{"id":699,"date":"2019-05-30T16:41:14","date_gmt":"2019-05-30T07:41:14","guid":{"rendered":"http:\/\/guide.jinbo.net\/digital-security\/?page_id=699"},"modified":"2019-05-30T16:42:49","modified_gmt":"2019-05-30T07:42:49","slug":"security_scenario_for_activist","status":"publish","type":"page","link":"https:\/\/guide.jinbo.net\/digital-security\/overviews\/security_scenario_for_activist","title":{"rendered":"\ud65c\ub3d9\uac00 \ubc0f \uc2dc\ubbfc\ub2e8\uccb4\ub97c \uc704\ud55c \ub514\uc9c0\ud138 \ubcf4\uc548 \uc2dc\ub098\ub9ac\uc624"},"content":{"rendered":"<section id=\"builder-section-text_12\" class=\"builder-section-first builder-section builder-section-text builder-section-last builder-text-columns-1\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_12-column-1\">\n<div class=\"builder-text-content\">\n<div class=\"original\">\ucd5c\uc885 \uac80\ud1a0\uc77c : 2019.05.30<\/div>\n<div class=\"editor-wrap\">\n<div class=\"editors-note\">\uac10\uc2dc\uc640 \uc704\ud611\uc740 \uc0ac\ud68c\uc758 \ubaa8\ub4e0 \uad6c\uc131\uc6d0\uc5d0\uac8c \uc601\ud5a5\uc744 \ub07c\uce5c\ub2e4. \ud2b9\ud788 \ub2f9\uc2e0\uc774 \uacf5\uc778, \uc5b8\ub860\uc778, \uc0ac\ud68c\uc6b4\ub3d9\uac00\ub77c\uba74 \ub354 \ucee4\ub2e4\ub780 \uc704\ud611\uc774 \ub420 \uc218\ub3c4 \uc788\ub2e4. \uac00\uc0c1\uc758 \uc2dc\ubbfc\ub2e8\uccb4 \ud65c\ub3d9\uac00 A\uc758 \uc2dc\ub098\ub9ac\uc624\ub97c \ud1b5\ud574, \ud2b9\uc815 \uadf8\ub8f9\uc774 <a href=\"https:\/\/guide.jinbo.net\/digital-security\/overviews\/threat-modeling\">\uc704\ud611 \ubaa8\ub378\ub9c1<\/a>\ud3c9\uac00\ub97c \uc218\ud589\ud558\uace0 \uc790\uccb4\uc801\uc778 \ubcf4\uc548 \uc815\ucc45\uc744 \ub9cc\ub4dc\ub294 \uacfc\uc815\uc744 \uc0b4\ud3b4\ubcf8\ub2e4.<\/div>\n<\/div>\n<div><\/div>\n<h2>\uc704\ud611 \ubaa8\ub378\ub9c1\uc744 \ud1b5\ud55c \ud604 \uc0c1\ud0dc \ud3c9\uac00<\/h2>\n<ol>\n<li>\ubb34\uc5c7\uc744 \ubcf4\ud638\ud558\uace0 \uc2f6\uc740\uac00?