{"id":22180,"date":"2024-04-26T12:09:46","date_gmt":"2024-04-26T16:09:46","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=22180"},"modified":"2024-06-03T13:46:59","modified_gmt":"2024-06-03T17:46:59","slug":"location-sharing-risks","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/location-sharing-risks\/","title":{"rendered":"Les risques li\u00e9s au partage de la localisation dans \"The Black Dog\" de Taylor Swift"},"content":{"rendered":"<style>.kb-image22180_f6190d-17 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image22180_f6190d-17\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1.png\" alt=\"Picture depicting location sharing and its risks. \" class=\"kb-img wp-image-22188\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1.png 1200w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-600x315.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-300x158.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-1024x538.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-768x403.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-18x9.png 18w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c, .wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c[data-kb-block=\"kb-adv-heading22180_55d157-5c\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c[data-kb-block=\"kb-adv-heading22180_55d157-5c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_55d157-5c[data-kb-block=\"kb-adv-heading22180_55d157-5c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_55d157-5c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_55d157-5c\">Taylor Swift\u2019s \u2018The Black Dog\u2019 has people flooding the London Pub after referencing it in the newly released single. It\u2019s undoubtedly catchy, and while singing along we were reminded of a cybersafety topic that needs to be talked about: <strong>location sharing<\/strong>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><style>.wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11, .wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11[data-kb-block=\"kb-adv-heading22180_931926-11\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11[data-kb-block=\"kb-adv-heading22180_931926-11\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_931926-11[data-kb-block=\"kb-adv-heading22180_931926-11\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_931926-11 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_931926-11\">I am someone who, until recent events<br><strong>You shared your secrets with<br>And your location<br>You forgot to turn it off<\/strong><br>And so I watch as you walk<br>Into some bar called The Black Dog<br>And pierce new holes in my heart<br><strong>You forgot to turn it off<\/strong><\/p>\n<cite>&#8220;The Black Dog&#8221;  -Taylor Swift<\/cite><\/blockquote>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21, .wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21[data-kb-block=\"kb-adv-heading22180_7a94f0-21\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21[data-kb-block=\"kb-adv-heading22180_7a94f0-21\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_7a94f0-21[data-kb-block=\"kb-adv-heading22180_7a94f0-21\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_7a94f0-21 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_7a94f0-21\">Sharing your location can feel like a lifesaver when venturing into unfamiliar territories or ensuring a loved one can find you in case of an emergency. However, there are also significant risks including the threat of stalkers exploiting this information, the pervasive reach of ad tracking, and the potential sneaky social engineering tricks that can catch even the savviest of us off guard. So, while sharing your location has its benefits, it&#8217;s essential to learn about the drawbacks, and empower yourself against them!<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96, .wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96[data-kb-block=\"kb-adv-heading22180_1309f8-96\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96[data-kb-block=\"kb-adv-heading22180_1309f8-96\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_1309f8-96[data-kb-block=\"kb-adv-heading22180_1309f8-96\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading22180_1309f8-96 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_1309f8-96\">Regularly review your device and app permissions<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4, .wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4[data-kb-block=\"kb-adv-heading22180_d1413d-f4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4[data-kb-block=\"kb-adv-heading22180_d1413d-f4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_d1413d-f4[data-kb-block=\"kb-adv-heading22180_d1413d-f4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_d1413d-f4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_d1413d-f4\">It&#8217;s important to revisit device and app permissions regularly, and to revisit whether you&#8217;re still comfortable sharing your location with people who might not play an active role in your life anymore. Relationships constantly change and evolve and so should your digital boundaries. And if your relationship comes to an end, your location sharing should too.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28, .wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28[data-kb-block=\"kb-adv-heading22180_8af144-28\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28[data-kb-block=\"kb-adv-heading22180_8af144-28\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_8af144-28[data-kb-block=\"kb-adv-heading22180_8af144-28\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_8af144-28 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_8af144-28\">Our <strong>Ultimate Guide To Securing Your Devices &amp; Accounts<\/strong> offers 10 steps to secure your devices and protect your personal information online. View and download it <a href=\"https:\/\/knowledgeflow.org\/resource\/the-ultimate-guide-to-securing-your-devices-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. <\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa, .wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa[data-kb-block=\"kb-adv-heading22180_ce93bf-aa\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa[data-kb-block=\"kb-adv-heading22180_ce93bf-aa\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_ce93bf-aa[data-kb-block=\"kb-adv-heading22180_ce93bf-aa\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_ce93bf-aa wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_ce93bf-aa\">Also visit our <a href=\"https:\/\/knowledgeflow.org\/resource\/6-ways-to-improve-device-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Device Security Resource<\/a> to enhance your personal cybersafety and keep your personal information secure.