{"id":282873,"date":"2026-02-21T05:23:53","date_gmt":"2026-02-21T05:23:53","guid":{"rendered":"https:\/\/halkweb.com.tr\/?p=282873"},"modified":"2026-02-21T05:23:53","modified_gmt":"2026-02-21T05:23:53","slug":"digital-guardianship-regime-liquidation-of-public-space-under-the-guise-of-child-protection","status":"publish","type":"post","link":"https:\/\/halkweb.com.tr\/en\/digital-guardianship-regime-liquidation-of-public-space-under-the-guise-of-child-protection\/","title":{"rendered":"Digital Guardianship Regime: Liquidation of the Public Sphere under the Discourse of Child Protection"},"content":{"rendered":"<p>Modern political powers never present their most dangerous interventions by their real names.<br \/>\nThey don't call it censorship; they call it \u201cregulation\u201d.<\/p>\n<p>They don't say surveillance; they say \u201csecurity\u201d.<br \/>\nThey don't say guardianship; they say \u201cprotection\u201d.<\/p>\n<p>Today, proposals such as linking access to social media to real identity, e-Government integration, state-controlled content flow under the age of 16 are precisely the digital continuation of this tradition. The debate is conducted over children, but children are not the issue. The debate is conducted over social media, but social media is not the issue.<\/p>\n<p>The real issue is this:<br \/>\nTo whom does the public sphere belong and where does the state stand in this sphere?<\/p>\n<p>Unless this question is asked correctly, every discussion becomes a technical smokescreen. And what is happening behind the fog is this: The public sphere is being quietly handed back to the state.<\/p>\n<p><strong>1. Child Discourse: The Most Untouchable Political Shield<\/strong><br \/>\nThe child is the most powerful moral shield used in political debates.<br \/>\nBecause when you talk about the child, anyone who objects is automatically under suspicion.<br \/>\n\u201cAren't you protecting the children?\u201d<br \/>\n\u201cDon't you see the content that children are exposed to?\u201d<br \/>\nThese questions are asked to close the debate, not to open it.<br \/>\nHowever, in terms of political theory, children's discourse does this:<br \/>\nWhile expanding the power of the state, it morally paralyzes the opposition.<br \/>\nThe critical point here is this:<br \/>\nThe state has an obligation to protect the child, but this obligation does not give rise to an unlimited authority to intervene. Otherwise, everything can be legitimized on the grounds of \u201cchild benefit\u201d: expression, organization, access to information, even thinking.<br \/>\nHistory has taught us this:<br \/>\nRegulations that start with child discourse end adult freedoms.<\/p>\n<p><strong>2. Social Media is not a \u201cState Service\u201d<\/strong><br \/>\nThere is a deliberate concept shift in this discussion.<br \/>\nSocial media is presented as if it were a service relationship with the state.<br \/>\nBut social media:<br \/>\nIt is not a public service provided by the state<br \/>\nIt is not an area where the citizen enters with permission from the state<br \/>\nNot inherently bound to the regulatory hierarchy of the administration<br \/>\nSocial media is the state-independent public sphere of the modern age.<br \/>\nThis space is imperfect, noisy, disturbing. But that is precisely why it is political. Public space cannot be sterile. Sterile spaces are not public; they are controlled.<br \/>\nBringing the e-Government logic to this area is not a technical integration.<br \/>\nThis is to say:<br \/>\n\u201cIf you want to enter the public space, first let me know who you are.\u201d<br \/>\nAs soon as this sentence is uttered, freedom of expression ceases to be a right; it becomes a conditional permission granted by the administration.<\/p>\n<p><strong>3. The Fable of \u201cTrue Identity\u201d: It Suppresses Dissent, Not Violence<\/strong><br \/>\nThere is an oft-repeated claim in defense of the real identity imperative:<br \/>\n\u201cAnonymity increases crime and hate.