{"id":3613,"date":"2011-08-30T23:46:32","date_gmt":"2011-08-30T16:46:32","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2011\/08\/30\/china-piracy-spurred-apple-actionwikileak-ninemsn\/"},"modified":"2011-08-30T23:46:32","modified_gmt":"2011-08-30T16:46:32","slug":"china-piracy-spurred-apple-actionwikileak-ninemsn","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/08\/china-piracy-spurred-apple-actionwikileak-ninemsn\/","title":{"rendered":"China piracy spurred Apple action:WikiLeak &#8211; Ninemsn"},"content":{"rendered":"<p> China piracy spurred Apple action: WikiLeak Ninemsn Apple set up a global security team three years ago to combat rampant counterfeiting of the iPod and iPhone in China, according to a US diplomatic cable released by WikiLeaks . The California-based gadget-maker hired away employees from the drug company &#8230; and more<\/p>\n","protected":false},"excerpt":{"rendered":"<p> China piracy spurred Apple action: WikiLeak Ninemsn Apple set up a global security team three years ago to combat rampant counterfeiting of the iPod and iPhone in China, according to a US diplomatic cable released by WikiLeaks . The California-based gadget-maker hired away employees from the drug company &#8230; and more<\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,162,18,3,260],"tags":[2868,2866],"class_list":["post-3613","post","type-post","status-publish","format-standard","hentry","category-apple","category-ddos-security","category-iphone-apple","category-security","category-wikileak-security","tag-apple","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-Wh","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=3613"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/3613\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=3613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=3613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=3613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}