{"id":25574,"date":"2026-04-29T10:10:48","date_gmt":"2026-04-29T10:10:48","guid":{"rendered":"https:\/\/hpdrones.pro\/?p=25574"},"modified":"2026-04-29T10:20:27","modified_gmt":"2026-04-29T10:20:27","slug":"dji-security-protocol-2026-data-in-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/","title":{"rendered":"DJI Security Protocol 2026: Data in Critical Infrastructure"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Critical infrastructure has always faced a dilemma: how to capture valuable data without compromising national security? DJI is here to resolve this paradox, redefining data security in critical environments through a security protocol based on the philosophy: \u201cData Under Control. Infrastructure Protected.\u201d<\/span><\/p>\n<h2><b>The Era of Data Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DJI not only recognizes the importance of data sovereignty but also places it at the center of its operational strategy. By implementing government-grade security protocols and undergoing rigorous independent audits, organizations can:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Operate with full transparency regarding where and how data is stored;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure compliance with national security and critical infrastructure regulations;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Maintain absolute control over sensitive data captured during critical operations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All while maintaining the operational efficiency that drone technologies provide.<\/span><\/p>\n<h2><b>Data Control Without Compromise<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The greatest advantage of the DJI 2026 security protocol is its \u201cuser-controlled data\u201d approach.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Explicit Permissions:<\/b><span style=\"font-weight: 400;\"> DJI does not access any user data without explicit consent. This fundamental principle ensures that critical infrastructure organizations maintain full control over sensitive information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>End-to-End Encryption:<\/b><span style=\"font-weight: 400;\"> All data transmitted between the drone and the ground control station is protected with AES-256 encryption, preventing interception or unauthorized access during real-time operations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Geographically Controlled Storage:<\/b><span style=\"font-weight: 400;\"> Data from operators outside China is stored exclusively on servers located in the U.S. For agricultural and specialized operations, DJI offers storage options on servers in the U.S., Japan, or Europe, enabling compliance with data residency regulations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proprietary OcuSync Protocol:<\/b><span style=\"font-weight: 400;\"> A communication system developed in-house by DJI with built-in encryption, creating a secure, dedicated communication channel that does not rely on third-party communication infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Configurable Security Mode:<\/b><span style=\"font-weight: 400;\"> During initial setup, operators choose the security mode that best suits their needs\u2014ranging from standard commercial operations to enhanced modes for critical infrastructure.<\/span><\/li>\n<\/ul>\n<h2><b>Compliance Verified by Independent Third Parties<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The credibility of DJI\u2019s security does not rest on internal claims. Since 2017, independent audits by international cybersecurity firms and government agencies have rigorously validated our security protocols.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Three Key Certifications:<\/span><\/p>\n<p><b>NIST FIPS 140-2 (2022):<\/b><span style=\"font-weight: 400;\"> The DJI Core Crypto Engine\u2014the central cryptographic engine that protects all sensitive data\u2014has been certified by the National Institute of Standards and Technology. This is the most rigorous standard for cryptographic modules, used by U.S. federal agencies.<\/span><\/p>\n<p><b>ISO 27001 (2023):<\/b><span style=\"font-weight: 400;\"> DJI FlightHub 2 has received ISO 27001 certification, validating that its design, development, and operational services comply with international information security management standards.<\/span><\/p>\n<p><b>FTI Cybersecurity Audit (2024):<\/b><span style=\"font-weight: 400;\"> A comprehensive independent audit of the Mavic 3T, Pilot 2, and RC Pro systems, confirming that U.S. operators can trust the security protocols when selecting enhanced safety modes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, agencies such as the U.S. Department of the Interior and the Idaho National Laboratory, as well as firms such as Booz Allen Hamilton and T\u00dcV S\u00dcD, have conducted independent validations that confirmed the integrity of DJI\u2019s security protocols.