{"id":6075,"date":"2025-08-24T11:19:44","date_gmt":"2025-08-24T08:19:44","guid":{"rendered":"https:\/\/kriminalbilisim.com\/istanbul-digital-forensics-investigation\/"},"modified":"2025-09-23T01:39:03","modified_gmt":"2025-09-22T22:39:03","slug":"istanbul-digital-forensics-investigation","status":"publish","type":"page","link":"https:\/\/kriminalbilisim.com\/en\/istanbul-digital-forensics-investigation\/","title":{"rendered":"Istanbul Digital Forensics Investigation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6075\" class=\"elementor elementor-6075 elementor-4422\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-632620e e-flex e-con-boxed e-con e-parent\" data-id=\"632620e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22c99f3 elementor-widget elementor-widget-text-editor\" data-id=\"22c99f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 data-start=\"0\" data-end=\"71\"><span style=\"color: #000000;\">Istanbul Digital Forensics Investigation \u2013 DNA Criminal and Digital Forensics Consultancy<\/span><\/h1><p data-start=\"73\" data-end=\"555\"><span style=\"color: #000000;\"><strong>Istanbul digital forensics investigation<\/strong> is one of the leading cities where <strong>Istanbul<\/strong> <strong data-start=\"130\" data-end=\"149\">cybercrime<\/strong>, <strong>Istanbul<\/strong> <strong data-start=\"151\" data-end=\"177\">digital evidence examination<\/strong> and <strong>Istanbul<\/strong> <strong data-start=\"181\" data-end=\"199\">cybersecurity<\/strong> needs are most intensely experienced, as the heart of finance and technology ecosystem. <strong data-start=\"260\" data-end=\"305\">Istanbul Criminal, Istanbul Digital Forensics<\/strong>, <strong>Istanbul<\/strong> <strong data-start=\"319\" data-end=\"339\">digital forensics investigation<\/strong> manages end-to-end processes with its expert team and technical infrastructure; <strong>Istanbul<\/strong> <strong data-start=\"406\" data-end=\"422\">digital forensics<\/strong>,    Provides professional solutions in critical areas such as <strong>Istanbul<\/strong> <strong data-start=\"424\" data-end=\"441\">data recovery<\/strong>, <strong>Istanbul<\/strong> <strong data-start=\"443\" data-end=\"467\">mobile device examination<\/strong>, <strong>Istanbul<\/strong> <strong data-start=\"469\" data-end=\"504\">email and social media analysis<\/strong>.<\/span><\/p><hr data-start=\"557\" data-end=\"560\"><h2 data-start=\"562\" data-end=\"622\"><span style=\"color: #000000;\">Istanbul Criminal, Istanbul Digital, Istanbul Digital Forensics Investigation?<\/span><\/h2><ul data-start=\"624\" data-end=\"1268\"><li data-start=\"624\" data-end=\"812\"><p data-start=\"626\" data-end=\"812\"><span style=\"color: #000000;\"><strong data-start=\"626\" data-end=\"662\">Digital evidence collection and analysis:<\/strong> Forensic imaging of computers, servers, cloud accounts, mobile devices and external storage, <strong data-start=\"751\" data-end=\"766\">log analysis<\/strong> and <strong data-start=\"770\" data-end=\"809\">timeline extraction<\/strong>.<\/span><\/p><\/li><li data-start=\"813\" data-end=\"985\"><p data-start=\"815\" data-end=\"985\"><span style=\"color: #000000;\"><strong data-start=\"815\" data-end=\"845\">Cyber threat detection:<\/strong> Technical investigation of <strong data-start=\"846\" data-end=\"871\">phishing<\/strong>, <strong data-start=\"873\" data-end=\"892\">malware<\/strong>, <strong data-start=\"894\" data-end=\"921\">corporate data leakage<\/strong> and <strong data-start=\"925\" data-end=\"952\">financial fraud<\/strong> cases.<\/span><\/p><\/li><li data-start=\"986\" data-end=\"1156\"><p data-start=\"988\" data-end=\"1156\"><span style=\"color: #000000;\"><strong data-start=\"988\" data-end=\"1013\">Legal process support:<\/strong> <strong data-start=\"1014\" data-end=\"1048\">Expert witness qualified forensic reports<\/strong>, <strong data-start=\"1050\" data-end=\"1099\">chain of custody<\/strong> management, and court-admissible documentation.