\u201d<br \/>\nThis claim is problematic in two respects.<br \/>\nFirst, it is factually incorrect.<br \/>\nHate speech, lynch campaigns and targeting are often carried out through real identities, columns and television screens. Historically speaking, the most destructive discourse has not come from anonymous accounts, but from power holders with open identities.<br \/>\nSecond, it is politically manipulative.<br \/>\nRemoving anonymity does not end the crime. It only makes criticism risky.<br \/>\nThe imposition of true identity does this:<br \/>\nIncreases the cost of opposition speech<br \/>\nMakes the powerless more visible targets<br \/>\nPushing minority views into silence<br \/>\nIn the end, those who speak remain, but the same people speak. This does not produce pluralism, but a comfortable monologue.<\/p>\n<p><strong>4. Discrimination that the State does not see but deliberately ignores<\/strong><br \/>\nIn this debate, this mistake is always made:<br \/>\nFreedom of expression is limited by \u201cwhat is said\u201d.<br \/>\nBut freedom also encompasses the following:<br \/>\nWhere it is said<br \/>\nSaid by whom?<br \/>\nAt what risk is it said<br \/>\nThe state ignores this:<br \/>\nNot all citizens are equally resilient to the state.<br \/>\nAn academic and an unemployed youth,<br \/>\na journalist and a public servant,<br \/>\na member of the majority and a member of the minority<br \/>\ndoes not run the same risk of \u201ctrue identity\u201d.<br \/>\nThe identity requirement is therefore equal on paper but selective repression in practice.<br \/>\n5. First Threshold: Re-nationalization of the Public Sphere<br \/>\nThe common denominator of these regulations is this:<br \/>\nThe state is redesigning the public sphere as \u201cits own property\u201d.<br \/>\nFirst the press was checked.<br \/>\nThen radio and television.<br \/>\nNow it is the turn of the digital public sphere.<br \/>\nBut this time the method is more sophisticated:<br \/>\nNo ban<br \/>\nNo shutdown<br \/>\nNo explicit punishment<br \/>\nThere is only identity.<br \/>\nAnd identity is the quietest but most enduring instrument of modern power.<br \/>\nThe imposition of identity does not close the public sphere; it narrows it.<br \/>\nThe shrinking space is not noticeable.<br \/>\nThe unnoticed narrowing becomes normalized.<br \/>\nAnd by the time it normalizes, it's too late.<\/p>\n<h3>Why Does the State Always Choose the Easiest Way? Security Mind, Lazy Power and the Logic of Digital Guardianship<\/h3>\n<p>States do not like freedom.<br \/>\nGovernments like predictability.<br \/>\nThis is not a moral judgment, but a structural fact. The state exists to reduce complexity, manage uncertainty and make dissent measurable. Therefore, the natural reflex of the state is this:<br \/>\nChoosing what is easy.<br \/>\nThe imposition of identity in the digital sphere is precisely the product of this reflex. Instead of producing difficult solutions to problems, a framework is drawn that will eliminate the problem. This framework is called \u201csecurity\u201d, but its content is obedience.<\/p>\n<p><strong>1. Security Discourse: Always a Metanarrative<\/strong><br \/>\nSecurity is the wild card of modern politics.<br \/>\nEverything can be justified with it.<br \/>\nFreedom of expression is restricted \u2192 security<br \/>\nSurveillance is increased \u2192 security<br \/>\nIdentity is made mandatory \u2192 security<br \/>\nBut security is never defined. Because if it is defined, it has limits.<br \/>\nIn the digital space, the discourses of \u201cchild safety\u201d, \u201ccommunity safety\u201d and \u201cnational security\u201d are intertwined. Thus, a single intervention is presented as responding to multiple threats. However, what is being done is simple: Eliminating uncertainty.<br \/>\nThe anonymous citizen is ambiguous.<br \/>\nThe uncertain is dangerous for power.