<\/span><\/p>\n<h2><b>Multisectoral Engineering for Critical Infrastructure<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The DJI 2026 security protocol is designed to protect operations across multiple critical sectors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Energy Infrastructure Inspection: <\/b><span style=\"font-weight: 400;\">Power lines, substations, and solar facilities can be inspected while critical data remains under local control, without transmission to unauthorized remote servers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Perimeter Surveillance and Physical Security:<\/b><span style=\"font-weight: 400;\"> Surveillance operations at sensitive facilities generate data that remains encrypted and under the operator\u2019s control, with options for full offline storage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Port and Airport Infrastructure Maintenance:<\/b><span style=\"font-weight: 400;\"> Structural inspection data can be captured, encrypted, and stored locally, complying with critical security regulations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Emergency Response Operations:<\/b><span style=\"font-weight: 400;\"> In crisis situations, drone data can be captured and used without concerns about transmitting sensitive data to third parties.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Investigation and Forensics: <\/b><span style=\"font-weight: 400;\">Forensic data captured by drones maintains a digital chain of custody through encryption and cryptographic signatures.<\/span><\/li>\n<\/ul>\n<h2><b>Layered Security Architecture<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The DJI 2026 protocol implements multi-layered security:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Device Layer:<\/b><span style=\"font-weight: 400;\"> Secure Boot protects software integrity, Secure Key Management ensures that cryptographic keys are never exposed, and Secure Storage protects sensitive data on the device.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Communication Layer:<\/b><span style=\"font-weight: 400;\"> OcuSync with AES-256 protects all data transmitted between the drone and the controller, preventing interception or unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Storage Layer:<\/b><span style=\"font-weight: 400;\"> Data can be stored locally on the drone, on the controller, or in a private cloud. Users choose the architecture that best suits their security needs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Access Control Layer:<\/b><span style=\"font-weight: 400;\"> Granular permissions ensure that only authorized users can access specific data. Audit logs track all access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance Layer: <\/b><span style=\"font-weight: 400;\">Compliance with GDPR, national data regulations, and critical infrastructure requirements is built-in, not an add-on.<\/span><\/li>\n<\/ul>\n<h2><b>Secure Wiping and Total Control<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Operators maintain total control over data through secure wiping capabilities. Data can be wiped from the device, controller, or cloud with a single command: \u201cClear All Device Data\u201d via DJI Pilot 2. This feature ensures that sensitive data never remains on the system longer than necessary.<\/span><\/p>\n<h2><b>The Future of Data Sovereignty<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In a market that demands absolute security, regulatory compliance, and verifiable data control, the DJI 2026 security protocol positions critical infrastructure operations at the forefront of protection. It\u2019s not just about encryption; it\u2019s about a security architecture that puts the user in control.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DJI believes that the future of critical infrastructure is one where advanced technology and data sovereignty are not trade-offs, but complementary. With the 2026 security protocol, sensitive data can be captured, protected, and controlled without sacrificing operational efficiency.<\/span><\/p>\n<p><b>Are you ready to implement verifiable data security in your critical operations?<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical infrastructure has always faced a dilemma: how to capture valuable data without compromising national security? DJI is here to resolve this paradox, redefining data security in critical environments through a security protocol based on the philosophy: \u201cData Under Control. Infrastructure Protected.\u201d The Era of Data Security DJI not only recognizes the importance of data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":25569,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[23],"tags":[],"class_list":["post-25574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES\" \/>\n<meta property=\"og:description\" content=\"Critical infrastructure has always faced a dilemma: how to capture valuable data without compromising national security? DJI is here to resolve this paradox, redefining data security in critical environments through a security protocol based on the philosophy: \u201cData Under Control. Infrastructure Protected.