{"id":11319,"date":"2025-03-19T08:00:00","date_gmt":"2025-03-19T07:00:00","guid":{"rendered":"https:\/\/haimagazine.com\/uncategorized\/diy-ai-how-to-outsmart-your-grandson-2-0\/"},"modified":"2025-06-26T15:12:05","modified_gmt":"2025-06-26T13:12:05","slug":"diy-ai-how-to-outsmart-your-grandson-2-0","status":"publish","type":"post","link":"https:\/\/haimagazine.com\/en\/tools\/diy-ai-how-to-outsmart-your-grandson-2-0\/","title":{"rendered":"\ud83d\udd12 DIY AI: how to outsmart your grandson 2.0"},"content":{"rendered":"<p>Phishing, vishing, spoofing* \u2013 these terms have firmly taken root in our reality, not only in business (cyber attacks on companies or government institutions) but also in private life (schemes involving fake consultants or police officers).<\/p><p>Despite education and the increasing knowledge about the aforementioned criminal practices, <a href=\"https:\/\/www.corporatecomplianceinsights.com\/ai-voice-cloning-extortion-vishing-scams\/\" data-type=\"link\" data-id=\"https:\/\/www.corporatecomplianceinsights.com\/ai-voice-cloning-extortion-vishing-scams\/\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">many companies and individuals still fall victim to scams<\/mark><\/a>. We have better security measures at our disposal, but criminals also use increasingly sophisticated tricks to access our money and data. The proliferation of AI tools means that both sides have gained a powerful ally.<\/p><p>But cyber scams aren&#8217;t just complex operations. They also include calls from seemingly familiar voices: &#8220;<em>Mom, I had a fender bender, you need to transfer money so I can avoid reporting it to the police<\/em>.&#8221; Impersonating family members is a technique scammers have been using for years. However, modern AI tools, such as voice cloning and deepfake audio, make it increasingly difficult to detect fraud. Scammers no longer need to intercept passwords or install malicious software\u2014a few seconds of a person\u2019s voice recording is enough. Such recordings can be found on social media or obtained during an apparently innocent phone call. Importantly, the quality of the recordings used by the scammer to clone a voice doesn&#8217;t have to be perfect. In stress\u2014which can indeed be triggered by news of an accident\u2014we may not pay attention to minor deviations from the norm. The eerie vision from the movie Johnny Mnemonic (1995) is becoming less abstract.<\/p><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" class=\"wp-image-9166\" style=\"width: 300px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1.png 1893w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1-300x171.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1-1024x583.png 1024w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1-768x437.png 768w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1-1536x874.png 1536w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny1-600x341.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" class=\"wp-image-9168\" style=\"width: 300px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2.png 1885w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2-300x171.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2-1024x583.png 1024w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2-768x437.png 768w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2-1536x874.png 1536w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny2-600x342.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" class=\"wp-image-9170\" style=\"width: 300px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3.png 1887w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3-300x171.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3-1024x583.png 1024w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3-768x438.png 768w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3-1536x875.png 1536w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/johny3-600x342.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br\/>A Yakuza member animates the already deceased Pharmakom receptionist<br\/>Source: Johnny Mnemonic, TriStar Pictures<\/p><h4 class=\"wp-block-heading\"><strong>How to protect family members from situations like these?<\/strong><\/h4><p>One way is to set up a unique password that can be used to confirm the identity of the person you&#8217;re speaking with in an unusual situation. But as it goes with passwords\u2014memory can be unreliable, especially under stress. A homemade app might help us with this.<\/p><figure class=\"wp-block-table\"><table class=\"has-background has-fixed-layout\" style=\"background-color:#84c670;border-style:none;border-width:0px\"><tbody><tr><td>The article is one of the tutorials titled <strong>\u201cDIY AI\u201d<\/strong>, featured on hAImagazine.com. In these, I show how AI can be used to build &#8220;small apps that solve small problems&#8221;. I also discuss how to plan work on such projects and choose the right tools, while revealing some secrets of the developer&#8217;s kitchen. The prompts presented do not guarantee that the app will always work, as the same query yields different code each time. Therefore, the app should be tested and errors reported to the model for correction. Consider it all as learning through play.