<\/p>\n<p><strong>2. The Lazy State Mind: Choosing the Heaviest Vehicle First<\/strong><br \/>\nOne of the fundamental principles of the rule of law is this:<br \/>\nThe state has to achieve its objective with the least means.<br \/>\nBut in practice the opposite is the case. The state most of the time:<br \/>\nBan instead of education<br \/>\nControl instead of institutional capacity<br \/>\nHe chooses surveillance over patience.<br \/>\nWhy is that? Because it's faster. It is cheaper. It requires less political labor.<br \/>\nDigital literacy? Long-term, laborious, difficult to measure.<br \/>\nPlatform responsibility? It requires technical knowledge, transparency, supervision.<br \/>\nJudicial capacity? It requires personnel, expertise, time.<br \/>\nThe identity imperative creates a sense of \u201csolution\u201d in one fell swoop.<br \/>\nThis is exactly what the government loves: the feeling of a solution.<\/p>\n<p><strong>3. Guardianship Logic: The State that Does Not Trust the Citizen<\/strong><br \/>\nThe basic assumption behind these arrangements is this:<br \/>\nCitizens cannot decide on their own.<br \/>\nThe child cannot choose the right content<br \/>\nAdult cannot take responsibility<br \/>\nSociety cannot self-regulate<br \/>\nThis assumption is not explicitly stated. But the whole architecture is built on it.<br \/>\nThe common feature of guardianship regimes is this:<br \/>\nThey see freedom as a risk and control as a virtue.<br \/>\nIn this view, freedom of expression is not a value; it is a tolerated exception. Exceptions are taken away at the first crisis.<\/p>\n<p><strong>4. Identity = Silencing Technology<\/strong><br \/>\nModern power no longer has to silence.<br \/>\nSilencing is expensive, visible and generates reactions.<br \/>\nInstead it does this:<br \/>\nIt increases the cost of speech.<br \/>\nThis is the real imposition of identity.<br \/>\nNobody says \u201cI am banned\u201d anymore.<br \/>\nBut he thinks:<br \/>\nWill my work be affected?<br \/>\nWill there be a report on me?<br \/>\nWill there be an investigation tomorrow?<br \/>\nIt is enough to ask these questions. There is no need for answers.<br \/>\nFor the government, the ideal citizen is this:<br \/>\nHe can talk, but he prefers not to.<\/p>\n<p><strong>5. Why is Digital Guardianship Tempting?<\/strong><br \/>\nBecause digital tutelage:<br \/>\nInvisible<br \/>\nGradual<br \/>\nSuitable for normalization<br \/>\nYou don't wake up one morning and say \u201cfreedoms are gone\u201d.<br \/>\nYou only realize this:<br \/>\nYou don't write as much as you used to.<br \/>\nThis is why digital authoritarianism is more dangerous than classical authoritarianism. Because it does not generate resistance. People adapt without realizing that they are censoring themselves.<\/p>\n<p><strong>6. Wrong Question: \u201cWill the State Abuse it?\u201d<\/strong><br \/>\nThere is a wrong question that is often asked in this debate:<br \/>\n\u201cWill the state abuse it?\u201d<br \/>\nThis question is innocent but wrong.<br \/>\nThe right question is this:<br \/>\nIs this authority open to abuse?<br \/>\nBecause law is not based on good intentions.<br \/>\nIf there is a mandate, it will be used one day.<br \/>\nIf there is infrastructure, one day the purpose changes.<br \/>\nThe system established today for children will be expanded tomorrow for \u201cpublic order\u201d.<br \/>\nThen \u201cnational security\u201d.<br \/>\nThen \u201csocial sensitivity\u201d.<br \/>\nNo one can say where this chain will stop.<br \/>\nBut everyone can see where it starts.<br \/>\nWhy Does Law Always Speak Afterwards?<br \/>\nInfrastructure, Habit and Irreversibility<br \/>\nDemocracies often rely on this fallacy:<br \/>\n\u201cIf there is a problem, the law will fix it.\u201d<br \/>\nThis was partly true for the analog era.<br \/>\nBut in the digital age it is now wrong.<br \/>\nBecause law intervenes in decisions and digital power intervenes in infrastructures.<br \/>\nAnd once the infrastructure is in place, decisions become secondary.