{"id":17440,"date":"2019-01-25T18:38:18","date_gmt":"2019-01-26T02:38:18","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=17440"},"modified":"2019-01-28T16:48:48","modified_gmt":"2019-01-29T00:48:48","slug":"sb-201901-25","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2019\/01\/sb-201901-25\/","title":{"rendered":"Security Bits \u2013 25 January 2019"},"content":{"rendered":"<h3>Followups<\/h3>\n<ul>\n<li>Australia&#8217;s controversial anti-encryption law has come into effect \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/its-official-australia-bans-encryption\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/qvqgnd\/sprint-stop-selling-location-data-tmobile-att-microbilt-zumigo\">Sprint to Stop Selling Location Data to Third Parties After Motherboard Investigation \u2014 motherboard.vice.com\/\u2026<\/a><br \/>\n<!--more--><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Apple release many security patches \u2014 <a href=\"https:\/\/tidbits.com\/2019\/01\/22\/apple-releases-ios-12-1-3-macos-10-14-3-watchos-5-1-3-and-tvos-12-1-2-with-bug-fixes\/\">tidbits.com\/\u2026<\/a>\n<ul>\n<li>iOS 12.1.3<\/li>\n<li>macOS Mojave 10.14.3<\/li>\n<li>watchOS 5.1.3<\/li>\n<li>tvOS 12.1.2<\/li>\n<li>Security Update 2019-001 for macOS Sierra &amp; HighSierra \u2014 <a href=\"https:\/\/tidbits.com\/watchlist\/security-update-2018-001-high-sierra-and-sierra\/\">tidbits.com\/\u2026<\/a><\/li>\n<li>Safari 12.0.3 for macOS Sierra &amp; High Sierra \u2014 <a href=\"https:\/\/tidbits.com\/watchlist\/safari-12-0-3\/\">tidbits.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Drupal have fixed critical bugs in the 7.x, 8.5.x, and 8.6.x branches of their CMS \u2014 <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/01\/16\/Drupal-Releases-Security-Updates\">www.us-cert.gov\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>&#x1f1fa;&#x1f1f8; The CISA (the <em>Cybersecurity and Infrastructure Security Agency<\/em> under the DHS) issued their first <em>Emergency Directive<\/em>, ordering all government agencies to take immediate action to protect their DNS records:\n<ul>\n<li><a href=\"https:\/\/cyber.dhs.gov\/ed\/19-01\/\">Emergency Directive 19-01 \u2014 cyber.dhs.gov\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/cyber.dhs.gov\/blog\/#why-cisa-issued-our-first-emergency-directive\">CISA blog: Why CISA issued our first Emergency Directive \u2014 cyber.dhs.gov\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x1f1fa;&#x1f1f8; The government shutdown has resulted in security certificates not getting renewed before they expire on a number of government websites. On sites that enable HSTS (HTTP Strict Transport Security), which should be most of them, this results in security errors users cannot get past \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/14\/shutdown-hits-government-websites-as-certificates-begin-to-expire\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; The Supreme Court has rejected taking up the Yelp case, allowing the lower-court&#8217;s ruling that the company is not liable for defamatory comments published on the service to stand. Had this case gone ahead it could have threatened the safe harbour that makes it viable for review services like Yelp to continue to exist \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/24\/supreme-court-wont-consider-case-against-defamatory-reviews-on-yelp\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; A federal judge has ruled against a warrant that requested the right to seize all phones found at a property, regardless of who owned them, and force their owners to unlock them using biometrics. The judge described the request as over-broad and violating the 4th and 5th amendments to the US constitution \u2014 <a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/01\/feds-forcing-mass-fingerprint-unlocks-is-an-abuse-of-power-judge-rules\/\">arstechnica.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/16\/police-cant-compel-biometric-phone-unlocking-rules-judge\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ea;&#x1f1fa; &#x1f1eb;&#x1f1f7; The French Data protection commissioners have fined Google \u20ac50M (~$57M) for GDPR breaches. The fine was for not giving sufficiently clear disclosure of how user data is collected and used. This is the biggest fine yet issues under the GDPR \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/google-fined-gdpr\/\">www.macobserver.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/23\/france-fines-google-57m-under-gdpr\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1eb;&#x1f1f7; Florence Parly, France&#8217;s Secretary of Defence, used a presentation to the <em>Forum International de Cybersecurite<\/em> to announce that cyber weapons are now part of France&#8217;s arsenal and ready to be used in war. She also announced that France will be starting a military bug bounty program \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/french-defence-secretary-cyber-war-has-begun\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li>Security researchers have uncovered a novel malware campaign that used a new technique to sneak malicious JavaScript into ads served over 5 million times on 25 of the top 100 sites on the net. The ad used steganography to sneak JavaScript past the ad network&#8217;s malware detectors. This JavaScript then popped up a fake message that Flash needed to be updated, and offered the user a malicious download which they could then use to infect themselves with malware. The campaign ran for two days from the 11th to the 13th of January \u2014 <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/01\/malvertisers-target-mac-uses-with-stenographic-code-stashed-in-images\/\">arstechnica.com\/\u2026<\/a><\/li>\n<li>Samsung comes under fire as users discover the FaceBook app can&#8217;t be deleted on the new Galaxy S8 smartphone \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/you-cant-delete-facebook-and-instagram-from-a-galaxy-s8\/\">www.macobserver.