{"id":12898,"date":"2021-05-05T19:25:45","date_gmt":"2021-05-05T19:25:45","guid":{"rendered":"https:\/\/internetaddictsanonymous.org\/?page_id=12898"},"modified":"2026-04-11T21:36:16","modified_gmt":"2026-04-12T04:36:16","slug":"security-guidelines-for-itaa-meeting-hosts","status":"publish","type":"page","link":"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/","title":{"rendered":"Wytyczne dotycz\u0105ce bezpiecze\u0144stwa dla gospodarzy spotka\u0144 ITAA"},"content":{"rendered":"<p>Spotkania ITAA mog\u0105 by\u0107 celem destrukcyjnych trolli. Poni\u017cej znajduje si\u0119 kilka sugestii, kt\u00f3re pomog\u0105 Ci zapewni\u0107 bezpiecze\u0144stwo spotkania Zoom. Zach\u0119ca si\u0119 do zebrania grupowego sumienia i omawiania plan\u00f3w zapobiegania zak\u0142\u00f3ceniom i reagowania na nie. <strong>Poni\u017cej mo\u017cna znale\u017a\u0107 prezentacj\u0119 wideo sugestii <a href=\"https:\/\/www.loom.com\/share\/0962dd4d02924e9caa30ff0ee7ec326e?sid=cb36c3e4-46ac-45b0-8550-04b095fab1ef\" target=\"_blank\" rel=\"noreferrer noopener\">tutaj<\/a>.<\/strong><\/p>\n\n\n\n<p><em>Nale\u017cy pami\u0119ta\u0107, \u017ce te \u015brodki bezpiecze\u0144stwa s\u0105 przeznaczone tylko dla os\u00f3b celowo zak\u0142\u00f3caj\u0105cych spok\u00f3j, a nie do cenzurowania prawdziwych uczestnik\u00f3w przed udost\u0119pnianiem, nawet je\u015bli to, co m\u00f3wi\u0105, mo\u017ce by\u0107 wyzwalane dla innych. Jak m\u00f3wi nasza trzecia tradycja, jedynym wymogiem cz\u0142onkostwa w ITAA jest ch\u0119\u0107 zaprzestania kompulsywnego korzystania z Internetu i technologii.<\/em> <em>Aby odpowiedzie\u0107 na niew\u0142a\u015bciwe zachowanie innych cz\u0142onk\u00f3w ITAA, zapoznaj si\u0119 z naszym zasobem na stronie <a href=\"https:\/\/internetaddictsanonymous.org\/pl\/safety-in-itaa\/\" type=\"page\" id=\"13073\">Bezpiecze\u0144stwo w ITAA<\/a>.<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Je\u015bli wyst\u0105pi\u0105 zak\u0142\u00f3cenia<\/mark><\/strong>, <em>upewnij si\u0119, \u017ce odebra\u0142e\u015b kod hosta<\/em> i kliknij przycisk \u201eBezpiecze\u0144stwo\u201d u do\u0142u ekranu Zoom (w kszta\u0142cie tarczy) i naci\u015bnij czerwony przycisk \u201eZawie\u015b dzia\u0142ania uczestnika\u201d. <strong>Jest to najszybszy spos\u00f3b na zako\u0144czenie bombardowania z zoomem.<\/strong> B\u0119dziesz musia\u0142 nacisn\u0105\u0107 drugi czerwony przycisk \u201eWstrzymaj\u201d w wyskakuj\u0105cym okienku, aby potwierdzi\u0107. Spowoduje to wy\u0142\u0105czenie obrazu i d\u017awi\u0119ku, czatu, uniemo\u017cliwi u\u017cytkownikom zmian\u0119 nazwy i zablokuje spotkanie (co uniemo\u017cliwi do\u0142\u0105czenie nowym u\u017cytkownikom). Nast\u0119pnie mo\u017cesz usun\u0105\u0107 zak\u0142\u00f3caj\u0105cego uczestnika <strong>i zg\u0142o\u015b je Zoomowi<\/strong>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Aby odebra\u0107 kod hosta<\/mark><\/strong>, kliknij zak\u0142adk\u0119 \u201eUczestnicy\u201d u do\u0142u ekranu Zoom, aby otworzy\u0107 pasek boczny uczestnik\u00f3w. W prawym dolnym rogu paska bocznego znajduje si\u0119 przycisk \u201eOdbierz hosta\u201d. Po klikni\u0119ciu zostaniesz poproszony o podanie kodu hosta. Og\u00f3lnie rzecz bior\u0105c, zalecamy przybycie na spotkanie kilka minut wcze\u015bniej i wprowadzenie kodu gospodarza, aby by\u0107 przygotowanym. