{"id":18957,"date":"2019-07-25T08:10:32","date_gmt":"2019-07-25T22:10:32","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=18957"},"modified":"2019-07-25T16:31:19","modified_gmt":"2019-07-25T23:31:19","slug":"sb-2019-07-25","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2019\/07\/sb-2019-07-25\/","title":{"rendered":"Security Bits \u2013 25 July 2019"},"content":{"rendered":"<h3>Followups<\/h3>\n<ul>\n<li>The Zoom webcam\/webserver issue\n<ul>\n<li>We now have confirmation that the vulnerability was also present in the RingCentral and Zhumu apps \u2014 <a href=\"https:\/\/www.imore.com\/mac-webcam-flaw-also-exploitable-ringcentral-and-zhumu-services\">www.imore.com\/\u2026<\/a><\/li>\n<li>Apple have rolled out an additional automatic security update to address the issues with these apps \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/apple-zoom-update\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li><strong>Related Opinion:<\/strong> John Gruber addresses the question <em>Isn\u2019t [Apple&#8217;s response] \u201cnonconsensual technology\u201d too?<\/em> in a short succinct post I (Bart) completely agree with \u2014 <a href=\"https:\/\/daringfireball.net\/2019\/07\/another_zoom_update\">daringfireball.net\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x1f1fa;&#x1f1f8; Facebook&#8217;s $5Bn settlement with the FTC\n<ul>\n<li><a href=\"https:\/\/thenextweb.com\/facebook\/2019\/07\/25\/ftc-sues-now-bankrupt-cambridge-analytica-over-deceptive-practices\/\">FTC sues now-bankrupt Cambridge Analytica over \u2018deceptive practices\u2019 \u2014 thenextweb.com\/\u2026<\/a><\/li>\n<li>A nice summary of where things stand: <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/25\/facebook-gets-its-wrist-slapped-5b-for-fumbling-our-data-confirms-ftc\/\">Facebook gets its wrist slapped $5b for fumbling our data, confirms FTC \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><strong>Related Opinion:<\/strong> Facebook Negotiated Its Rules \u2014 www.bloomberg.com\/\u2026](https:\/\/www.bloomberg.com\/opinion\/articles\/2019-07-23\/facebook-negotiated-its-rules)<\/li>\n<li><strong>Related Opinion:<\/strong> <a href=\"https:\/\/onezero.medium.com\/prison-time-is-the-answer-to-techs-privacy-crisis-53da1559124f\">Prison Time Is the Answer to Tech\u2019s Privacy Crisis \u2014 onezero.medium.com\/\u2026<\/a> (from Allison)<br \/>\n<!--more--><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Apple patch just about everything: macOS 10.14.6 (and Security Update 2019-004 for macOS High Sierra &amp; Sierra), iOS 12.4, watchOS 5.3, tvOS 12.4, iTunes 12.9.6 for Windows, Safari 12.1.2 &amp; iCloud for Windows 10.6 &amp; 7.13) \u2014 <a href=\"https:\/\/tidbits.com\/2019\/07\/22\/apple-releases-macos-10-14-6-ios-12-4-watchos-5-3-tvos-12-4-and-more\/\">tidbits.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/24\/apple-fixes-bug-two-months-after-publication\/\">nakedsecurity.sophos.com\/\u2026<\/a>\n<ul>\n<li>Note these updates fix the AppleWatch Walkie-Talkie bug that led to Apple temporarily suspending the service recently<\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2019\/07\/22\/apple-releases-gps-bug-fix-older-iphones-ipads\/\">Apple Releases iOS 9.3.6 and iOS 10.3.4 With GPS Bug Fix for Older iPhones and iPads \u2014 www.macrumors.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>A critical Zero-day bug has been found in the Windows and Linux versions of VLC. A fix is on the way, so you should install it promptly when it comes out \u2014 <a href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3079319\/vlc-critical-security-flaw\">www.computing.co.uk\/\u2026<\/a>\n<ul>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/vlc-player-critical-security-macs\/\">VLC Player Critical Security Does Not Affect Macs (we Think) \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>&#x1f1fa;&#x1f1f8; US Attorney General William Bar renewed the attack on encryption in a speech he delivered to a cyber security conference, insisting tech firms &#8220;can and must&#8221; put backdoors in encryption \u2014 <a href=\"https:\/\/arstechnica.com\/?p=1540289\">arstechnica.