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-01-08\/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">www.bloomberg.com\/\u2026<\/a><\/li>\n<li>The NYT reports that Facebook is working on integrating Instagram, WhatsApp and Facebook Messenger. The three apps will continue to exist as separate apps on the front end, but will have a unified backend. The silver lining is that all three services will get end-to-end encryption \u2014 <a href=\"https:\/\/www.nytimes.com\/2019\/01\/25\/technology\/facebook-instagram-whatsapp-messenger.html\">www.nytimes.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; Tim Cook wrote a guest editorial in Time magazine calling on the US government to pass laws enshrining 4 data privacy rights (minimisation, knowledge, access &amp; security), and to regulate data brokers:\n<ul>\n<li>Tim&#8217;s Editorial \u2014 <a href=\"http:\/\/time.com\/collection-post\/5502591\/tim-cook-data-privacy\/\">time.com\/\u2026<\/a><\/li>\n<li>Analysis from Naked Security \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/21\/tim-cook-demands-a-way-for-users-to-delete-their-personal-data\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/acxiom-tim-cook-data-privacy\/\">Data Broker Acxiom Backs Tim Cook\u2019s Call for Privacy Law \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/duckduckgo-uses-apple-maps\/\">DuckDuckGo to Use Apple Maps for Private Search \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>Trend Micro &amp; Tesla join forces to add a new automotive category to the famous Pwn2Own hacking competition \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/trend-mirco-and-tesla-partner-for-automative-security-competition\/\">Trend Micro and Tesla Partner for Automative Security Competition \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/18\/google-locks-down-access-to-android-phone-and-sms-records\/\">Google cracks down on access to your Android phone and SMS data \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Social media companies are actively rolling out many security, privacy, and abuse prevention features ATM:\n<ul>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/15\/facebook-to-start-fact-checking-fake-news-in-the-uk\/\">Facebook to start fact-checking fake news in the UK \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/link\/facebook-stricter-rules-countries-holding-elections\/\">Facebook to Introduce Stricter Rules in Countries Holding Elections This Year \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/25\/facebook-debuts-scam-ads-reporting-tool\/\">Facebook debuts scam ads reporting tool \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/18\/youtube-bans-dangerous-and-harmful-pranks-and-challenges\/\">YouTube bans dangerous and harmful pranks and challenges \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/whatsapp-forwarding-limit-fake-news\/\">WhatsApp Imposing Forwarding Limit to Fight Fake News \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>Because Edge on iOS and Android ships with NewsGuard installed, users are not getting a warning that they are visiting an untrustworthy site when they visit the websites for the UK tabloid <em>The Daily Mail<\/em> (<strong>Editorial by Bart:<\/strong> great to see bad journalism not get a pass just because it&#8217;s published by a large corporation) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/24\/proceed-with-caution-microsoft-browser-says-mail-online-is-untrustworthy\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Following a frightening anecdote where a family&#8217;s Nest camera was made broadcast a frightening message that a Nuclear strike was under way by unknown attackers, some media reporting implied there was some kind of Nest vulnerability that was exploited, but this does not seem to be the case, instead, it seems to be yet another example of the dangers of password re-use \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/23\/hijacked-nest-cam-broadcasts-bogus-warning-about-incoming-missiles\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Contrary to much speculation in the media, Facebook&#8217;s <em>Ten Year Challenge<\/em> is almost certainly not any kind of nefarious scam \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/21\/is-the-ten-year-challenge-a-facebook-scam\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/18\/did-you-know-you-can-see-the-ad-boxes-facebook-sorts-us-into\/\">Did you know you can see the ad boxes Facebook sorts us into? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\">How to Avoid Getting Hacked After Data Breaches \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li>(iOS) <a href=\"https:\/\/www.imore.com\/restrictions\">Parental Controls: The Ultimate Guide \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/how-to-back-up-icloud-photo-library\">How to back up your iCloud Photo Library \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/how-back-your-itunes-library\">How to back up your iTunes library \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/checksums-101-how-make-sure-your-downloads-are-real-deal\">Checksums 101: How to make sure your downloads are the real deal \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li>&#x2b50;&#xfe0f; Troy Hunt (from <em>Have I Been Pwned<\/em>) has published information on a large cache of breached passwords which he&#8217;s named <em>Collection #1<\/em>. The collection contains 773M email addresses and 21M passwords. The data is not from a new breach, but is collated from thousands of smaller breaches which occurred about 2 to 3 years ago. The collection appears to have been for sale on underground forums since last year, but has only become public knowledge now. There are also Collections 2 through 5, but those have not been analysed yet. \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2019\/01\/773m-password-megabreach-is-years-old\/\">krebsonsecurity.com\/\u2026<\/a>, <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/18\/vast-data-berg-washes-up-1-16-billion-pwned-records\/\">nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/collection-1-and-2-5-are-the-latest-massive-password-dumps\/\">www.intego.