<\/li>\n<p>A\ub294 \ud65c\ub3d9\uc758 \ub300\ubd80\ubd84\uc744 \ucef4\ud4e8\ud130\uc640 \uc2a4\ub9c8\ud2b8\ud3f0\uc744 \uc774\uc6a9\ud574 \uc628\ub77c\uc778\uc73c\ub85c \uc9c4\ud589\ud55c\ub2e4. \uad6c\uae00\ub2e5\uc2a4\uc640 \uad6c\uae00\ub4dc\ub77c\uc774\ube0c\ub97c \uc774\uc6a9\ud574 \ubb38\uc11c\ub97c \ub9cc\ub4e4\uace0 \uacf5\uc720\ud558\uace0 \ubcf4\uad00\ud558\uba70, \uc2a4\ub9c8\ud2b8\ud3f0\uc758 \uba54\uc2e0\uc800 \uc571\uc744 \ud1b5\ud574 \ub2e8\uccb4\uc758 \ub3d9\ub8cc\ub4e4\uacfc \uc18c\ud1b5\ud55c\ub2e4. \ub610\ud55c \uac1c\uc778 SNS\ub294 \ubb3c\ub860\uc774\uace0 \ub2e8\uccb4\uc758 SNS\uacc4\uc815\ub3c4 \ud65c\ubc1c\ud788 \uc6b4\uc601\ud55c\ub2e4. SNS\uc5d0\ub294 \ud65c\ub3d9\uc5d0 \uad00\ud55c \ub0b4\uc6a9 \ubfd0\ub9cc \uc544\ub2c8\ub77c \uc0ac\uc801\uc778 \uc774\uc57c\uae30\ub97c \uc62c\ub9ac\uae30\ub3c4 \ud55c\ub2e4. A\ub294 \uc774\ub7ec\ud55c \uc804\ubc18\uc801\uc778 \uc628\ub77c\uc778 \uc0c1\uc758 \ud65c\ub3d9\uc744 \ubcf4\ud638\ud558\uace0 \uc2f6\ub2e4.<br \/>\n&nbsp;<\/p>\n<li>\ub204\uad6c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uace0 \uc2f6\uc740\uac00?<\/li>\n<p>A\ub294 \uc9d1\ud68c\uc640 \uc2dc\uc704\uc5d0 \uc790\uc8fc \uac04\ub2e4. \ub2e8\uc21c\ud788 \ucc38\uc11d\ud558\ub294 \uac83 \ubfd0\ub9cc \uc544\ub2c8\ub77c \uc9c1\uc811 \uae30\ud68d\uacfc \ud64d\ubcf4\ub97c \ud560 \ub54c\ub3c4 \uc788\ub2e4. \uc774\ub85c \uc778\ud574 \uc815\ubd80\ub098 \ud2b9\uc815 \uae30\uc5c5\uacfc \ub9c8\ucc30\uc744 \ube5a\uc744 \uac00\ub2a5\uc131\uc774 \ub192\ub2e4. \uc989 A\ub294 \uc815\ubd80\uc640 \uae30\uc5c5\uc73c\ub85c\ubd80\ud130 \uc704\uc758 \uc815\ubcf4\ub4e4\uc744 \ubcf4\ud638\ud558\uace0 \uc2f6\ub2e4. \ub610\ud55c A\uac00 \ud65c\ub3d9\ud558\ub294 \uc0ac\uc548\uc5d0 \ub530\ub77c, \uc628\ub77c\uc778 \uc0c1\uc5d0\uc11c \ub2e4\ub978 \uc0ac\ub78c\ub4e4\uacfc \ucda9\ub3cc\ud558\ub294 \uacbd\uc6b0\uac00 \uc788\ub2e4. \uac74\uc124\uc801\uc778 \ub17c\uc7c1\ub3c4 \uc788\uc9c0\ub9cc \ub54c\ub85c\ub294 \uc9c1\uc811\uc801\uc778 \ud611\ubc15\uc744 \ubc1b\uae30\ub3c4 \ud55c\ub2e4. \ub530\ub77c\uc11c \ud2b9\uc815\ud55c \uadf8\ub8f9\uc73c\ub85c\ubd80\ud130 \uc815\ubcf4\ub4e4\uc744 \ubcf4\ud638\ud574\uc57c \ud560 \ud544\uc694\uc131\uc774 \uc788\ub2e4.<br \/>\n&nbsp;<\/p>\n<li>\uadf8\uac83\uc744 \ubcf4\ud638\ud560 \ud544\uc694\uc131\uc774 \uc5bc\ub9c8\ub098 \uc788\ub294\uac00? | \uc2e4\ud328\ud560 \uacbd\uc6b0 \uc5b4\ub5a0\ud55c \ub098\uc05c \uacb0\uacfc\uac00 \ucd08\ub798\ub418\ub294\uac00?