<br \/>\nThis is where the real power of the digital tutelage regime comes from:<br \/>\nBy the time the law arrives, life has already changed.<\/p>\n<p><strong>1. The Nature of Law: Judges What Has Happened, Not What Is Happening<\/strong><br \/>\nLaw is reactive.<br \/>\nThere is a violation, a lawsuit is filed, a decision is made.<br \/>\nBut digital surveillance and identification:<br \/>\nDoes not produce singular violations<br \/>\nGradually changes behavior<br \/>\nSpreads silence<br \/>\nThere is not a single \u201cvictim\u201d to sue.<br \/>\nBecause everyone speaks a little less, writes a little less, shuts up a little more.<br \/>\nThe law cannot measure silence.<br \/>\nBut that is exactly what politics aims for.<\/p>\n<p><strong>2. Infrastructure Logic: Once Installed, It's Innocent<\/strong><br \/>\nWhen a digital system is set up, the following argument soon comes into play:<br \/>\n\u201cIt already exists, it would be irresponsible not to use it.\u201d<br \/>\nThis is one of the most dangerous phrases of modern power.<br \/>\nIdentity integration is established \u2192<br \/>\n\u201cShouldn't we use it to fight crime?\u201d<br \/>\nData repository is formed \u2192<br \/>\n\u201cShould we not use it in the fight against terrorism?\u201d<br \/>\nFilter income for the child \u2192<br \/>\n\u201cShould we not expand it for public order?\u201d<br \/>\nInfrastructure generates its own justification.<br \/>\nFrom this point on, even if politics changes, the system remains. Because the system is now presented as a \u201cneutral tool\u201d. However, no infrastructure is neutral. Every infrastructure carries within it a certain imagination of power.<\/p>\n<p><strong>3. Limitation of Courts: They Cannot Take Back Data<\/strong><br \/>\nCourts<br \/>\nCan cancel the law<br \/>\nCan stop regulation<br \/>\nCan limit jurisdiction<br \/>\nBut he cannot do these things:<br \/>\nCannot be effective in erasing aggregated data<br \/>\nCannot actually dismantle established integrations<br \/>\nCannot reverse entrenched self-censorship<br \/>\nIf a citizen has been speaking in his\/her identity for five years, a court decision saying \u201cyou are now free\u201d does not change that pattern of behavior.<br \/>\nLaw can limit the future.<br \/>\nBut it can't break the habit.<\/p>\n<p><strong>4. Normalization Threshold: The Most Dangerous Moment<\/strong><br \/>\nDigital tutelage regimes are established in three stages:<br \/>\n<em>Shock 1.<\/em><br \/>\n\u201cThis is very dangerous, freedoms are going away.\u201d<br \/>\n<em>2. Acclimatization<\/em><br \/>\n\u201cI don't write anything anyway.\u201d<br \/>\n<em>3. Legitimization<\/em><br \/>\n\u201cI'm glad there is, things have calmed down.\u201d<\/p>\n<p>In the third stage, even the opposition changes the language.<br \/>\nCriticism gives way to a demand for \u201cbetter implementation\u201d.<br \/>\nThis is the moment when it is most difficult to turn back.<br \/>\nBecause it is no longer the system but the objection that is abnormal.<\/p>\n<p><strong>5. The Illusion of the Ballot Box: Power Changes, Regime Remains<\/strong><br \/>\nThe biggest misconception is this:<br \/>\n\u201cThis system will be abolished when the government changes.\u201d<br \/>\nHowever, digital tutelage regimes are programmed to live independently of power.<br \/>\nThere are three obstacles for the new politician:<br \/>\nBureaucracy: \u201cWithout this system, there is risk.\u201d<br \/>\nSociety: \u201cWe are already used to it, why bother?\u201d<br \/>\nPolitics: \u201cIf we remove it, we will be blamed.\u201d<br \/>\nThe will to bear this cost is rare.<br \/>\nSo what happens most of the time is this:<br \/>\nThe system is not abolished.<br \/>\nIt is only made up.<br \/>\nAnd every tutelage that is made up becomes more permanent.<\/p>\n<p><strong>6. The Silent Triumph of Digital Authoritarianism<\/strong><br \/>\n20th century authoritarianism:<br \/>\nHe would impose a ban<br \/>\nHe used to close newspapers<br \/>\nHe used to silence people<br \/>\n21st century:<br \/>\nIdentity required<br \/>\nBuilds an algorithm<br \/>\nWaiting for people to shut up<br \/>\nThis second model produces less resistance.