pb-post-main-image":{"file":"green-lock-blur-400x250.jpg","width":400,"height":250,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-400x250.jpg"},"et-pb-post-main-image-fullwidth":{"file":"green-lock-blur-1080x675.jpg","width":1080,"height":675,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-1080x675.jpg"},"et-pb-portfolio-image":{"file":"green-lock-blur-400x284.jpg","width":400,"height":284,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-400x284.jpg"},"et-pb-portfolio-module-image":{"file":"green-lock-blur-510x382.jpg","width":510,"height":382,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-510x382.jpg"},"et-pb-portfolio-image-single":{"file":"green-lock-blur-1080x684.jpg","width":1080,"height":684,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-1080x684.jpg"},"et-pb-gallery-module-image-portrait":{"file":"green-lock-blur-400x516.jpg","width":400,"height":516,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-400x516.jpg"},"sow-carousel-default":{"file":"green-lock-blur-272x182.jpg","width":272,"height":182,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur-272x182.jpg"},"full":{"file":"green-lock-blur.jpg","width":1920,"height":1216,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/green-lock-blur.jpg"}},"image_meta":{"aperture":"0","credit":"Getty Images\/iStockphoto","camera":"","caption":"Protection concept of digital and technological. Protect mechanism, system privacy, vector illustration","created_timestamp":"1472194800","copyright":"KrulUA","focal_length":"0","iso":"0","shutter_speed":"0","title":"Protection concept of digital and technological.","orientation":"1","keywords":["Firewall","Computer","Vector","Spy","Unlocking","Encryption","Network Security","Privacy","Computer Network","Security System","Password","Confidential","Global Communications","Computer Bug","Computer Hacker","Safe","Stealing","Padlock","Alertness","Protection","Control","Futuristic","Security","Accessibility","Concepts","Green Color","Technology","Crime","Digitally Generated Image","Lock","Internet","Computer Software","Circuit Board","Data","algorithm","cybercrime","decryption","hack","Antivirus Software","Spyware"]}},"post":null,"source_url":"\/wp-content\/uploads\/green-lock-blur.jpg","_links":{"self":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/media\/3323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/comments?post=3323"}]}}