<\/td><\/tr><\/tbody><\/table><\/figure><h4 class=\"wp-block-heading\"><strong>Stage 1<\/strong><\/h4><p>In the first version of the app, I decided to implement only the key functionalities. It&#8217;s a good way to quickly verify assumptions, but also an opportunity to test the app with family members and gather feedback. I approached the Claude model (version 3.5 Sonnet) with the following prompt asking for code:<\/p><figure class=\"wp-block-table\"><table class=\"has-light-gray-background-color has-background has-fixed-layout\"><tbody><tr><td><code>Write a PWA app that meets the following criteria:<br\/><br\/>1. the app is optimized for display on mobile devices,<br\/>2. at the top of the screen, the app displays an alphanumeric password agreed upon by family members; the password is fetched from the pass.json file in the main directory of the app,<br\/>3. below the password, there are avatars of 4 family members (mom, dad, brother, sister) arranged in a 2x2 matrix; all elements are visible without scrolling the screen,<br\/>4. clicking an avatar natively initiates a call to the phone number assigned to it; the phone number is fetched from the tel.json file.<br\/><br\/>Prepare separately all the necessary files and propose a structure for the .json files to be stored in the main directory of the app. Once installed on a phone, the app should work only in offline mode, without any server connection.<\/code><\/td><\/tr><\/tbody><\/table><\/figure><p>Claude suggested the file structure you see in the picture a few lines down. You can freely configure the number of family members and their avatars. Saving the data in .json files allows for their quick updating in the future, without digging into the app&#8217;s code.<\/p><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"379\" class=\"wp-image-9172\" style=\"width: 600px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/drzewo.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/drzewo.png 669w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/drzewo-300x190.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/drzewo-600x379.png 600w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p><p>After generating the code, I uploaded it to the server along with previously prepared icons and .json files containing sensitive data. The final step was to pull up the www domain in the Safari browser, under which I wrote the application, and to install it on the phone&#8217;s desktop. At the same time, I disabled internet access for testing to make sure everything would work offline.<\/p><figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Why the app is being developed with PWA technology <a href=\"https:\/\/haimagazine.com\/pl\/narzedzia\/zmaistruj-sobie-apke-czyli-jak-stworzyc-aplikacje-jednym-promptem\/\" data-type=\"link\" data-id=\"https:\/\/haimagazine.com\/pl\/narzedzia\/zmaistruj-sobie-apke-czyli-jak-stworzyc-aplikacje-jednym-promptem\/\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">is explained in this tutorial I made<\/mark><\/a>. Of course, you can also run it locally on your laptop (Claude will explain exactly how to do it). However, if you want to install the app on your household members&#8217; phones, you&#8217;ll have to visit them. Hosting the app on a server allows for remote installation.<\/td><\/tr><\/tbody><\/table><\/figure><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"680\" class=\"wp-image-9175\" style=\"width: 400px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup1.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup1.png 485w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup1-177x300.png 177w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p><p>At the top of the screen, there&#8217;s a password (here: today&#8217;s password), and selecting an avatar initiates a connection with a specific person. The password can be simple enough to make it easier for older people to remember (e.g., names of animals or city names related to family history). I recommend to mark the app with a suggestive icon and pin it in a visible spot on the desktop. If you&#8217;re particularly cautious, you can even hide it (for example, under a kitten symbol).<\/p><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"172\" class=\"wp-image-9177\" style=\"width: 400px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2.png 1267w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2-300x129.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2-1024x441.png 1024w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2-768x331.png 768w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup2-600x259.png 600w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p><p><strong>So how does it work in practice? <br\/><\/strong>Each family member should have the same version of the app installed. When an unusual situation occurs, you must immediately end the call. This is a critical moment, as scammers will do everything to prevent this from happening. Then, open the app, check the password, call the person you wish to call, and ask them to provide it. Just taking these steps will prevent an unpleasant situation in most cases.<\/p><h4 class=\"wp-block-heading\"><strong>Stage 2<\/strong><\/h4><p>If you&#8217;re happy with the result, you can start playing around with the app&#8217;s appearance and functionalities, for example, enlarge elements for the visually impaired, add more passwords that will change according to a specified system, or upload family photos instead of avatars. <strong>However, this solution has one downside.<\/strong> Keeping passwords and phones in an open .json file is not very good practice, to put it mildly, especially since the goal of installing a PWA is to place the app on a publicly accessible server. When I shared these concerns with Claude, it advised me to encrypt the sensitive data using the AES-GCM method. Therefore, I asked it to create a suitable app for me (although similar ones are also available online) for browser use:<\/p><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"395\" class=\"wp-image-9179\" style=\"width: 500px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/szyfrowanie.