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.macobserver.com\/news\/william-barr-accept-security-risks\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f9ef; Security researchers have found weaknesses in the implementation of BlueTooth&#8217;s tracking protections. The vulnerabilities make it possible, thought not easy, to use BlueTooth to track devices as they move from place to place. The vulnerabilities do not affect pairing or encryption of connections with paired devices. This is just a weakness in tracking protections, nothing more. The researchers have advice for device and OS vendors to improve their implementations to mitigate these vulnerabilities. All end-users need to do is install security updates as they become available &#x1f642; \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/16\/bluetooth-les-anti-tracking-technology-beaten\/\">nakedsecurity.sophos.com\/\u2026<\/a>, <a href=\"https:\/\/thenextweb.com\/security\/2019\/07\/18\/this-bluetooth-security-flaw-could-let-hackers-track-your-windows-ios-and-macos-devices\/\">thenextweb.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/bluetooth-flaw-could-leave-iphones-macs-and-more-susceptible-tracking\">www.imore.com\/\u2026<\/a><\/li>\n<li>Social media is abuzz with indignation at the free app FaceApp monetising the photos people share with it:\n<ul>\n<li><strong>Editorial by Bart:<\/strong> I can&#8217;t find any scandal here. A financially free app is financing itself by data harvesting. It is not helping itself to users photos in any kind of nefarious way. This is just another example of the same business model used by Facebook, Google, Twitter \u2026<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/19\/faceapp-panic-sets-internet-alight\/\">FaceApp privacy panic sets internet alight \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/19\/07\/17\/dont-use-faceapp-if-you-want-to-keep-the-rights-to-your-photos\">Don&#8217;t use FaceApp if you want to keep the rights to your photos \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/faceapp-viral-aging-app-might-be-investigated-fbi\">Faceapp, the viral aging app, might be investigated by the FBI \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Security researchers find that many <em>&#8216;free&#8217;<\/em> VPNs have suspicious ownerships, often tied to the Chinese government, and poor or non-existent privacy policies. (<strong>Editorial by Bart:<\/strong> if you&#8217;re not paying for a service and it&#8217;s not being run by a reputable charitable foundation, be suspicious! As the old clich\u00e9 goes \u2014 <em>if it looks to good to be true, it probably is!<\/em>) \u2014 <a href=\"https:\/\/tidbits.com\/2019\/07\/15\/most-free-vpn-apps-secretly-owned-by-china\/\">tidbits.com\/\u2026<\/a> and also: <a href=\"https:\/\/www.podfeet.com\/blog\/2019\/03\/freepi\/\">podfeet.com\/blog\/2019\/03\/freepi\/<\/a><\/li>\n<li>Yet another reason to be careful about what apps you install on your mobile devices: <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/23\/spearphone-researchers-eavesdrop-on-phone-loudspeakers\/\">Your Android\u2019s accelerometer could be used to eavesdrop on your calls \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>A timely reminder that beta OSes have bugs, and you should not use them for your real work: <a href=\"https:\/\/www.macobserver.com\/link\/ios-13-beta-password-bug\/\">iOS 13 Password Bug Gives Unauthenticated Access in Settings \u2014 www.macobserver.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/ios-13-beta-bug-lets-strangers-icloud-keychain-passwords\">iOS 13 beta bug lets strangers access iCloud Keychain passwords \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/what-you-should-know-about-the-equifax-data-breach-settlement\/\">What You Should Know About the Equifax Data Breach Settlement \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.macobserver.com\/news\/robinhood-plaintext-passwords\/\">Stock Trader Robinhood Stored Passwords in Plaintext \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f1e7;&#x1f1ec; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/22\/hacked-bulgarian-database-reaches-online-forums\/\">Hacked Bulgarian database reaches online forums \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable IoT Vulnerabilities\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/18\/hacked-bluetooth-hair-straighteners-are-too-hot-to-handle\/\">Hacked Bluetooth hair straighteners are too hot to handle \u2014 nakedsecurity.sophos.com\/\u2026<\/a>\n<ul>\n<li><strong>Editorial by Bart:<\/strong> yet another example why you should avoid <em>&#8216;smart&#8217;<\/em> devices that give you no real advantage over their <em>&#8216;dumb&#8217;<\/em> equivalents. Unless you get real value from having the thing connected to your phone or the internet, don&#8217;t!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/techcrunch.com\/2019\/07\/24\/tinder-security-travel-lgbtq\/\">Tinder\u2019s new personal security feature can protect LGBTQ+ users in hostile nations \u2014 techcrunch.