<\/li>\n<p>A\uc758 \ud65c\ub3d9\uacfc A\uac00 \ucc38\uc11d\ud558\uace0 \uae30\ud68d\ud558\ub294 \uc9d1\ud68c \ubc0f \uc2dc\uc704\ub294 \ub54c\ub54c\ub85c \ubd88\ubc95\uc758 \uc5ec\uc9c0\uac00 \uc788\ub2e4. \ubd88\ubc95\uc758 \uc5ec\uc9c0\uac00 \uc5c6\ub2e4 \ud558\ub354\ub77c\ub3c4 \uc815\ubd80\uae30\uad00\uc774\ub098 \uae30\uc5c5\uc5d0\uac8c \ube4c\ubbf8\ub97c \uc904 \uc218 \uc788\ub2e4. \uc774\ub7ec\ud55c \ubc95\uc801 \uacf5\ubc29\uc740 \uadf8 \uc790\uccb4\ub85c A\uc758 \uc0dd\ud65c\uacfc \ud65c\ub3d9\uc5d0 \uc9c0\uc7a5\uc744 \uc904 \uac83\uc774\ub2e4. \ub610\ud55c \uc628\ub77c\uc778 \uc0c1\uc5d0\uc11c A\uc640 \ucda9\ub3cc\ud55c \ub204\uad70\uac00\uac00 A\uc758 SNS\uacc4\uc815\uc744 \ud574\ud0b9\ud558\uac70\ub098 \uc0ac\uc0dd\ud65c\uc744 \uc5fc\ud0d0\ud560 \uac00\ub2a5\uc131\ub3c4 \uc788\ub2e4.<br \/>\n&nbsp;<\/p>\n<li>\ub098\uc05c \uacb0\uacfc\ub4e4\uc744 \ub9c9\uae30 \uc704\ud574 \uc5bc\ub9c8\ub098 \ub9ce\uc740 \uc5b4\ub824\uc6c0\uc744 \uadf9\ubcf5\ud560 \uc758\ud5a5\uc774 \uc788\ub294\uac00?<\/li>\n<p>A\uac00 \ud65c\ub3d9\ud558\ub294 \ub2e8\uccb4\ub294 \uc624\ub85c\uc9c0 \uc2dc\ubbfc\ub4e4\uc758 \ud6c4\uc6d0\uc73c\ub85c\ub9cc \uc6b4\uc601\ub41c\ub2e4. \uadf8\ub807\uae30\uc5d0 \ub514\uc9c0\ud138 \ubcf4\uc548\uc5d0 \ucd94\uac00\uc801\uc778 \ub3c8\uc744 \ud22c\uc790\ud558\ub294 \uac83\uc740 \uc27d\uc9c0 \uc54a\uc740 \uc77c\uc774\ub2e4. \ud558\uc9c0\ub9cc \uc57d\uac04\uc758 \ubd88\ud3b8\ud568\uc744 \uac10\uc218\ud558\uac70\ub098, \uae30\uc874\uc758 \uc571\uacfc \ud504\ub85c\uadf8\ub7a8\uc744 \ubc14\uafc0 \uc758\ud5a5\uc740 \uc788\ub2e4.<br \/>\n&nbsp;<\/ol>\n<h2>\ub514\uc9c0\ud138 \ubcf4\uc548 \uc815\ucc45 \uc138\uc6b0\uae30<\/h2>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span>\ud3c9\uc18c \uc0ac\uc6a9\ud558\ub358 \ud154\ub808\uadf8\ub7a8 \uba54\uc2e0\uc800 \ub300\uc2e0 <a href=\"https:\/\/guide.jinbo.net\/digital-security\/smartphone-security\/how-to-use-signa\">\uc2dc\uadf8\ub110<\/a>\uc744 \uc0ac\uc6a9\ud55c\ub2e4.<\/p>\n<p>A\ub294 \uce74\uce74\uc624\ud1a1 \uc555\uc218\uc218\uc0c9 \uc0ac\uac74 \uc774\ud6c4, \uc815\ubd80\uc758 \uac10\uc2dc\ub97c \ud53c\ud558\uace0\uc790 \ud154\ub808\uadf8\ub7a8\uc744 \uc0ac\uc6a9\ud574\uc654\ub2e4. \ud154\ub808\uadf8\ub7a8\uc740 \ubcf4\uc548 \uba54\uc2e0\uc800\ub85c \uad11\ubc94\uc704\ud558\uac8c \uc54c\ub824\uc84c\uc9c0\ub9cc, \u2018\ube44\ubc00\ucc44\ud305\u2019 \uc744 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\ub294 \uc774\uc0c1 <a href=\"https:\/\/guide.jinbo.net\/digital-security\/communication-security\/e2e-encryption\">\uc885\ub2e8\uac04 \uc554\ud638\ud654<\/a>\ub97c \uc9c0\uc6d0\ud558\uc9c0 \uc54a\ub294\ub2e4. \uc2dc\uadf8\ub110 \uc0ac\uc6a9\uc5d0 \ucd94\uac00\uc801\uc778 \ube44\uc6a9\uc774 \ud544\uc694\ud558\uc9c0 \uc54a\uace0 \uae30\ub2a5 \uc0c1 \ud154\ub808\uadf8\ub7a8\uacfc \ud070 \ucc28\uc774\uac00 \uc5c6\ub2e4\ub294 \uc810\uc744 \uace0\ub824\ud558\uc5ec, \ud65c\ub3d9\uacfc \uad00\ub828\ub41c \uc18c\ud1b5\uc740 \uc2dc\uadf8\ub110 \uba54\uc2e0\uc800\ub85c \uc9c4\ud589\ud558\uae30\ub85c \ud588\ub2e4.<\/p>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span>\uc790\ub8cc \ubcf4\uad00\uacfc \ubb38\uc11c \uc791\uc131, \uc774\uba54\uc77c \uc0ac\uc6a9\uc5d0 \uc788\uc5b4 \ud2b9\uc815 \ud68c\uc0ac(\uad6c\uae00)\uc5d0 \ub300\ud55c \uc758\uc874\uc744 \uc904\uc778\ub2e4.<\/p>\n<p>\uc77c\ubc18\uc801\uc778 \uc0c1\ud669\uc5d0\uc11c A\uc758 \ud65c\ub3d9\uc774 \ud2b9\uc815 \ud68c\uc0ac\ub97c \uc801\uc73c\ub85c \ub3cc\ub9b4 \ud655\ub960\uc740 \uc801\ub2e4. \ud558\uc9c0\ub9cc \uc554\ud638\ud654\uac00 \ub418\uc5b4 \uc788\uc9c0 \uc54a\uc740 \uc0c1\uc6a9 \ud074\ub77c\uc6b0\ub4dc \uc11c\ube44\uc2a4\uc5d0 \uc790\uc2e0\uc758 \ud65c\ub3d9 \uc815\ubcf4\uac00 \uc800\uc7a5\ub41c\ub2e4\ub294 \uc0ac\uc2e4\uc744 \uacbd\uacc4\ud558\uace0(\uc815\ubd80\uac00 \ud574\ub2f9 \ud68c\uc0ac\uc5d0 A\uc5d0 \ub300\ud55c \uc790\ub8cc\ub97c \uc694\uad6c\ud560 \uc218\ub3c4 \uc788\ub2e4), \ud558\ub098\uc758 \uacc4\uc815\uc5d0 \uc218\ub9ce\uc740 \uc815\ubcf4\uac00 \ub2f4\uaca8\uc788\ub294 \ub9cc\ud07c(\uacc4\uc815 \ud558\ub098\uac00 \uacf5\uaca9 \ubc1b\uc73c\uba74 \uc5f0\uad00\ub41c \ubaa8\ub4e0 \uacc4\uc815\uc774 \uc704\ud5d8\ud558\ub2e4) \uadf8 \uc758\uc874\ub3c4\ub97c \ub0ae\ucd94\uae30\ub85c \ud588\ub2e4.<br \/>\n\ube44\uc6a9\uacfc \ud6a8\uc728\uc744 \uace0\ub824\ud558\uc5ec \ub300\uccb4 \ud504\ub85c\uadf8\ub7a8\ub97c \uc0ac\uc6a9\ud558\ub294 \ub300\uc2e0, \ubcf4\uc548\uc774 \uc911\uc694\ud55c \ubb38\uc11c\ub294 \uc544\uc608 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \ubcf4\uad00\ud558\uc9c0 \uc54a\uac70\ub098 \uc774\uba54\uc77c\ub85c \uc8fc\uace0 \ubc1b\uc9c0 \uc54a\uae30\ub85c \ud588\ub2e4.