{"id":13586,"date":"2017-11-26T15:36:31","date_gmt":"2017-11-26T23:36:31","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=13586"},"modified":"2017-11-26T15:38:12","modified_gmt":"2017-11-26T23:38:12","slug":"sb-12-26-2017","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2017\/11\/sb-12-26-2017\/","title":{"rendered":"Security Bits \u2013 26 November 2017 &#8211; FaceID Isn&#8217;t Broken, USB Bugs in Linux Kernel, Vulnerability in Intel Chips"},"content":{"rendered":"<h3>Security Medium 1 \u2014 No, FaceID isn&#8217;t Broken, but it Does Have Limits<\/h3>\n<p>A snazzy demo to the press had headlines all over the press screaming about how FaceID had been broken. But as is so often the case with stories like this, the devil is very much in the detail.<\/p>\n<p>What the hackers really found was that it&#8217;s bloody difficult to trick FaceID \u2014 it takes a lot of time and effort, and even after you put all that investment in, your spoof only works in very carefully controlled circumstances.<\/p>\n<p><!--more--><\/p>\n<p>The hackers started by creating a detailed 3D scan of a person&#8217;s face, then 3D printing that scan, replacing the eyes, nose, and mouth with latex, and then setting everything up on a jig so they could get the distances and angles just right so they could fool FaceID.<\/p>\n<p>This is an even less practical attack that the fake fingers that got similar press in the early days of TouchID. These attacks are just not practical in the real world, and while they make good headlines, they don&#8217;t actually break the security of FaceID. Apple never claimed it was perfect, probably because nothing is. We use locks on our houses that are not perfect, but we know they are a heck of a lot better than nothing. We use TouchID despite knowing it&#8217;s not perfect, because we know that a strong passphrase made tolerable by TouchID is a much more secure alternative to a PIN.<\/p>\n<p>Also \u2014 note that no one is claiming to have hacked FaceID, just to have spoofed it. What&#8217;s the difference? A hack would extract data from the secure element, exfiltrating private keys and\/or biometric data. Nothing like that has even been claimed here.<\/p>\n<p>Now, while intentional spoofing is proving very difficult, Apple&#8217;s warnings that the statistical probability of a false positive is much lower between close family members is proving to be true, with specific examples making the news, including British brothers, and perhaps a little more surprisingly, a mother an son.<\/p>\n<p>If you share a house with close relatives who look like you, and, who you absolutely don&#8217;t want accessing your phone, you might want to consider giving FaceID a miss, or, at the very least, testing it on your family members to see whether or not your phone trusts them!<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.imore.com\/face-id-spoofing-fud\">Face ID hasn&#8217;t been hacked: What you need to know \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.wired.com\/story\/10-year-old-face-id-unlocks-mothers-iphone-x\/\">Watch a 10-Year-Old Beat Apple&#8217;s Face ID on His Mom&#8217;s iPhone X | WIRED \u2014 www.wired.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/analysis\/face-id-hacked\/\">Face ID Hacked, But it Isn\u2019t as Big a Deal as You Think \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/these-hackers-claim-they-tricked-face-id-simple-mask\">These spoofers claim that they tricked Face ID with a simple mask \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/hackers-say-they-broke-apples-face-id-heres-why-were-not-convinced\/\">Hackers say they broke Apple\u2019s Face ID. Here\u2019s why we\u2019re not convinced \u2014 arstechnica.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 \u2014 79 USB Bugs in the Linux Kernel<\/h3>\n<p>A Google researcher released details of another 14 bugs in the Linux kernel&#8217;s USB implementation recently, bringing his total since last December to 79.<\/p>\n<p>These bugs are getting patched, so our usual advice applies \u2014 stay patched!<\/p>\n<p>Many IoT devices use Linux, and many will never see updates, so something else to bear in mind is that these exploits all require physical access to the device \u2014 to trigger these vulnerabilities you need to plug some kind of booby-trapped device into the USB port of the device you&#8217;re attacking. That simple fact alone means these bugs can&#8217;t turn into an internet-destroying worm.<\/p>\n<p>To attack someones device remotely you&#8217;d need to trick them into plugging some random USB thingy into their devices. Sadly, its been shown time and again that that&#8217;s easy to do \u2014 just hand out free booby-trapped USB thumb drives or power banks, or, throw some thumb drives around the car park. This leads to a second take-away \u2014 don&#8217;t do that!!! Don&#8217;t plug stuff you find lying around into you computers!