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Uczy\u0144 co najmniej jednego zaufanego cz\u0142onka wsp\u00f3\u0142gospodarzem Zoom<\/mark><\/strong>. Wsp\u00f3\u0142gospodarze maj\u0105 dost\u0119p do wszystkich kontroli bezpiecze\u0144stwa Zoom. Aby uczyni\u0107 kogo\u015b wsp\u00f3\u0142gospodarzem, kliknij \u201e\u2026\u201d w prawym g\u00f3rnym rogu kwadratu wideo tej osoby lub obok jej nazwy na pasku bocznym uczestnika. Zanim mianujesz ich wsp\u00f3\u0142gospodarzami, upewnij si\u0119, \u017ce rozpoznajesz ich g\u0142os lub \u017ce maj\u0105 w\u0142\u0105czone wideo, poniewa\u017c bombowcy zoom czasami podszywaj\u0105 si\u0119 pod innych cz\u0142onk\u00f3w. Podczas spotkania mo\u017cesz chcie\u0107 ustanowi\u0107 sta\u0142\u0105 osob\u0119 zajmuj\u0105c\u0105 si\u0119 obs\u0142ug\u0105 techniczn\u0105, kt\u00f3ra pomo\u017ce w zarz\u0105dzaniu ustawieniami zabezpiecze\u0144 i usuwaniu zak\u0142\u00f3caj\u0105cych porz\u0105dku cz\u0142onk\u00f3w.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Poczekalnia. <\/strong>Mo\u017cesz w\u0142\u0105czy\u0107 poczekalni\u0119, klikaj\u0105c przycisk \u201eZabezpieczenia\u201d u do\u0142u ekranu powi\u0119kszenia. Mo\u017cesz poczeka\u0107 oko\u0142o minuty, zanim wpu\u015bcisz nieznane nazwiska na spotkanie. Trolle maj\u0105 tendencj\u0119 do do\u0142\u0105czania do spotka\u0144 w po\u0142owie spotkania i pracy w grupach, wi\u0119c je\u015bli w \u015brodku spotkania zobaczysz grup\u0119 os\u00f3b do\u0142\u0105czaj\u0105cych do poczekalni jednocze\u015bnie, jest to znak, \u017ce mog\u0105 by\u0107 trollami (szczeg\u00f3lnie, je\u015bli maj\u0105 nienormalne nazwy u\u017cytkownika, takich jak s\u0142awna celebrytka). Je\u015bli nie masz pewno\u015bci, mo\u017cesz chcie\u0107 przyj\u0105\u0107 uczestnik\u00f3w, ale b\u0105d\u017a czujny i gotowy do podj\u0119cia szybkich dzia\u0142a\u0144 w przypadku wyst\u0105pienia jakichkolwiek zak\u0142\u00f3ce\u0144.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Wy\u0142\u0105cz mo\u017cliwo\u015b\u0107 wy\u0142\u0105czania wyciszenia przez uczestnik\u00f3w<\/strong>. Mo\u017cesz to zrobi\u0107, klikaj\u0105c przycisk \u201cBezpiecze\u0144stwo\u201d. Uczestnicy b\u0119d\u0105 musieli podnie\u015b\u0107 r\u0119ce (lub nacisn\u0105\u0107 *9, je\u015bli si\u0119 loguj\u0105), a nast\u0119pnie gospodarz b\u0119dzie m\u00f3g\u0142 ich wyciszy\u0107. Zapobiegnie to przerywaniu przez trolle podczas udost\u0119pniania. Alternatywnie mo\u017cesz wy\u0142\u0105czy\u0107 uczestnikom mo\u017cliwo\u015b\u0107 wyciszenia siebie tylko wtedy, gdy kto\u015b udost\u0119pnia, a nast\u0119pnie ponownie w\u0142\u0105czy\u0107 t\u0119 mo\u017cliwo\u015b\u0107 po zako\u0144czeniu udost\u0119pniania. Zapobiegnie to przerywaniu, a jednocze\u015bnie umo\u017cliwi uczestnikom wyciszenie siebie (bez konieczno\u015bci podnoszenia r\u0119ki), gdy poczuj\u0105 potrzeb\u0119 udost\u0119pnienia.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Wy\u0142\u0105cz mo\u017cliwo\u015b\u0107 zmiany nazwy przez uczestnik\u00f3w<\/strong>. Mo\u017cna to zrobi\u0107 klikaj\u0105c na przycisk \u201eBezpiecze\u0144stwo\u201d. Uniemo\u017cliwia to trollom zmian\u0119 imion w celu na\u015bladowania innych cz\u0142onk\u00f3w spotkania lub ukrycia si\u0119 przed gospodarzami spotkania.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Wymagaj w\u0142\u0105czenia wideo. <\/strong>Mo\u017cesz poprosi\u0107, aby wszyscy uczestnicy w\u0142\u0105czyli wideo podczas spotkania lub przynajmniej w\u0142\u0105czyli wideo podczas przedstawiania si\u0119. Je\u015bli do\u0142\u0105cz\u0105 nowi cz\u0142onkowie, mo\u017ce zosta\u0107 poproszony o w\u0142\u0105czenie wideo i przedstawienie si\u0119. To odstrasza trolle, kt\u00f3re chc\u0105 pozosta\u0107 w cieniu.