<\/p>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span>\uc2a4\ub9c8\ud2b8\ud3f0\uc744 \uc554\ud638\ud654\ud55c\ub2e4.<\/p>\n<p>\uc885\ub2e8\uac04 \uc554\ud638\ud654 \uba54\uc2e0\uc800\ub97c \uc774\uc6a9\ud574\ub3c4 \uadf8 \uae30\ub85d\uc774 \uc2a4\ub9c8\ud2b8\ud3f0 \ub0b4\uc5d0 \ub0a8\uc544\uc788\uc73c\uba74 \ubb38\uc81c\uac00 \ub420 \uc218\ub3c4 \uc788\ub2e4. A\ub294 <a href=\"https:\/\/guide.jinbo.net\/digital-security\/smartphone-security\/how-to-encrypt-iphone\">\uc2a4\ub9c8\ud2b8\ud3f0\uc744 \uc554\ud638\ud654\ud558\uace0<\/a> \uadf8 \uc554\ud638\ub97c \uac15\ub825\ud558\uac8c \uc124\uc815\ud558\uc5ec \uc124\ub839 \uc555\uc218\uc218\uc0c9\uc744 \ub2f9\ud558\uac70\ub098 \ub3c4\ub09c\uc744 \ub2f9\ud574\ub3c4 \uacf5\uaca9\uc790\uac00 \uc2a4\ub9c8\ud2b8\ud3f0 \uc548\uc758 \ub370\uc774\ud130\uc5d0 \uc27d\uac8c \uc811\uadfc\ud560 \uc218 \uc5c6\uac8c \ub9cc\ub4e4\uc5c8\ub2e4.<\/p>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span>\uc628\ub77c\uc778 \uc11c\ube44\uc2a4 \ubc0f \uacc4\uc815\uc758 \uc554\ud638\uc640 \ubcf4\uc548\uc744 \uac15\ud654\ud55c\ub2e4.<\/p>\n<p>A\ub294 \ud558\ub098\uc758 \uad6c\uae00 \uacc4\uc815\uc73c\ub85c \ub2e4\uc591\ud55c \uc11c\ube44\uc2a4\uc5d0 \uac00\uc785\ud588\ub2e4, \uc11c\uc810\uacfc \uc1fc\ud551\ubab0 \uc6f9\uc0ac\uc774\ud2b8\ubd80\ud130 \uc2a4\ud2b8\ub9ac\ubc0d \uc11c\ube44\uc2a4, \uadf8\ub9ac\uace0 SNS\uacc4\uc815\uae4c\uc9c0. \uba3c\uc800 A\ub294 \ud574\ub2f9 \uacc4\uc815 \ub85c\uadf8\uc778\uc5d0 \uc788\uc5b4 2\ub2e8\uacc4 \uc778\uc99d\uc744 \uc124\uc815\ud588\ub2e4. \uadf8\ub9ac\uace0 \uc77c\uc0c1\uc801\uc73c\ub85c \uc0ac\uc6a9\ud558\ub294 \uc11c\ube44\uc2a4\uc640 \ud65c\ub3d9\uacfc \uad00\ub828\uc774 \ub418\ub294 \uc11c\ube44\uc2a4\uc758 \uacc4\uc815 \uc815\ubcf4\ub97c \ubd84\ub9ac\ud558\uae30\ub85c \ud588\ub2e4. \ub610\ud55c \uae38\uace0 \uac15\ub825\ud55c \uc870\ud569\uc758 \uc554\ud638\ub85c \ubcc0\uacbd\ud588\uace0, \uc774\ub97c \uad00\ub9ac\ud558\uae30 \uc704\ud574 <a href=\"http:\/\/[https:\/\/guide.jinbo.net\/digital-security\/smartphone-security\/how-to-encrypt-iphone\">\uc554\ud638 \uad00\ub9ac \ud504\ub85c\uadf8\ub7a8<\/a>\uc744 \uc774\uc6a9\ud558\uae30\ub85c \ud588\ub2e4.