<\/span><\/p><\/li><li data-start=\"1157\" data-end=\"1268\"><p data-start=\"1159\" data-end=\"1268\"><span style=\"color: #000000;\"><strong data-start=\"1159\" data-end=\"1190\">GDPR compliance and risk mitigation:<\/strong> <strong data-start=\"1225\" data-end=\"1256\">Cybersecurity consulting<\/strong> and auditing in compliance with <strong data-start=\"1191\" data-end=\"1199\">GDPR<\/strong> and related regulations.<\/span><\/p><\/li><\/ul><p data-start=\"1270\" data-end=\"1442\"><span style=\"color: #000000;\">As <strong data-start=\"1270\" data-end=\"1315\">DNA Criminal and Digital Forensics<\/strong>, <strong>Istanbul digital forensics investigation<\/strong> applies a fast, traceable methodology that preserves evidence integrity for both <strong data-start=\"1333\" data-end=\"1345\">individuals<\/strong> and <strong data-start=\"1353\" data-end=\"1365\">organizations<\/strong>.<\/span><\/p><hr data-start=\"1444\" data-end=\"1447\"><h2 data-start=\"1449\" data-end=\"1491\"><span style=\"color: #000000;\">Istanbul Digital Forensics Investigation,<\/span><\/h2><h2 data-start=\"1449\" data-end=\"1491\"><span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Digital Forensics and<\/span> <span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Digital Evidence Examination<\/span><\/h2><ul data-start=\"1547\" data-end=\"1792\"><li data-start=\"1547\" data-end=\"1601\"><p data-start=\"1549\" data-end=\"1601\"><span style=\"color: #000000;\"><strong data-start=\"1581\" data-end=\"1599\">Forensic image examination<\/strong> of evidence collected at the scene by law enforcement and\/or in the laboratory, entered into case file,<\/span><\/p><\/li><li data-start=\"1602\" data-end=\"1716\"><p data-start=\"1604\" data-end=\"1716\"><span style=\"color: #000000;\">In-depth analysis of <strong data-start=\"1604\" data-end=\"1661\">file systems, email archives, chat records<\/strong> and <strong data-start=\"1665\" data-end=\"1684\">cloud accounts<\/strong><\/span><\/p><\/li><li data-start=\"1717\" data-end=\"1792\"><p data-start=\"1719\" data-end=\"1792\"><span style=\"color: #000000;\"><strong data-start=\"1719\" data-end=\"1755\">Expert witness standard reporting<\/strong> and <strong data-start=\"1769\" data-end=\"1785\">expert opinion<\/strong> presentation when required<\/span><\/p><\/li><\/ul><h2 data-start=\"1449\" data-end=\"1491\"><span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Data Recovery and<\/span> <span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Forensic Analysis<\/span><\/h2><ul data-start=\"1827\" data-end=\"1991\"><li data-start=\"1827\" data-end=\"1904\"><p data-start=\"1829\" data-end=\"1904\"><span style=\"color: #000000;\"><strong data-start=\"1876\" data-end=\"1902\">Data recovery Istanbul<\/strong> from deleted, encrypted or damaged media<\/span><\/p><\/li><li data-start=\"1905\" data-end=\"1991\"><p data-start=\"1907\" data-end=\"1991\"><span style=\"color: #000000;\">Verification and reporting of recovered data according to <strong data-start=\"1928\" data-end=\"1944\">digital forensics<\/strong> criteria<\/span><\/p><\/li><\/ul><h2 data-start=\"1449\" data-end=\"1491\"><span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Cybersecurity Consultancy and Testing<\/span><\/h2><ul data-start=\"2036\" data-end=\"2271\"><li data-start=\"2036\" data-end=\"2132\"><p data-start=\"2038\" data-end=\"2132\"><span style=\"color: #000000;\"><strong data-start=\"2038\" data-end=\"2082\">Penetration testing Istanbul<\/strong>, vulnerability scanning and <strong data-start=\"2104\" data-end=\"2130\">configuration audit<\/strong><\/span><\/p><\/li><li data-start=\"2133\" data-end=\"2220\"><p data-start=\"2135\" data-end=\"2220\"><span style=\"color: #000000;\"><strong data-start=\"2135\" data-end=\"2157\">Incident response (IR)<\/strong>, <strong data-start=\"2159\" data-end=\"2180\">forensic log management<\/strong>, <strong data-start=\"2182\" data-end=\"2218\">threat hunting<\/strong><\/span><\/p><\/li><li data-start=\"2221\" data-end=\"2271\"><p