<\/p>\n<h4>Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/14\/google-researcher-finds-79-linux-usb-vulnerabilities\/\">Google researcher finds 79 Linux USB vulnerabilities \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 3 \u2014 More Problems with Intel Chips<\/h3>\n<p>Security researchers have promised to unveil an attack against the so-called <em>Management Engine<\/em> inside Intel&#8217;s CPUs. They say the attack they will demonstrate will give <em>god mode<\/em> control over affected computers.<\/p>\n<p>Intel have acknowledged the problem, released a tester app, and patches which will be making their way out to users as firmware updates from their hardware manufacturers. Since there are so many vendors involved, it&#8217;s impossible to give useful generic instructions or advice.<\/p>\n<p>This affects just about every CPU from Intel in the last two years, covering their Core, Xeon, Atom, Celeron, and Pentium product lines.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>Intel&#8217;s security advisory \u2014 <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000025619\/software.html\">www.intel.com\/\u2026<\/a><\/li>\n<li>US-CERT&#8217;s advisory \u2014 <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2017\/11\/21\/Intel-Firmware-Vulnerability\">www.us-cert.gov\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/23\/worries-over-intels-mangement-engine-grow-after-new-flaws-found\/\">Worries over Intel\u2019s Management Engine grow after new flaws found \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 4 \u2014 Meet Quad9<\/h3>\n<p>The Domain Name System, DNS, use used to convert human-friendly domain names into the IP addresses computers actually use to communicate with each other over the internet. This means that the first step in getting infected with all sorts of malware is a DNS query to resolve an malicious domain name to an IP address. This provides an obvious opportunity for nipping a whole bunch of attacks in the bud before they can really get going \u2014 a DNS service that&#8217;s aware of current cyber threats could simply reply to all requests for known-malicious domains with an error response (an <code>nxdomain<\/code> response for all you DNS nerds out there).<\/p>\n<p>That&#8217;s exactly what Quad9 was set up to do. They are providing a free DNS service that responds with <code>nxdomain<\/code> errors to all request for know-bad domain names. To use the services you simply have to configure your computer or your router to use <code>9.9.9.9<\/code> as your DNS server (hence the name).<\/p>\n<p>This sounds great, but before we get too excited we need to follow the money!<\/p>\n<p>Thankfully, when we do we find good news \u2014 Quad9 is a not-for-profit organisation, and their privacy policy clearly states that they do not track individual users. IP addresses are never stored. The only data collected is global counts of attempts to access each malicious domain. This data will be used to help security companies track the effectiveness of individual pieces of malware.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/new-quad9-dns-service-blocks-malicious-domains-for-everyone\/\">New \u201cQuad9\u201d DNS service blocks malicious domains for everyone \u2014 arstechnica.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/twit.tv\/shows\/security-now\/episodes\/638?autostart=false\">Security Now 638 \u2014 twit.tv\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li><em>Patch Tuesday<\/em> has been and gone with updates from Microsoft and Adobe for Windows, Office, Flash, Photoshop, Reader, and more \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/adobe-microsoft-patch-critical-cracks\/\">krebsonsecurity.com\/\u2026<\/a><\/li>\n<li>Amazon&#8217;s Echo &amp; Google Home have been patched against the so-called <em>BlueBorne<\/em> vulnerabilities \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/20\/amazon-echo-and-google-home-patched-against-blueborne-threat\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>Now is a good time to give FireFox another go \u2013 with release 57 Mozilla completely re-invented the UI, making it much faster and leaner, and, added new tracking protections (black-list based) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/12\/firefox-to-offer-tracking-protection-for-all-in-its-next-update\/\">nakedsecurity.sophos.com\/\u2026<\/a>\n<ul>\n<li>Note that FireFox 57 is also a security update \u2014 <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2017\/11\/14\/Mozilla-Releases-Security-Updates\">www.us-cert.gov\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The German government has banned smart watches