<\/p>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span>\uc9d1\ud68c \ubc0f \uc2dc\uc704\uc5d0 \ucc38\uc11d\ud558\uae30 \uc804\uc5d0\ub294 \ubcf4\uc548 \ub2e8\uacc4\ub97c \ub192\uc778\ub2e4.<\/p>\n<p>A\ub294 \uc9d1\ud68c \ubc0f \uc2dc\uc704\uc5d0 \ucc38\uc11d\ud560 \ub54c \uc2a4\ub9c8\ud2b8\ud3f0\uc744 \uc9d1\uc5d0 \ub450\uace0 \ub2e4\ub2d0 \uc0dd\uac01\uc774\uc5c8\ub2e4. \ud558\uc9c0\ub9cc \uc2e4\uc2dc\uac04 \uc0c1\ud669 \uacf5\uc720\uc640 SNS \ud65c\ub3d9\uc744 \uc704\ud574 \uc2a4\ub9c8\ud2b8\ud3f0\uc744 \ub4e4\uace0 \ub2e4\ub2d0 \uc218\ubc16\uc5d0 \uc5c6\uc5c8\ub2e4. \ub300\uc2e0, \ub2e4\uc591\ud55c \uc704\ud5d8(\uc5f0\ud589 \uac00\ub2a5\uc131, \ubd84\uc2e4 \uac00\ub2a5\uc131, \uc555\uc218 \uac00\ub2a5\uc131 \ub4f1)\uc744 \uace0\ub824\ud558\uc5ec \ucc38\uc11d \uc804 \ucd94\uac00\ub85c \uc810\uac80\ud574\uc57c \ud560 \ub9ac\uc2a4\ud2b8\ub97c \ub9cc\ub4e4\uc5c8\ub2e4.<\/p>\n<div class=\"emphasis\">\uc2a4\ub9c8\ud2b8\ud3f0\uc774 \uc554\ud638\ud654\ub418\uc5b4\uc788\ub294\uc9c0 \ud655\uc778\ud55c\ub2e4.<br \/>\n\uc9c0\ubb38 \uc778\uc2dd \ub610\ub294 \uc5bc\uad74 \uc778\uc2dd\uc744 \ud1b5\ud55c \uc7a0\uae08\ud574\uc81c\ub97c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\ub294\ub2e4.<br \/>\n\uc2a4\ub9c8\ud2b8\ud3f0 \ub0b4 \ub370\uc774\ud130\ub97c \ubc31\uc5c5\ud574\ub454\ub2e4.<\/div>\n<p style=\"text-align: justify;padding-left: 30px;font-size: 19px\"><span class=\"ttfmake-icon mceNonEditable fa\">\uf046<\/span><a href=\"https:\/\/guide.jinbo.net\/digital-security\/communication-security\/protect-yourself-social-network\">\uc548\uc804\ud55c SNS \uc0dd\ud65c<\/a>\uc744 \uc704\ud574 \uc0ac\uc6a9 \uc2b5\uad00\uc744 \uc810\uac80\ud55c\ub2e4.<\/p>\n<p>A\ub294 \uac01 SNS\uc758 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc815\ucc45\uacfc \ubcf4\uc548 \uc124\uc815 \ub4f1\uc744 \uc0b4\ud3b4\ubcf4\uace0 \uba87 \uac00\uc9c0 \uc6d0\uce59\uc744 \uc815\ud588\ub2e4.<\/p>\n<div class=\"emphasis\">\uc704\uce58\uc815\ubcf4 \ubc0f \uae30\ud0c0 \uac1c\uc778\uc815\ubcf4\uc640 \uad00\ub828\ub41c \uc124\uc815\uc744 \ubaa8\ub450 \uacf5\uc720\ud558\uc9c0 \uc54a\uae30\ub85c \ud55c\ub2e4.