data-start=\"2223\" data-end=\"2271\"><span style=\"color: #000000;\">KVKK-focused <strong data-start=\"2235\" data-end=\"2261\">technical and administrative measure<\/strong> recommendations<\/span><\/p><\/li><\/ul><h2 data-start=\"1449\" data-end=\"1491\"><span style=\"color: #000000;\">Istanbul<\/span> <span style=\"color: #000000;\">Mobile Device Examination<\/span><\/h2><ul data-start=\"2298\" data-end=\"2480\"><li data-start=\"2298\" data-end=\"2412\"><p data-start=\"2300\" data-end=\"2412\"><span style=\"color: #000000;\"><strong data-start=\"2393\" data-end=\"2410\">Forensic extraction<\/strong> of <strong data-start=\"2328\" data-end=\"2369\">WhatsApp, Telegram, SMS, location data<\/strong> and media content from <strong data-start=\"2300\" data-end=\"2315\">iOS\/Android<\/strong> devices<\/span><\/p><\/li><li data-start=\"2413\" data-end=\"2480\"><p data-start=\"2415\" data-end=\"2480\"><span style=\"color: #000000;\">Analysis of application data, <strong data-start=\"2432\" data-end=\"2472\">configuration and residual artifacts<\/strong><\/span><\/p><\/li><\/ul><h3 data-start=\"2482\" data-end=\"2517\"><span style=\"color: #000000;\">Istanbul Email and Social Media Analysis<\/span><\/h3><ul data-start=\"2518\" data-end=\"2683\"><li data-start=\"2518\" data-end=\"2616\"><p data-start=\"2520\" data-end=\"2616\"><span style=\"color: #000000;\">Investigation of <strong data-start=\"2520\" data-end=\"2564\">email spoofing, phishing<\/strong>, fake accounts and <strong data-start=\"2581\" data-end=\"2603\">reputation attacks<\/strong><\/span><\/p><\/li><li data-start=\"2617\" data-end=\"2683\"><p data-start=\"2619\" data-end=\"2683\"><span style=\"color: #000000;\"><strong data-start=\"2619\" data-end=\"2641\">Social engineering<\/strong> traces and chain of custody compliant archiving<\/span><\/p><\/li><\/ul><hr data-start=\"2685\" data-end=\"2688\"><h3 data-start=\"3983\" data-end=\"4030\"><span style=\"color: #000000;\">Istanbul Digital Forensics,<\/span> <span style=\"color: #000000;\">Istanbul Data Recovery<\/span><\/h3><h3 data-start=\"3983\" data-end=\"4030\"><span style=\"color: #000000;\">Featured Use Cases<\/span><\/h3><ul data-start=\"2737\" data-end=\"3053\"><li data-start=\"2737\" data-end=\"2811\"><p data-start=\"2739\" data-end=\"2811\"><span style=\"color: #000000;\"><strong data-start=\"2739\" data-end=\"2766\">Corporate data breach<\/strong> and <strong data-start=\"2770\" data-end=\"2795\">intellectual property violation<\/strong> investigations<\/span><\/p><\/li><li data-start=\"2812\" data-end=\"2894\"><p data-start=\"2814\" data-end=\"2894\"><span style=\"color: #000000;\"><strong data-start=\"2814\" data-end=\"2843\">E-commerce fraud<\/strong>, payment fraud and chargeback disputes<\/span><\/p><\/li><li data-start=\"2895\" data-end=\"2969\"><p data-start=\"2897\" data-end=\"2969\"><span style=\"color: #000000;\"><strong data-start=\"2897\" data-end=\"2919\">Employee misconduct<\/strong>, unfair competition and contract violation investigations<\/span><\/p><\/li><li data-start=\"2970\" data-end=\"3053\"><p data-start=\"2972\" data-end=\"3053\"><span style=\"color: #000000;\">Digital evidence collection in <strong data-start=\"2972\" data-end=\"2987\">family law<\/strong> and <strong data-start=\"2991\" data-end=\"3013\">personal victimization<\/strong> cases<\/span><\/p><\/li><\/ul><hr data-start=\"3055\" data-end=\"3058\"><h2 data-start=\"3983\" data-end=\"4030\"><span style=\"color: #000000;\">Istanbul digital forensics,<\/span> <span style=\"color: #000000;\">Our Methodology: Transparent, Traceable, Court-Admissible<\/span><\/h2><ol data-start=\"3116\" data-end=\"3531\"><li data-start=\"3116\" data-end=\"3200\"><p data-start=\"3119\" data-end=\"3200\"><span style=\"color: #000000;\"><strong data-start=\"3119\" data-end=\"3158\">Initial assessment &amp; scope definition<\/strong> (Clarification of needs and objectives)<\/span><\/p><\/li><li data-start=\"3201\" data-end=\"3302\"><p data-start=\"3204\" data-end=\"3302\"><span