aimed at kids that include the ability to eves-drop on kids \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/21\/germany-bans-sale-distribution-and-possession-of-kids-smartwatches\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>WhatsApp&#8217;s <em>Delete for Everyone<\/em> feature turns out not to actually delete the messages from people&#8217;s devices after all \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/16\/deleted-whatsapp-sent-messages-might-not-be-gone-forever\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Twitter have updated the policies behind their blue verified badges \u2013 users who incite hate are no longer eligible for such badges \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/17\/twitter-gets-tough-on-white-supremacists-with-new-policy\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Security researches find a way to jam Amazon&#8217;s smart lock system for letting delivery people into our house \u2013 Amazon have promised that a fix is on the way \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/20\/amazon-to-fix-key-home-security-vulnerability\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meet-startpage-the-worlds-most-private-search-engine\/\">Meet StartPage, the World\u2019s Most Private Search Engine \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"http:\/\/www.zdnet.com\/article\/how-criminals-make-their-money-from-your-stolen-iphone\/\">How criminals clear your stolen iPhone for resale \u2014 www.zdnet.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/fraudsters-are-using-icloud-phishing-steal-ios-devices\">Fraudsters are using iCloud phishing to steal iOS devices \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/tips\/quick-tip\/ios-11-remove-photo-metadata-anonymous-images\/\">iOS 11: How to Remove Photo Metadata for Anonymous Images \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/how-to-opt-out-of-equifax-revealing-your-salary-history\/\">How to Opt Out of Equifax Revealing Your Salary History \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/22\/uber-suffered-massive-data-breach-then-paid-hackers-to-keep-quiet\/\">Uber suffered massive data breach, then paid hackers to keep quiet \u2014 nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2017-11-21\/uber-concealed-cyberattack-that-exposed-57-million-people-s-data\">Uber Paid Hackers to Delete Stolen Data on 57 Million People &#8211; Bloomberg \u2014 www.bloomberg.com\/\u2026<\/a>\n<ul>\n<li>RELATED: <a href=\"https:\/\/www.imore.com\/how-to-delete-your-uber-account\">How to delete your Uber account \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/23\/androids-caught-secretly-reporting-location-data-regardless-of-opt-out\/\">Androids caught secretly reporting location data regardless of opt-out \u2014 nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/qz.com\/1131515\/google-collects-android-users-locations-even-when-location-services-are-disabled\/\">Google collects Android users\u2019 locations even when location services are disabled \u2014 qz.com\/\u2026<\/a><\/li>\n<li>Brian Krebs warns about privacy problems with the <em>Free Application for Federal Student Aid<\/em> (FAFSA) application process \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/namedobssnfafsa-data-gold-mine\/\">krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/16\/forever-21-informs-customers-of-a-potential-data-breach\/\">Forever 21 informs customers of a potential data breach \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/14\/google-study-reveals-how-criminals-break-into-gmail-accounts\/\">Google study reveals how criminals break into Gmail accounts \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.imore.com\/western-union-scam-victims-can-now-reclaim-their-lost-money\">Western Union scam victims can now reclaim their lost money \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>Government attacks on Encryption Continue\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/13\/fbi-should-not-be-reluctant-to-challenge-encryption-in-court\/\">FBI \u201cshould not be reluctant\u201d to challenge encryption in court \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/17\/skype-faces-fine-after-refusing-to-allow-eavesdropping\/\">Skype faces fine after refusing to allow eavesdropping \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/21\/us-senate-takes-aim-at-warrantless-surveillance\/\">US Senate takes aim at \u201cwarrantless surveillance\u201d \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Related Opinion Pieces:\n<ul>\n<li><a href=\"http:\/\/fortune.com\/2017\/11\/18\/is-the-government-waging-an-out-of-sight-fight-with-apple-on-encryption\/\">Is the Government Waging an Out-of-Sight Fight With Apple on Encryption? \u2014 fortune.