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/9to5mac.com\/2019\/07\/24\/lockdown-ios-firewall-open-source\/\">Lockdown launches as world\u2019s first open source firewall for iOS \u2014 9to5mac.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.zdnet.com\/article\/google-bought-my-friends-face-for-5\/\">Google bought my friend&#8217;s face for $5 \u2014 www.zdnet.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/07\/19\/microsoft-exposes-google-and-facebook-for-secretly-tracking-users-on-major-porn-sites\/\">Google And Facebook Secretly Track Your Activity On Porn Sites, Microsoft Reports \u2014 www.forbes.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-07-19\/tinder-bypasses-google-play-joining-revolt-against-app-store-fee\">Tinder Bypasses Google Play Joining Revolt Against App Store Fee \u2014 www.bloomberg.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2019\/07\/19\/israeli-security-firm-tool-harvest-icloud-data\/\">Israeli Security Firm Claims Spyware Tool Can Harvest iCloud Data in Targeted iPhone Attack \u2014 www.macrumors.com\/\u2026<\/a><\/li>\n<li>An example of a bug-bounty program working well: <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/15\/instagram-bug-could-have-allowed-anyone-to-take-over-your-account\/\">Instagram bug could have allowed anyone to take over your account \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Details released of what will be in FireFox 70 when it&#8217;s released later this year:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/18\/still-not-using-https-firefox-is-about-to-shame-you\/\">Still not using HTTPS? Firefox is about to shame you \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/19\/firefox-to-pile-on-more-native-privacy-features\/\">Firefox to pile on more native privacy features \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Details have also been released about up-coming Google Chrome releases:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/22\/chrome-76-blocks-websites-from-detecting-incognito-mode\/\">Chrome 76 blocks websites from detecting incognito mode \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/18\/google-chrome-is-ditching-its-xss-detection-tool\/\">Google Chrome is ditching its XSS detection tool \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Facebook found and addressed a flaw in their messenger app for kids that allowed them to create group chats with people not approved by their parents \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/24\/facebooks-latest-foul-up-kids-messages\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/17\/facebook-launches-anti-scam-initiative\/\">Facebook rolls out anti-scam reporting tool in UK \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/22\/hold-off-on-facial-recognition-trials-warns-uk-parliamentary-committee\/\">Stop facial recognition trials now, warns UK committee \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/15\/ransomware-attackers-us-mayors-say-you-should-go-jump-in-a-lake\/\">Ransomware attackers, US mayors say you should go jump in a lake \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1e9;&#x1f1ea; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/17\/germany-bans-schools-from-using-tech-giants-clouds\/\">Microsoft, Google and Apple clouds banned in Germany\u2019s schools \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1f7;&#x1f1fa; <a href=\"https:\/\/www.macobserver.com\/link\/russia-local-smartphone-software-law\/\">Russia Ponders Law Making Local Smartphone Software Mandatory \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>&#x1f1f7;&#x1f1fa; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/23\/fsb-hackers-drop-files-online\/\">FSB hackers drop files online \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.imore.com\/great-mac-balancing-act-catalina-security-explained\">The Great Mac Balancing Act: Catalina Security Explained \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.nytimes.com\/2019\/07\/16\/science\/5g-cellphones-wireless-cancer.html\">The 5G Health Hazard That Isn\u2019t \u2014 www.nytimes.