style=\"color: #000000;\"><strong data-start=\"3204\" data-end=\"3223\">Evidence security<\/strong> (Gas bag, seal, hash values with <strong data-start=\"3264\" data-end=\"3284\">chain of custody<\/strong> documentation)<\/span><\/p><\/li><li data-start=\"3303\" data-end=\"3378\"><p data-start=\"3306\" data-end=\"3378\"><span style=\"color: #000000;\"><strong data-start=\"3306\" data-end=\"3341\">Forensic imaging &amp; laboratory analysis<\/strong> (Working only with copies)<\/span><\/p><\/li><li data-start=\"3379\" data-end=\"3456\"><p data-start=\"3382\" data-end=\"3456\"><span style=\"color: #000000;\"><strong data-start=\"3382\" data-end=\"3408\">Correlation of findings<\/strong> (Timeline, log matching, event flow)<\/span><\/p><\/li><li data-start=\"3457\" data-end=\"3531\"><p data-start=\"3460\" data-end=\"3531\"><span style=\"color: #000000;\"><strong data-start=\"3460\" data-end=\"3478\">Report and presentation<\/strong> (Clear, technical and <strong data-start=\"3496\" data-end=\"3524\">court-admissible<\/strong> report)<\/span><\/p><\/li><\/ol><hr data-start=\"3533\" data-end=\"3536\"><h2 data-start=\"3538\" data-end=\"3589\"><span style=\"color: #000000;\">Why DNA Criminal and Computer Forensics Consultancy?<\/span><\/h2><ul data-start=\"3591\" data-end=\"3976\"><li data-start=\"3591\" data-end=\"3698\"><p data-start=\"3593\" data-end=\"3698\"><span style=\"color: #000000;\"><strong data-start=\"3593\" data-end=\"3621\">Istanbul digital forensics focused experience:<\/strong> Field experience in finance, retail, media, healthcare, and technology sectors<\/span><\/p><\/li><li data-start=\"3699\" data-end=\"3806\"><p data-start=\"3701\" data-end=\"3806\"><span style=\"color: #000000;\"><strong data-start=\"3701\" data-end=\"3722\">Current toolset:<\/strong> Industry-standard <strong data-start=\"3742\" data-end=\"3758\">computer forensics<\/strong>, <strong data-start=\"3760\" data-end=\"3776\">mobile analysis<\/strong> and <strong data-start=\"3780\" data-end=\"3790\">SOC\/IR<\/strong> technologies<\/span><\/p><\/li><li data-start=\"3807\" data-end=\"3893\"><p data-start=\"3809\" data-end=\"3893\"><span style=\"color: #000000;\"><strong data-start=\"3809\" data-end=\"3826\">Quick access:<\/strong> Rapid on-site response capability in European and Asian sides<\/span><\/p><\/li><li data-start=\"3894\" data-end=\"3976\"><p data-start=\"3896\" data-end=\"3976\"><span style=\"color: #000000;\"><strong data-start=\"3896\" data-end=\"3918\">Trust and confidentiality:<\/strong> Strict <strong data-start=\"3924\" data-end=\"3949\">non-disclosure agreements<\/strong>, <strong data-start=\"3951\" data-end=\"3959\">GDPR<\/strong> and <strong data-start=\"3963\" data-end=\"3971\">ethical<\/strong> compliance<\/span><\/p><\/li><\/ul><hr data-start=\"3978\" data-end=\"3981\"><h2 data-start=\"3983\" data-end=\"4030\"><span style=\"color: #000000;\">Istanbul Digital Forensics Investigation and Istanbul Digital Forensics,<\/span> <span style=\"color: #000000;\">Istanbul Data Recovery<\/span><\/h2><p data-start=\"4032\" data-end=\"4182\"><span style=\"color: #000000;\"><strong data-start=\"4032\" data-end=\"4180\">Be\u015fikta\u015f, \u015ei\u015fli, Ka\u011f\u0131thane, Sar\u0131yer (Maslak, Levent), Kad\u0131k\u00f6y, Ata\u015fehir, \u00dcsk\u00fcdar, Maltepe, Bak\u0131rk\u00f6y, Ba\u015fak\u015fehir, Beyo\u011flu, Fatih, Pendik, Kartal.<\/strong><\/span><\/p><blockquote data-start=\"4183\" data-end=\"4301\"><p data-start=\"4185\" data-end=\"4301\"><span style=\"color: #000000;\">Note: <strong data-start=\"4223\" data-end=\"4251\">On-site forensic examination<\/strong> and <strong data-start=\"4255\" data-end=\"4278\">remote forensic analysis<\/strong> options are available throughout Istanbul and surrounding provinces.<\/span><\/p><\/blockquote><hr data-start=\"4303\" data-end=\"4306\"><h2 data-start=\"4308\" data-end=\"4336\"><span style=\"color: #000000;\">Frequently Asked Questions (FAQ)<\/span><\/h2><p data-start=\"4338\" data-end=\"4510\"><span style=\"color: #000000;\"><strong data-start=\"4338\" data-end=\"4390\">How long does the Istanbul digital forensics investigation process take?