\u201d The Era of Data Security DJI not only recognizes the importance of data [&hellip;]\" \/>\n<meta property=\"og:site_name\" content=\"HPDRONES\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T10:10:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T10:20:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hp-drones.com\/wp-content\/uploads\/2026\/04\/Post-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1890\" \/>\n\t<meta property=\"og:image:height\" content=\"1060\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"HP Drones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HP Drones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/\"},\"author\":{\"name\":\"HP Drones\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#\\\/schema\\\/person\\\/e55d2c41939c756962c79ce94ac28ce4\"},\"headline\":\"DJI Security Protocol 2026: Data in Critical Infrastructure\",\"datePublished\":\"2026-04-29T10:10:48+00:00\",\"dateModified\":\"2026-04-29T10:20:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/\"},\"wordCount\":865,\"publisher\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Post-Blog.png\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/\",\"name\":\"DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Post-Blog.png\",\"datePublished\":\"2026-04-29T10:10:48+00:00\",\"dateModified\":\"2026-04-29T10:20:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Post-Blog.png\",\"contentUrl\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Post-Blog.png\",\"width\":1890,\"height\":1060},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/dji-security-protocol-2026-data-in-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DJI Security Protocol 2026: Data in Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/\",\"name\":\"HPDRONES\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#organization\",\"name\":\"HPDRONES\",\"url\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo_drone.png\",\"contentUrl\":\"https:\\\/\\\/hpdrones.pro\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo_drone.png\",\"width\":500,\"height\":46,\"caption\":\"HPDRONES\"},\"image\":{\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hpdrones.pro\\\/en\\\/#\\\/schema\\\/person\\\/e55d2c41939c756962c79ce94ac28ce4\",\"name\":\"HP Drones\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES","og_description":"Critical infrastructure has always faced a dilemma: how to capture valuable data without compromising national security? DJI is here to resolve this paradox, redefining data security in critical environments through a security protocol based on the philosophy: \u201cData Under Control. Infrastructure Protected.\u201d The Era of Data Security DJI not only recognizes the importance of data [&hellip;]","og_site_name":"HPDRONES","article_published_time":"2026-04-29T10:10:48+00:00","article_modified_time":"2026-04-29T10:20:27+00:00","og_image":[{"width":1890,"height":1060,"url":"https:\/\/hp-drones.com\/wp-content\/uploads\/2026\/04\/Post-Blog.png","type":"image\/png"}],"author":"HP Drones","twitter_card":"summary_large_image","twitter_misc":{"Written by":"HP Drones","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/"},"author":{"name":"HP Drones","@id":"https:\/\/hpdrones.pro\/en\/#\/schema\/person\/e55d2c41939c756962c79ce94ac28ce4"},"headline":"DJI Security Protocol 2026: Data in Critical Infrastructure","datePublished":"2026-04-29T10:10:48+00:00","dateModified":"2026-04-29T10:20:27+00:00","mainEntityOfPage":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/"},"wordCount":865,"publisher":{"@id":"https:\/\/hpdrones.pro\/en\/#organization"},"image":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2026\/04\/Post-Blog.png","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/","url":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/","name":"DJI Security Protocol 2026: Data in Critical Infrastructure - HPDRONES","isPartOf":{"@id":"https:\/\/hpdrones.pro\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2026\/04\/Post-Blog.png","datePublished":"2026-04-29T10:10:48+00:00","dateModified":"2026-04-29T10:20:27+00:00","breadcrumb":{"@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#primaryimage","url":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2026\/04\/Post-Blog.png","contentUrl":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2026\/04\/Post-Blog.png","width":1890,"height":1060},{"@type":"BreadcrumbList","@id":"https:\/\/hpdrones.pro\/en\/dji-security-protocol-2026-data-in-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/hpdrones.pro\/en\/"},{"@type":"ListItem","position":2,"name":"DJI Security Protocol 2026: Data in Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/hpdrones.pro\/en\/#website","url":"https:\/\/hpdrones.pro\/en\/","name":"HPDRONES","description":"","publisher":{"@id":"https:\/\/hpdrones.pro\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hpdrones.pro\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hpdrones.pro\/en\/#organization","name":"HPDRONES","url":"https:\/\/hpdrones.pro\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hpdrones.pro\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2022\/01\/logo_drone.png","contentUrl":"https:\/\/hpdrones.pro\/wp-content\/uploads\/2022\/01\/logo_drone.png","width":500,"height":46,"caption":"HPDRONES"},"image":{"@id":"https:\/\/hpdrones.pro\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hpdrones.pro\/en\/#\/schema\/person\/e55d2c41939c756962c79ce94ac28ce4","name":"HP Drones"}]}},"_links":{"self":[{"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/posts\/25574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/comments?post=25574"}],"version-history":[{"count":1,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/posts\/25574\/revisions"}],"predecessor-version":[{"id":25575,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/posts\/25574\/revisions\/25575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/media\/25569"}],"wp:attachment":[{"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/media?parent=25574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/categories?post=25574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hpdrones.pro\/en\/wp-json\/wp\/v2\/tags?post=25574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}