<br \/>\nBecause no one is openly repressed. Everyone remains silent \u201cby their own decision\u201d.<br \/>\nFor the government, this is the ideal situation.<br \/>\nThere is opposition but it is not heard.<br \/>\nThere is expression but it is ineffective.<br \/>\nIs a Ban-Free Solution Really Possible?<br \/>\nProtecting Freedom Does Not Mean Ignoring Problems<br \/>\nAuthoritarian solutions always come with this claim:<br \/>\n\u201cThere is no other way.\u201d<br \/>\nThis claim has been made many times throughout history.<br \/>\nAnd every time it turned out to be a lie.<br \/>\nViolence, hate speech and harmful content that children are exposed to in the digital space are real. It would be naive to deny these. But the reality of these problems does not necessitate solutions that take freedoms hostage.<br \/>\nThe real issue is this:<br \/>\nDo we want to solve problems or do we want silence?<br \/>\nIf the goal is really a solution, a path without bans is possible. But this way is more laborious. It is more laborious than governments like.<\/p>\n<p><strong>1. Government Hands Off the User, Loads on the Platform<\/strong><br \/>\nThe first and most basic principle is this:<br \/>\nThe state does not regulate the citizen; it regulates the system.<br \/>\nThis distinction is vital.<br \/>\nIt means regulating the citizen:<br \/>\nAsk for identification<br \/>\nMonitoring behavior<br \/>\nIncreasing the cost of expression<br \/>\nOrganizing the system does this:<br \/>\nControls visibility<br \/>\nLimits impact<br \/>\nDisperses power<br \/>\nThe realistic solution is to hold the platforms accountable, not to ticket the user.<br \/>\nWhat does that mean?<br \/>\nIt becomes transparent what algorithms emphasize and why<br \/>\nExcessive content is not rewarded<br \/>\nHate is neutralized not by removing it, but by preventing its spread<br \/>\nThe critical difference here is this:<br \/>\nExpression is protected, domination is broken.<br \/>\nThe duty of the state is not to silence the idea; it is to prevent the idea from suppressing everyone.<\/p>\n<p><strong>2. Instead of Enforced Identity: Tiered, Distributed Verification<\/strong><br \/>\nThe imposition of identity is \u201call or nothing\u201d.<br \/>\nThat is why it is dangerous.<br \/>\nIn the digital world, however, there is a much smarter model:<br \/>\ngradual verification.<br \/>\nThis model recognizes that:<br \/>\nEveryone can speak anonymously<br \/>\nBut not everyone can produce unlimited impact<br \/>\nHow?<br \/>\nIndividual sharing is free<br \/>\nAdditional verification required for mass reach, advertising, automation-like behavior<br \/>\nThis verification is not shared with the government<br \/>\nNo central data repository<br \/>\nThe point here is not to \u201cknow who you are\u201d;<br \/>\nis to prevent one person from acting like a thousand.<br \/>\nThis method:<br \/>\nWeakens bot networks<br \/>\nMakes organized lynching difficult<br \/>\nTargets manipulation, not opposition<br \/>\nAnd most importantly:<br \/>\nIt does not put a new surveillance key in the hands of the state.<\/p>\n<p><strong>3. Building Competence, Not Prohibition, for Children<\/strong><br \/>\nThe issue of children cannot be solved with a ban.<br \/>\nBecause children are faster than bans; even faster than algorithms.<br \/>\nThe real solution has three legs:<\/p>\n<p><em>a) Digital Citizenship at School<\/em><br \/>\nWithout this lesson, no filter will work.<br \/>\nHow does the algorithm work?<br \/>\nWhy does anger spread more?<br \/>\nHow to recognize manipulation?<br \/>\nNot \u201cwhat children should not watch\u201d,<br \/>\nwhy things are pushed in front of them.<br \/>\nThis is more effective than protection.