<\/strong><\/span><br data-start=\"4390\" data-end=\"4393\"><span style=\"color: #000000;\">It depends on the case scope, data volume, and device type. We share a clear plan and schedule after initial assessment. <\/span><\/p><p data-start=\"4512\" data-end=\"4722\"><span style=\"color: #000000;\"><strong data-start=\"4512\" data-end=\"4558\">Can deleted data be fully recovered?<\/strong><\/span><br data-start=\"4558\" data-end=\"4561\"><span style=\"color: #000000;\">Success depends on factors such as device condition, whether new data has been written over it, and the file system. <strong data-start=\"4666\" data-end=\"4688\">Forensic data recovery<\/strong> aims for maximum recovery.<\/span><\/p><p data-start=\"4724\" data-end=\"4876\"><span style=\"color: #000000;\"><strong data-start=\"4724\" data-end=\"4763\">Are the reports valid in court?<\/strong><\/span><br data-start=\"4763\" data-end=\"4766\"><span style=\"color: #000000;\">Our reports are prepared according to <strong data-start=\"4779\" data-end=\"4795\">digital forensics<\/strong> standards and supported with <strong data-start=\"4830\" data-end=\"4849\">evidence integrity<\/strong> documentation.<\/span><\/p><p data-start=\"4878\" data-end=\"5017\"><span style=\"color: #000000;\"><strong data-start=\"4878\" data-end=\"4917\">Can you perform remote analysis?<\/strong><\/span><br data-start=\"4917\" data-end=\"4920\"><span style=\"color: #000000;\">Yes. In suitable cases, remote collection and examination are supported by on-site intervention when necessary. <\/span><\/p><h2><span style=\"color: #333399;\">Contact<\/span><\/h2><p><span style=\"color: #000000;\"><strong><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f3af.svg\" alt=\"\ud83c\udfaf\" title=\"\"><\/strong>  For technical support, forensic reporting, and professional defense;<\/span><\/p><p data-start=\"1307\" data-end=\"1415\"><span style=\"color: #0000ff;\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e9.svg\" alt=\"\ud83d\udce9\" width=\"21\" height=\"21\" title=\"\"> <strong data-start=\"1388\" data-end=\"1415\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1390\" data-end=\"1413\">www.kriminalbilisim.com<\/a><\/strong><\/span><\/p><p data-start=\"1417\" data-end=\"1463\"><span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"https:\/\/api.whatsapp.com\/send\/?phone=905526761100&amp;text&amp;type=phone_number&amp;app_absent=0\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4de.svg\" alt=\"\ud83d\udcde\" width=\"24\" height=\"24\" title=\"\"><strong> 0552 676 11 00<\/strong><\/a> \u2013 <img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e7.svg\" alt=\"\ud83d\udce7\" width=\"22\" height=\"22\" title=\"\"> <a style=\"color: #0000ff;\" href=\"https:\/\/mail.google.com\/mail\/u\/0\/?fs=1&amp;tf=cm&amp;source=mailto&amp;to=dna@kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1440\" data-end=\"1463\">dna@kriminalbilisim.com<\/a> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Istanbul Digital Forensics Investigation \u2013 DNA Criminal and Digital Forensics Consultancy Istanbul digital forensics investigation is one of the leading cities where Istanbul cybercrime, Istanbul digital evidence examination and Istanbul cybersecurity needs are most intensely experienced, as the heart of finance and technology ecosystem. Istanbul Criminal, Istanbul Digital Forensics, Istanbul digital forensics investigation manages end-to-end [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6075","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/6075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/comments?post=6075"}],"version-history":[{"count":0,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/6075\/revisions"}],"wp:attachment":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media?parent=6075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}