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.macobserver.com\/news\/voipo-database-exposed-sms\/\">Voipo Database Exposed SMS Messages \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; &#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/21\/agency-that-opted-out-of-central-it-service-exposes-3tb-of-data\/\">Oklahoma State agency exposes 3TB of data, including FBI info and remote logins \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/23\/100-million-online-bets-exposed-by-leaky-database\/\">100 million online bets exposed by leaky database \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/21\/twitter-bug-exposed-some-android-private-tweets-to-public-view\/\">Twitter bug exposed some Android private tweets to public view \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x2b50;&#xfe0f; A senior Amazon technical expert discovered a flaw in WhatsApp&#8217;s use of phone numbers as unique identifiers \u2013 when she logged into WhatsApp on a new phone she got someone else&#8217;s messages! \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/16\/whatsapp-messages-may-not-be-for-you-just-ask-this-software-engineer\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; Intel have released fixes for a security flaw found in their <em>Secure Guard Extensions<\/em> (SGX). This is Intel&#8217;s equivalent of Apple&#8217;s <em>Secure Enclave<\/em>. Unfortunately, end-users can&#8217;t protect themselves directly, it&#8217;s up to hardware manufacturers to create and issue patches to their users \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/16\/intel-patches-another-security-flaw-in-sgx-technology\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/16\/beware-buying-fortnites-v-bucks-you-could-be-funding-organised-crime\/\">Beware buying Fortnite\u2019s V-Bucks, you could be funding organised crime \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.macobserver.com\/news\/facebook-documents-money-children\/\">Facebook Documents to Show how it Preyed on Kids \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/22\/russia-continued-email-hacking-attempts-in-mid-term-runup-says-dnc\/\">DNC targeted by Russian hackers beyond 2018 midterms, it claims \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ef;&#x1f1f5; <a href=\"https:\/\/www.macobserver.com\/news\/japan-tech-privacy-laws\/\">Japan Wants Foreign Tech Companies to Follow its Privacy Laws \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2019\/01\/bomb-threat-sextortion-spammers-abused-weakness-at-godaddy-com\/\">Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>&#x2b50;&#xfe0f; (via Allison) <a href=\"https:\/\/medium.com\/@schoolofnyt.ta\/tech-for-good-making-digital-innovation-more-ethical-66472eee5b25\">Tech For Good: Making Digital Innovation More\u00a0Ethical \u2014 medium.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/22\/rogue-websites-can-turn-vulnerable-browser-extensions-into-back-doors\/\">Rogue websites can turn vulnerable browser extensions into back doors \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; Good analysis of what is going on with the EU&#8217;s up-coming Copyright Directive\n<ul>\n<li><a href=\"https:\/\/www.imore.com\/eu-copyright-directive-about-make-internet-worse-almost-everyone\">The EU Copyright Directive is about to make the internet worse for almost everyone \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2019\/1\/23\/18194155\/eu-copyright-laws-directive-negotiations-trilogue-deadlock\">The fight over Europe\u2019s internet just got even messier \u2014 www.theverge.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2019\/01\/how-the-u-s-govt-shutdown-harms-security\/\">How the U.S. Govt. Shutdown Harms Security \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/14\/usb-c-authentication-sounds-great-so-why-are-people-worried\/\">USB-C Authentication sounds great, so why are people worried? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/01\/20\/serious-security-what-2000-years-of-cryptography-can-teach-us\/\">Serious Security: What 2000 years of cryptography can teach us \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/bigthink.com\/surprising-science\/10-science-photos-that-made-history?rebelltitem=10#rebelltitem10\">10 science photos that made history and changed minds &#8211; Big Think \u2014 bigthink.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Followups Australia&#8217;s controversial anti-encryption law has come into effect \u2014 www.macobserver.com\/\u2026 Sprint to Stop Selling Location Data to Third Parties After Motherboard Investigation \u2014 motherboard.vice.com\/\u2026<\/p>\n","protected":false},"author":4,"featured_media":14958,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[50,569,2239,2388],"class_list":["post-17440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-security","tag-security-bits","tag-security-updates","tag-updates"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2018\/04\/Security-Bits-Logo_1000px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=17440"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17440\/revisions"}],"predecessor-version":[{"id":17473,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/17440\/revisions\/17473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/14958"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=17440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=17440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=17440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}