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/mondaynote.com\/a-dare-to-congress-go-ahead-vote-a-golden-key-encryption-law-9bd8634ae5d\">A Dare To Congress: Go Ahead, Vote A Golden Key Encryption Law! \u2014 mondaynote.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>FCC chairman Ajit Pai unveils his proposals to end <em>net neutrality<\/em> in the US (FCC vote scheduled for December):\n<ul>\n<li><a href=\"https:\/\/www.reuters.com\/article\/us-usa-internet-exclusive\/exclusive-u-s-agency-to-vote-to-repeal-net-neutrality-rules-fcc-chief-idUSKBN1DL21A\">FCC chief plans to ditch U.S. &#8216;net neutrality&#8217; rules \u2014 www.reuters.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/columns-opinions\/the-back-page\/ajit-pai-dismantle-net-neutrality-destroy-internet\/\">Ajit Pai and the FCC Will Dismantle Net Neutrality, Damage Internet, Speech and Commerce \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/net-neutrality\">Net neutrality, consolidation, monopolies, and you \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/22\/google-and-twitter-turn-their-backs-on-russian-media-over-fake-news\/\">Google and Twitter turn their backs on Russian media over fake news \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/15\/dhs-says-it-remotely-hacked-a-boeing-757-sitting-on-a-runway\/\">DHS says it remotely hacked a Boeing 757 sitting on a runway \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li><a href=\"https:\/\/www.stevensblog.co\/blogs\/what-face-id-means-for-accessibility\">What Face ID Means for Accessibility \u2014 www.stevensblog.co\/\u2026<\/a><\/li>\n<li>Two former FaceBook execs attack FaceBook:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/14\/facebooks-ex-president-we-exploited-vulnerability-in-human-psychology\/\">Facebook\u2019s ex-president: we exploited \u201cvulnerability in human psychology\u201d \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/21\/ex-facebook-privacy-manager-dishes-the-dirt-on-your-data\/\">Ex-Facebook privacy manager dishes the dirt on your data \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>RELATED: <a href=\"https:\/\/gizmodo.com\/how-facebook-figures-out-everyone-youve-ever-met-1819822691\">How Facebook Figures Out Everyone You&#8217;ve Ever Met \u2014 gizmodo.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Google&#8217;s chief lawyer blogs about two important European cases regarding the so-called <em>right to be forgotten<\/em> \u2014 <a href=\"https:\/\/www.blog.google\/topics\/google-europe\/defending-access-lawful-information-europes-highest-court\/\">Defending access to lawful information at Europe\u2019s highest court \u2014 www.blog.google\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Teritory\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/21\/github-starts-scanning-millions-of-projects-for-insecure-components\/\">GitHub starts scanning millions of projects for insecure components \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/how-apple-used-deep-neural-networks-bring-face-detection-iphone-and-ipad\">How Apple used deep neural networks to bring face detection to iPhone and iPad \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li>The Complete History of the IBM PC (long-form article)\n<ul>\n<li>Part 1 \u2014 <a href=\"https:\/\/arstechnica.co.uk\/gadgets\/2017\/06\/ibm-pc-history-part-1\/\">arstechnica.co.uk\/\u2026<\/a><\/li>\n<li>Part 2 \u2014 <a href=\"https:\/\/arstechnica.com\/gadgets\/2017\/07\/ibm-pc-history-part-2\/\">arstechnica.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/12-ways-to-open-files-on-a-mac\/\">12 Ways to Open Files on a Mac \u2014 www.intego.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 \u2014 No, FaceID isn&#8217;t Broken, but it Does Have Limits A snazzy demo to the press had headlines all over the press screaming about how FaceID had been broken. But as is so often the case with stories like this, the devil is very much in the detail. What the hackers really [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[1872,2002,201,50,569,1626,2003],"class_list":["post-13586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-face-id","tag-intel","tag-linux","tag-security","tag-security-bits","tag-usb","tag-vulnerabilities"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=13586"}],"version-history":[{"count":2,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13586\/revisions"}],"predecessor-version":[{"id":13588,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13586\/revisions\/13588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/13191"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=13586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=13586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=13586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}