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.newscientist.com\/article\/2210928-anonymised-data-isnt-nearly-anonymous-enough-heres-how-we-fix-it\/\">Anonymised data isn&#8217;t nearly anonymous enough \u2013 here\u2019s how we fix it \u2014 www.newscientist.com\/\u2026<\/a><\/li>\n<li>A good overview of the <em>Superhuman<\/em> privacy kerfuffle that has been making the rounds in the tech press in recent weeks (a custom Gmail front-end that embedded tracking pixels in emails to tell the sender when, where, and how often, the recipients viewed their emails) \u2014 <a href=\"https:\/\/daringfireball.net\/2019\/07\/superhuman_and_email_privacy\">daringfireball.net\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Territory\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.phoronix.com\/scan.php?page=news_item&amp;px=NVMe-Patches-LKML-Apple-Mac\">The NVMe Patches To Support Linux On Newer Apple Macs Are Under Review &#8211; Phoronix \u2014 www.phoronix.com\/\u2026<\/a><\/li>\n<li>&#x1f60e; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/15\/researchers-read-data-from-air-gapped-machine-using-leds\/\">Bust the password for an air-gapped machine \u2013 with its keyboard LEDs \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f60e; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/17\/researchers-hide-data-in-music-and-human-ears-cant-detect-it\/\">Researchers hide data in music \u2013 and human ears can\u2019t detect it \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f60e; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/19\/shapeshifting-morpheus-chip-aims-to-baffle-hackers\/\">Shapeshifting Morpheus chip aims to baffle hackers \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/eclecticlight.co\/2019\/07\/22\/mojaves-privacy-consent-works-behind-your-back\/\">Mojave\u2019s privacy consent works behind your back \u2014 eclecticlight.co\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li><strong>Editorial by Bart:<\/strong> Alan Turing is one of my personal heroes, a gay cryptographer who laid the foundations for most of modern computer science and saved the world from Nazis, what&#8217;s not to admire! That&#8217;s why this story made me very happy: <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/16\/alan-turing-chosen-for-the-uks-new-50-note-a-cracking-result\/\">Alan Turing chosen for the UK\u2019s new \u00a350 note \u2013 a cracking result! \u2014 nakedsecurity.sophos.com\/\u2026<\/a>\n<ul>\n<li>Allison interviews Jim Grime, the Enigma Project Officer at Cambridge University in a 2011 Chit Chat Across the Pond: <a href=\"https:\/\/www.podfeet.com\/blog\/2011\/09\/331eudora-powerpc-upgrade-to-intel-silent-film-director-breevy-portable-enigma-project\/\">podfeet.com<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/xkcd.com\/2176\/\">xkcd: How Hacking Works \u2014 xkcd.com\/\u2026<\/a> (via NosillaCast guest-host Allister Jenks)<br \/> <img decoding=\"async\" src=\"https:\/\/imgs.xkcd.com\/comics\/how_hacking_works.png\" alt=\"If only somebody had warned them that the world would roll them like this\" \/><\/li>\n<li><a href=\"https:\/\/theconversation.com\/would-your-mobile-phone-be-powerful-enough-to-get-you-to-the-moon-115933\">Would your mobile phone be powerful enough to get you to the\u00a0moon? \u2014 theconversation.com\/\u2026<\/a><\/li>\n<\/ul>\n<p><em><strong>Note:<\/strong> When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Followups The Zoom webcam\/webserver issue We now have confirmation that the vulnerability was also present in the RingCentral and Zhumu apps \u2014 www.imore.com\/\u2026 Apple have rolled out an additional automatic security update to address the issues with these apps \u2014 www.macobserver.com\/\u2026 Related Opinion: John Gruber addresses the question Isn\u2019t [Apple&#8217;s response] \u201cnonconsensual technology\u201d too? in [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":14958,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[102,3519,776,156,114,50,569,904],"class_list":["post-18957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-bluetooth","tag-bluetooth-vulnerability","tag-encryption","tag-facebook","tag-privacy","tag-security","tag-security-bits","tag-zoom"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2018\/04\/Security-Bits-Logo_1000px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/18957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=18957"}],"version-history":[{"count":4,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/18957\/revisions"}],"predecessor-version":[{"id":18961,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/18957\/revisions\/18961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/14958"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=18957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=18957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=18957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}