<\/p>\n<p><em>b) Family Support, Not Family Guardianship<\/em><br \/>\nParent tools:<br \/>\nFree of charge<br \/>\nSimple<br \/>\nTransparent<br \/>\nshould be.<br \/>\nThe state is not the referee here.<br \/>\nIt becomes a guide.<\/p>\n<p><em>c) Recognition of the Child as a Subject of Rights<\/em><br \/>\nThe child is not just an object to be protected.<br \/>\nIt is also a subject that thinks, learns, makes mistakes.<br \/>\nThe state cannot think for the child.<br \/>\nIt teaches thinking.<\/p>\n<p><strong>4. Fighting Crime: Targeted Law, Not Mass Surveillance<\/strong><br \/>\nHate speech, threats and abuse are crimes.<br \/>\nThere is no debate about it.<br \/>\nBut the method of fighting crime is clear:<br \/>\nConcrete act<br \/>\nIndividual suspicion<br \/>\nJudicial decision<br \/>\nMass identification is not fighting crime.<br \/>\nIt is to assume guilt.<br \/>\nThe real solution requires the following:<br \/>\nIncreasing the digital expertise of prosecutors' offices<br \/>\nStrengthening evidence collection capacity<br \/>\nMaking platform-judiciary cooperation transparent<br \/>\nThis path is laborious.<br \/>\nBut law is laborious.<br \/>\nThe easy way is always the wrong way.<\/p>\n<p><strong>5. Independent Audit: The State Cannot Limit Itself<\/strong><br \/>\nThis is the most critical threshold.<br \/>\nControl of digital space:<br \/>\nMinistries<br \/>\nTo Security<br \/>\nExecutive<br \/>\ncannot be left.<br \/>\nBecause no power voluntarily limits the power given to it.<br \/>\nInstead:<br \/>\nMulti-actor<br \/>\nIndependent<br \/>\nTransparent<br \/>\na Digital Rights Audit is required.<br \/>\nThis structure<br \/>\nAudits platforms<br \/>\nDraws the boundaries of the state<br \/>\nProtects the citizen<br \/>\nAnd it does not produce automatic bans in times of crisis.<\/p>\n<p><strong>6. Why This Way is Harder but Right?<\/strong><br \/>\nBecause this is the way:<br \/>\nRequires patience<br \/>\nRequires training<br \/>\nRequires institutional capacity<br \/>\nBut in return he gives this:<br \/>\nPublic space remains vibrant<br \/>\nCourage to express is protected<br \/>\nThe ballot box does not lose its meaning<br \/>\nThe imposition of identity:<br \/>\nFast<br \/>\nShowy<br \/>\nGets applause<br \/>\nBut it leaves behind a practiced silence.<br \/>\nPower Chooses Easy, Democracy Chooses Hard<br \/>\nThe easiest solution for the state is this:<br \/>\n\u201cGive me your ID, shut up.\u201d<br \/>\nThe right solution for democracy is this:<br \/>\n\u201cSpeak, but don't crush anyone.\u201d<br \/>\nWhat has been argued throughout this article is simple but disturbing:<br \/>\nThere is no necessary trade-off between freedom and security.<br \/>\nThe mistake is to present the two as opposites.<br \/>\nA ban-free solution is possible.<br \/>\nBut for that, one has to accept this:<br \/>\nThe state cannot control everything.<br \/>\nAs long as it controls, it cannot rule.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Problem is Deliberately Misnamed<\/p>","protected":false},"author":14,"featured_media":282874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[286],"tags":[289],"class_list":{"0":"post-282873","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-yazarlar","8":"tag-manset"},"_links":{"self":[{"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/posts\/282873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/comments?post=282873"}],"version-history":[{"count":1,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/posts\/282873\/revisions"}],"predecessor-version":[{"id":282875,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/posts\/282873\/revisions\/282875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/media\/282874"}],"wp:attachment":[{"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/media?parent=282873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/categories?post=282873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/halkweb.com.tr\/en\/wp-json\/wp\/v2\/tags?post=282873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}