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/szyfrowanie.png 645w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/szyfrowanie-300x237.png 300w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/szyfrowanie-600x473.png 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><br\/>App for encrypting .json files created by Claude<\/p><p class=\"has-text-align-left\">Then, I developed a second prompt that would help Claude enhance the security of the already generated application:<\/p><figure class=\"wp-block-table\"><table class=\"has-light-gray-background-color has-background has-fixed-layout\" style=\"border-style:none;border-width:0px\"><tbody><tr><td><code>Prepare your app update with the following security features:<br\/><br\/>1. set up a robots.txt file to protect all app components from being read by bots\/crawlers,<br\/><\/code><br\/><code>2. .json files containing passwords and family contacts stored on the server will be replaced by me with AES-GCM encrypted versions (the encrypted files are attached),<br\/><\/code><br\/><code>3. after installing the app on a phone and launching in PWA mode for the first time, the family password field should be locked with a lock icon displayed instead of the password,<br\/><\/code><br\/><code>4. when tapping on the lock icon, users are asked once for the encryption key (known only to them),<br\/><\/code><br\/><code>5. after correctly entering the key, files are decrypted and saved in the phone\u2019s local storage (localStorage); users can then see the family password and make phone calls,<br\/><\/code><br\/><code>6. on subsequent app launches, if there\u2019s an entry in localStorage about unlocking, passwords are automatically decrypted without asking for the code,<br\/><\/code><br\/><code>7. all other app functions remain unchanged.<br\/><br\/>Prepare separately all the necessary new files or updates to existing ones considering the current app structure.<\/code><\/td><\/tr><\/tbody><\/table><\/figure><p>Claude updated the earlier code and added two new files to the file structure, which are specifically responsible for security: robots.txt and crypto-utils.js. I updated the files on the server and reinstalled the app on my phone. As a result, after launching it\u2014until the encryption key was entered\u2014I couldn&#8217;t see the family password or make any calls.<\/p><p class=\"has-text-align-center\"> <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"279\" class=\"wp-image-9182\" style=\"width: 400px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup3.png\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup3.png 477w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/mockup3-300x209.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p><p>Of course, the app itself can be further secured with a pin, but I didn&#8217;t want to add another layer of security that would require recalling a unique digit combination in a potential crisis situation. Unfortunately, with PWA technology, it&#8217;s not possible to use biometric securities\u2014a native app is needed to use such solutions. The advantage of PWA is that it works immediately on both iOS and Android. Remember also to delete the app from the server as soon as everyone in the family has installed it.<\/p><p>I asked <strong>Piotr Konieczny from the Niebezpiecznik.pl portal<\/strong> for his opinion on the effectiveness of my solution. By the way, <a href=\"https:\/\/niebezpiecznik.pl\/alerty\/\" data-type=\"link\" data-id=\"https:\/\/niebezpiecznik.pl\/alerty\/\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">I recommend installing their app<\/mark><\/a>, which constantly provides alerts about dangerous activities online.<\/p><figure class=\"wp-block-table\"><table class=\"has-fixed-layout\" style=\"border-style:none;border-width:0px\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"251\" class=\"wp-image-9184\" style=\"width: 250px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny.jpg\" alt=\"\" srcset=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny.jpg 1170w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-298x300.jpg 298w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-1019x1024.jpg 1019w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-150x150.jpg 150w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-768x772.jpg 768w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-600x603.jpg 600w, https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/piotr_konieczny-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><em>Verification by password or calling back is essentially the simplest form of confirming that we\u2019re talking to someone we know. The problem is that criminals are aware of this and are already skillfully bypassing password authentication procedures used in several banks. For example, scammers may claim they are calling from a special security department that doesn&#8217;t have access to the helpline database. It\u2019s easy to imagine that in the case of a &#8220;grandchild&#8221; scam, we might hear two sentences in the forged voice of a loved one they are impersonating, and then be informed that this person has fainted and is no longer contactable, so they can&#8217;t &#8220;return&#8221; to the phone and we cannot ask them for the password. Action must be taken quickly, of course! Unfortunately, in stressful situations, people panic and there\u2019s no remedy for that. Nor an app. That doesn\u2019t mean raising awareness and trying isn\u2019t worthwhile. Every trip-up counts against the scammers.<\/em><\/td><\/tr><\/tbody><\/table><\/figure><h4 class=\"wp-block-heading\"><strong>The app is a tool, education is the key<\/strong><\/h4><p>As Piotr wrote, <strong>no tool, not even the best one, can provide us with 100% protection.