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Wy\u0142\u0105cz prywatne wiadomo\u015bci.<\/strong> Mo\u017cesz wy\u0142\u0105czy\u0107 t\u0119 opcj\u0119, otwieraj\u0105c boczny pasek czatu, klikaj\u0105c \u201e\u2026\u201d w prawym dolnym rogu i wybieraj\u0105c \u201eUczestnicy mog\u0105 rozmawia\u0107 z: Wszyscy publicznie\u201d. Mo\u017cesz tak\u017ce zmieni\u0107 t\u0119 opcj\u0119 na \u201eUczestnicy mog\u0105 rozmawia\u0107 z: Tylko gospodarz\u201d.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>W celu zapewnienia jeszcze wi\u0119kszego bezpiecze\u0144stwa spotkania, mo\u017cna u\u017cy\u0107 osobnego pokoju na faktyczne spotkanie, a nast\u0119pnie u\u017cy\u0107 g\u0142\u00f3wnego pokoju do wpuszczania os\u00f3b z poczekalni pojedynczo i sprawdzania potencjalnych trolli. Jest to bardziej skomplikowane, ale bardzo bezpieczne. Przewodnik i samouczek wideo mo\u017cna znale\u017a\u0107 <a href=\"https:\/\/docs.google.com\/document\/d\/1SJwND-Ugc_MGlyOKVr_wqd89esfXkgrbAyNejL6bQ5M\/edit?usp=sharing\">tutaj<\/a>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mo\u017cna r\u00f3wnie\u017c wymaga\u0107, aby u\u017cytkownicy wysy\u0142ali z wyprzedzeniem wiadomo\u015b\u0107 e-mail na kontaktowy adres e-mail z pro\u015bb\u0105 o podanie identyfikatora i kodu dost\u0119pu.<\/li>\n<\/ul>\n<!-- PMB print buttons is only displayed on a single post\/page URLs-->","protected":false},"excerpt":{"rendered":"<p>Celem spotka\u0144 ITAA mog\u0105 by\u0107 zak\u0142\u00f3caj\u0105ce porz\u0105dek trolle. Poni\u017cej znajduje si\u0119 kilka sugestii, kt\u00f3re pomog\u0105 Ci zapewni\u0107 bezpiecze\u0144stwo spotkania Zoom. Na spotkaniach zach\u0119ca si\u0119, aby trzyma\u0107 sumienie grupy i omawia\u0107 plany zapobiegania zak\u0142\u00f3ceniom i reagowania na nie. Film demonstracyjny poni\u017cszych sugestii mo\u017cna znale\u017a\u0107 tutaj. Prosz\u0119 to zanotowa\u0107 \u2026 <a href=\"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/\" class=\"more-link\">Kontynuuj czytanie <span class=\"screen-reader-text\">Wytyczne dotycz\u0105ce bezpiecze\u0144stwa dla gospodarzy spotka\u0144 ITAA<\/span><\/a><\/p>","protected":false},"author":35194237,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"tags":[],"class_list":["post-12898","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous\" \/>\n<meta property=\"og:description\" content=\"ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading Security guidelines for ITAA meeting hosts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet and Technology Addicts Anonymous\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-12T04:36:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\",\"name\":\"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#website\"},\"datePublished\":\"2021-05-05T19:25:45+00:00\",\"dateModified\":\"2026-04-12T04:36:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security guidelines for ITAA meeting hosts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#website\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\",\"name\":\"Internet and Technology Addicts Anonymous\",\"description\":\"Worldwide 12-step Fellowship for Internet and Technology