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38, .wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38[data-kb-block=\"kb-adv-heading22180_c74c52-38\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38[data-kb-block=\"kb-adv-heading22180_c74c52-38\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_c74c52-38[data-kb-block=\"kb-adv-heading22180_c74c52-38\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading22180_c74c52-38 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_c74c52-38\">Location Sharing Benefits<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad, .wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad[data-kb-block=\"kb-adv-heading22180_3acc2a-ad\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad[data-kb-block=\"kb-adv-heading22180_3acc2a-ad\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_3acc2a-ad[data-kb-block=\"kb-adv-heading22180_3acc2a-ad\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_3acc2a-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_3acc2a-ad\">The best-case scenario for continuing to share your location with an ex (or forgetting to turn it off, in Joe Alwyn\u2019s case) is heartbreak. Watching an ex-partner move on with their life is emotionally distressing for anyone, even Taylor Swift. So, do yourself a favour and give your heart a break from the digital distress.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b, .wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b[data-kb-block=\"kb-adv-heading22180_93b7f1-8b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b[data-kb-block=\"kb-adv-heading22180_93b7f1-8b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_93b7f1-8b[data-kb-block=\"kb-adv-heading22180_93b7f1-8b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading22180_93b7f1-8b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_93b7f1-8b\">Location Sharing Drawbacks<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35, .wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35[data-kb-block=\"kb-adv-heading22180_563461-35\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35[data-kb-block=\"kb-adv-heading22180_563461-35\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_563461-35[data-kb-block=\"kb-adv-heading22180_563461-35\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_563461-35 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_563461-35\">The worst-case scenario can be much more complex. Technology can be misused as a tool to control, intimidate, and harm people and there are serious risks involved in sharing your location with a partner, or ex-partner when in an abusive situation.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06, .wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06[data-kb-block=\"kb-adv-heading22180_105943-06\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06[data-kb-block=\"kb-adv-heading22180_105943-06\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_105943-06[data-kb-block=\"kb-adv-heading22180_105943-06\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_105943-06 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_105943-06\">Our <strong>Guide To Digital Self-Defense: Cybersafety For Personal Safety<\/strong> toolkit is a comprehensive guide designed to provide information, resources, and strategies to empower individuals and organizations to recognize, prevent, and respond to technology abuse. to help individuals and organizations to recognize, be more aware of, and to respond to instances of technology abuse. Topics include complex issues such as cyberstalking, harassment, and financial exploitation. The guide also includes helpful step-by-step instructions on navigating device and app settings.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4, .wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4[data-kb-block=\"kb-adv-heading22180_b483bb-e4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4[data-kb-block=\"kb-adv-heading22180_b483bb-e4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_b483bb-e4[data-kb-block=\"kb-adv-heading22180_b483bb-e4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_b483bb-e4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_b483bb-e4\">View and download the guide <a href=\"https:\/\/knowledgeflow.org\/resource\/guide-to-digital-self-defense-cybersafety-for-personal-safety\/#disconnecting-from-the-person-causing-harm\">here<\/a>.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c, .wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c[data-kb-block=\"kb-adv-heading22180_95bea3-3c\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c[data-kb-block=\"kb-adv-heading22180_95bea3-3c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22180_95bea3-3c[data-kb-block=\"kb-adv-heading22180_95bea3-3c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22180_95bea3-3c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading22180_95bea3-3c\">Remember, be cautious when location sharing. <strong>When a relationship ends, so should the permission to see each other&#8217;s whereabouts<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La chanson \"The Black Dog\" de Taylor Swift met en lumi\u00e8re un sujet important en mati\u00e8re de cybers\u00e9curit\u00e9 : le partage de localisation. <\/p>","protected":false},"author":8,"featured_media":22188,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[582,580,583,579,584,581],"class_list":["post-22180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-app-permissions","tag-location-sharing","tag-personal-safety","tag-taylor-swift","tag-technology-abuse","tag-the-black-dog"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":582,"label":"app permissions"},{"value":580,"label":"location sharing"},{"value":583,"label":"personal safety"},{"value":579,"label":"taylor swift"},{"value":584,"label":"technology abuse"},{"value":581,"label":"the black dog"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/location-sharing-taylor-blog-feature-image-1-1024x538.png",1024,538,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":582,"name":"app permissions","slug":"app-permissions","term_group":0,"term_taxonomy_id":582,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":580,"name":"location sharing","slug":"location-sharing","term_group":0,"term_taxonomy_id":580,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":583,"name":"personal safety","slug":"personal-safety","term_group":0,"term_taxonomy_id":583,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":579,"name":"taylor swift","slug":"taylor-swift","term_group":0,"term_taxonomy_id":579,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":584,"name":"technology abuse","slug":"technology-abuse","term_group":0,"term_taxonomy_id":584,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":581,"name":"the black dog","slug":"the-black-dog","term_group":0,"term_taxonomy_id":581,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/22180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=22180"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/22180\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/22188"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=22180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=22180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=22180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}