<\/strong> That&#8217;s why, in addition to the app, it&#8217;s worth spending time educating your loved ones, <a href=\"https:\/\/www.gov.pl\/web\/baza-wiedzy\/halo-tu-cyberbezpieczny-senior\" data-type=\"link\" data-id=\"https:\/\/www.gov.pl\/web\/baza-wiedzy\/halo-tu-cyberbezpieczny-senior\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">especially the older family members<\/mark>.<\/a> Practice together scenarios of potential attacks, emergency communication methods, and convince seniors never to make financial decisions under time pressure. No matter how dangerous and credible the situation seems\u2014there&#8217;s always time to hang up and talk to someone close or trusted.<\/p><p>There are apps that recognize suspicious numbers, monitor phone connections or verify the caller&#8217;s voice, but we also have to <a href=\"https:\/\/medium.com\/secure-words\/the-dark-side-of-truecaller-00797e54ba66\" data-type=\"link\" data-id=\"https:\/\/medium.com\/secure-words\/the-dark-side-of-truecaller-00797e54ba66\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">tread lightly with them<\/mark>.<\/a> For example, the very popular spammer-tagging app Truecaller asks for access to your telephone directory. Entrusting these solutions with your safety carries the risk of losing some privacy. At the same time, AI tools for user protection are being developed\u2014Google and Microsoft are working on models that analyze the tone and content of conversations, and warn about potential scams, which <a href=\"https:\/\/haimagazine.com\/pl\/newsy\/nowy-lider-ai-konferencja-google-i-o-2024\/\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">I wrote about in relation to the Google I\/O conference<\/mark><\/a>. There are even new <a href=\"https:\/\/www.youtube.com\/watch?v=RV_SdCfZ-0s&amp;t=41s\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/watch?v=RV_SdCfZ-0s&amp;t=41s\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:#82D65E\" class=\"has-inline-color has-contrast-color\">virtual grandmas<\/mark><\/a> who waste the time of fake grandsons or consultants in long conversations.<\/p><p class=\"has-text-align-center\"> <img decoding=\"async\" class=\"wp-image-9188\" style=\"width: 600px;\" src=\"https:\/\/haimagazine.com\/wp-content\/uploads\/2025\/03\/babcia.png\" alt=\"\"\/><\/p><p>But ultimately, it&#8217;s not technology, but awareness and common sense that provide the best protection. AI can help detect threats, but it&#8217;s up to us to respond appropriately.<\/p><p><strong>PS.<\/strong> I consulted with an experienced developer on the first version of the app. He immediately noticed that Claude had embedded the encryption key in the app&#8217;s code! This shows that creating solutions with AI (even as simple as the app described) where security issues are particularly crucial should always be verified by seasoned experts.<\/p><p><strong>*) Glossary:<\/strong><\/p><ul class=\"wp-block-list\"><li><strong>Phishing<\/strong> \u2013 A scam involving impersonating trusted institutions (like banks) to extract confidential information, such as passwords or credit card numbers. These attacks typically occur through emails or fake websites.<br\/><\/li>\n\n<li><strong>Vishing<\/strong> \u2013 A form of phishing that uses phone calls, where scammers pretend to be bank employees, officials or family members to coax the victim into revealing sensitive information or making a transfer.<br\/><\/li>\n\n<li><strong>Spoofing<\/strong> \u2013 A technique of falsifying identity online, such as impersonating a different phone number, email address or website to mislead a victim and extract information.<\/li><\/ul><p><\/p>","protected":false},"excerpt":{"rendered":"<p>Scammers are resorting to increasingly sophisticated methods to extract money or sensitive data from us. They are also increasingly turning to the latest technology. But we can also use it to protect ourselves from fraud.<\/p>\n","protected":false},"author":10,"featured_media":9196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[791,694,695],"tags":[742,741,740],"popular":[],"difficulty-level":[38],"ppma_author":[352],"class_list":["post-11319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-how-to","category-tools","category-tutorials-en","tag-deepfake-2","tag-phishing","tag-tutorial-2","difficulty-level-medium"],"acf":[],"authors":[{"term_id":352,"user_id":10,"is_guest":0,"slug":"seweryn-jakubiec","display_name":"Seweryn Jakubiec","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/9f6a221b4ee0d45f9cb264964464c87cc2036e4466dc908a6ec21be51baff707?s=96&d=mm&r=g","first_name":"Seweryn","last_name":"Jakubiec","user_url":"","job_title":"","description":"Senior Product Manager w bran\u017cy IT, obserwator \u015bwiata tech i AI, muzyk-amator, wielbiciel kot\u00f3w rasy Devon Rex"}],"_links":{"self":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/comments?post=11319"}],"version-history":[{"count":1,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11319\/revisions"}],"predecessor-version":[{"id":11320,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/posts\/11319\/revisions\/11320"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/media\/9196"}],"wp:attachment":[{"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/media?parent=11319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/categories?post=11319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/tags?post=11319"},{"taxonomy":"popular","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/popular?post=11319"},{"taxonomy":"difficulty-level","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/difficulty-level?post=11319"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/haimagazine.com\/en\/wp-json\/wp\/v2\/ppma_author?post=11319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}