Addiction\",\"publisher\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#organization\",\"name\":\"Internet and Technology Addicts Anonymous\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-ITAA-logo-480px.png\",\"contentUrl\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-ITAA-logo-480px.png\",\"width\":480,\"height\":480,\"caption\":\"Internet and Technology Addicts Anonymous\"},\"image\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wytyczne bezpiecze\u0144stwa dla gospodarzy spotka\u0144 ITAA - Anonimowi Uzale\u017cnieni od Internetu i Technologii","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/","og_locale":"pl_PL","og_type":"article","og_title":"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous","og_description":"ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading Security guidelines for ITAA meeting hosts","og_url":"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/","og_site_name":"Internet and Technology Addicts Anonymous","article_modified_time":"2026-04-12T04:36:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/","url":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/","name":"Wytyczne bezpiecze\u0144stwa dla gospodarzy spotka\u0144 ITAA - Anonimowi Uzale\u017cnieni od Internetu i Technologii","isPartOf":{"@id":"https:\/\/internetaddictsanonymous.org\/#website"},"datePublished":"2021-05-05T19:25:45+00:00","dateModified":"2026-04-12T04:36:16+00:00","breadcrumb":{"@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/internetaddictsanonymous.org\/"},{"@type":"ListItem","position":2,"name":"Security guidelines for ITAA meeting hosts"}]},{"@type":"WebSite","@id":"https:\/\/internetaddictsanonymous.org\/#website","url":"https:\/\/internetaddictsanonymous.org\/","name":"Anonimowi uzale\u017cnieni od Internetu i technologii","description":"\u015awiatowa wsp\u00f3lnota 12 krok\u00f3w dla uzale\u017cnionych od Internetu i technologii","publisher":{"@id":"https:\/\/internetaddictsanonymous.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetaddictsanonymous.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/internetaddictsanonymous.org\/#organization","name":"Anonimowi uzale\u017cnieni od Internetu i technologii","url":"https:\/\/internetaddictsanonymous.org\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/internetaddictsanonymous.org\/#\/schema\/logo\/image\/","url":"https:\/\/internetaddictsanonymous.org\/wp-content\/uploads\/2023\/01\/cropped-ITAA-logo-480px.png","contentUrl":"https:\/\/internetaddictsanonymous.org\/wp-content\/uploads\/2023\/01\/cropped-ITAA-logo-480px.png","width":480,"height":480,"caption":"Internet and Technology Addicts Anonymous"},"image":{"@id":"https:\/\/internetaddictsanonymous.org\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9Fwob-3m2","_links":{"self":[{"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/pages\/12898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/users\/35194237"}],"replies":[{"embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/comments?post=12898"}],"version-history":[{"count":31,"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/pages\/12898\/revisions"}],"predecessor-version":[{"id":21212,"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/pages\/12898\/revisions\/21212"}],"wp:attachment":[{"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/media?parent=12898"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/pl\/wp-json\/wp\/v2\/tags?post=12898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}