<br \/>\n\uac1c\uc778\uc801\uc778 \uc0ac\uc9c4\uc744 \uacf5\uc720\ud558\uae30 \uc804, \uba54\ud0c0\ub370\uc774\ud130\uac00 \ub0a8\uc544\uc788\uc9c0 \uc54a\ub3c4\ub85d \ub9cc\ub4e4\uace0 \uc758\ub3c4\uce58 \uc54a\uac8c \uc2e4\uc2dc\uac04 \uc704\uce58\ub97c \uc54c\ub9ac\uc9c0 \uc54a\uac8c\ub054 \uc8fc\uc758\ud55c\ub2e4.<br \/>\nSNS\uc5d0\uc11c \ub0af\uc120 \uc0ac\ub78c\uc744 \uacbd\uacc4\ud558\uace0, \uc2e0\uc6d0\uc774 \ud655\uc2e4\ud558\uac8c \ubcf4\uc99d\ub418\uc9c0 \uc54a\uc740 \uc774\ub85c\ubd80\ud130 \ubc1b\ub294 \ub9c1\ud06c, \ucca8\ubd80\ud30c\uc77c\uc744 \uc8fc\uc758\ud55c\ub2e4.<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>\ucd5c\uc885 \uac80\ud1a0\uc77c : 2019.05.30 \uac10\uc2dc\uc640 \uc704\ud611\uc740 \uc0ac\ud68c\uc758 \ubaa8\ub4e0 \uad6c\uc131\uc6d0\uc5d0\uac8c \uc601\ud5a5\uc744 \ub07c\uce5c\ub2e4. \ud2b9\ud788 \ub2f9\uc2e0\uc774 \uacf5\uc778, \uc5b8\ub860\uc778, \uc0ac\ud68c\uc6b4\ub3d9\uac00\ub77c\uba74 \ub354 \ucee4\ub2e4\ub780 \uc704\ud611\uc774 \ub420 \uc218\ub3c4 \uc788\ub2e4. \uac00\uc0c1\uc758 \uc2dc\ubbfc\ub2e8\uccb4 \ud65c\ub3d9\uac00 A\uc758 \uc2dc\ub098\ub9ac\uc624\ub97c \ud1b5\ud574, \ud2b9\uc815 \uadf8\ub8f9\uc774 \uc704\ud611 \ubaa8\ub378\ub9c1\ud3c9\uac00\ub97c \uc218\ud589\ud558\uace0 \uc790\uccb4\uc801\uc778 \ubcf4\uc548 \uc815\ucc45\uc744 \ub9cc\ub4dc\ub294 \uacfc\uc815\uc744 \uc0b4\ud3b4\ubcf8\ub2e4. \uc704\ud611 \ubaa8\ub378\ub9c1\uc744 \ud1b5\ud55c \ud604 \uc0c1\ud0dc \ud3c9\uac00 \ubb34\uc5c7\uc744 \ubcf4\ud638\ud558\uace0 \uc2f6\uc740\uac00? A\ub294 \ud65c\ub3d9\uc758 \ub300\ubd80\ubd84\uc744 \ucef4\ud4e8\ud130\uc640 \uc2a4\ub9c8\ud2b8\ud3f0\uc744 \uc774\uc6a9\ud574 \uc628\ub77c\uc778\uc73c\ub85c &hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":6,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"template-builder.php","meta":{"jetpack_post_was_ever_published":false},"categories":[],"tags":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6uv38-bh","_links":{"self":[{"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/699"}],"collection":[{"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=699"}],"version-history":[{"count":0,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/699\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/6"}],"wp:attachment":[{"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}