{"id":4688,"date":"2014-03-02T11:41:33","date_gmt":"2014-03-02T19:41:33","guid":{"rendered":"http:\/\/www.podfeet.com\/blog\/?p=4688"},"modified":"2024-12-15T19:05:14","modified_gmt":"2024-12-16T03:05:14","slug":"460-goto-fail-sony-nex6-worms-3-switch-to-manual","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2014\/03\/460-goto-fail-sony-nex6-worms-3-switch-to-manual\/","title":{"rendered":"#460 Goto Fail, Sony NEX6, Worms 3, Switch to Manual"},"content":{"rendered":"<p>This show is guest-hosted by <a href=\"http:\/\/www.bartb.ie\">Bart Busschots<\/a> of the <a href=\"http:\/\/www.lets-talk.ie\/apple\">Let&#8217;s Talk Apple<\/a> and <a href=\"http:\/\/www.lets-talk.ie\/photography\">Let&#8217;s Talk Photography<\/a> podcasts. Bart gives us the low-down on the Goto Fail bug, <a href=\"https:\/\/twitter.com\/wizardgold\">Dave Allen<\/a> reviews the <a href=\"http:\/\/www.dpreview.com\/reviews\/sony-alpha-nex-6\">Sony NEX6 Camera<\/a>, Bart reviews Worms 3 for <a href=\"https:\/\/itunes.apple.com\/ie\/app\/worms3\/id596677177?mt=8\">iOS<\/a> &#038; <a href=\"https:\/\/itunes.apple.com\/ie\/app\/worms-3\/id725534367?mt=12\">OS X<\/a>, and <a href=\"http:\/\/amrosario.com\">Antonio Rosario<\/a> joins Bart for Chit Chat Across the Pond to talk about <a href=\"http:\/\/switchtomanual.com\">Switch to Manual<\/a>.<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-4688-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/traffic.libsyn.com\/nosillacast\/NC_2014_03_02.mp3?_=1\" \/><a href=\"http:\/\/traffic.libsyn.com\/nosillacast\/NC_2014_03_02.mp3\">http:\/\/traffic.libsyn.com\/nosillacast\/NC_2014_03_02.mp3<\/a><\/audio><br \/>\n <a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=81677867\"><img loading=\"lazy\" decoding=\"async\" style=\"float: none;\" alt=\"itunes\" src=\"https:\/\/podfeet.com\/NosillaCast\/artwork\/itunes_subscribe_button.png\" width=\"125\" height=\"43\" \/><\/a><br \/>\n<a title=\"mp3 download\" href=\"http:\/\/traffic.libsyn.com\/nosillacast\/NC_2014_03_02.mp3\" target=\"_blank\">mp3 download<\/a><br \/>\n<!--more--><\/p>\n<h3>Macworld Nosillacastaways Party Plug:<\/h3>\n<p>Allison asked me to remind you that if you\u2019re going to go to Macworld, she hopes you\u2019ll come to the NosillaCastaways party at Jillians on Friday night 28 March from 6-8pm.  Be sure to sign up for the party so the scary bouncers will let you in.  Go to podfeet.com and click on NosillaCastaways Party 2014 in the tab in the menu bar, or click on <a href=\"https:\/\/www.podfeet.com\/blog\/nosillacastaways-party-2014\/\">this link<\/a>.<\/p>\n<p>The double secret password to get in is <code>ClarifyRules!<\/code><\/p>\n<p>For everyone who can\u2019t attend, Kevin and Steve are valiantly working out how to have a Google Hangout on Air so that people from far away can talk to people at the party.  Our first test wasn\u2019t a raging success but they\u2019ll get there!<\/p>\n<h3>Goto Fail<\/h3>\n<p>Before we get stuck into Security Lite proper, I want to talk about the most significant Apple security bug in quite some time, and probably the most apt-looking line of code on the planet:<\/p>\n<p><code>goto fail;<\/code><\/p>\n<p>Seriously, the above is an actual line of C code from Apple&#8217;s SSL library, and, it&#8217;s the one that triggered the bug! Well, that identical line shows up many times in the source code without being a bug, but it got duplicated, and, the second copy is what unleashed the problems.<\/p>\n<h4>Summary:<\/h4>\n<p>A bug was found in Apple&#8217;s SSL Library<\/p>\n<p>The bug affected:<\/p>\n<ul>\n<li>OS X 10.9 Mavericks<\/li>\n<li>iOS 6 &#038; 7<\/li>\n<li>Apple TV<\/li>\n<\/ul>\n<p>The above have all now been patched &#8211; so update ASAP<\/p>\n<h4>What happened:<\/h4>\n<p>Something I always tried to hammer home to my students when I used to teach programming at a university was to always code defensively &#8211; now (a little too late since I haven&#8217;t taught programming in a decade) Apple have provided the absolute perfect example.<\/p>\n<p>Two facts are at the nub of this problem:<\/p>\n<ol>\n<li>In C, indentation is used only to make code readable by humans, it has no meaning at all to the computer, and no effect on how the code is interpreted<\/li>\n<li>if statements that only control execution of one line of code can be written without that one line of code being contained within braces. if statements that contain more than one line of code must be braced.<\/li>\n<\/ol>\n<p>When programming defensively, you ALWAYS brace your if statements, regardless of how many lines of code they control. You do this because in the future, another programmer may come along and add a second line of code inside your if statement. They will definitely indent the code so it LOOKS like part of your if statement, but, they can very easily fail to notice that the statement is un-braced, and inadvertently create a nasty bug.<\/p>\n<p>What happens in these situations is that the programmer things the line of code they added is only going to execute when the condition in the if statement evaluates to true, but, in actual fact, since and un-braced if only acts on a single line of code, their second line is ALWAYS executed.<\/p>\n<p>This is what happened to Apple. The section of code that controls the validation of SSL Certificates consists of a series of checks, and the result of each check is evaluated by an un-braced if statement, if the check failed, the one line &#8220;goto fail;&#8221; is executed. Somehow, presumably by good old fashioned human error, one copy of the line &#8220;goto fail;&#8221; was duplicated in one of the if statements in the middle of the series of validation checks. Because Apple were using unbraced ifs, that meant that the checks after the accidentally duplicated line became unreachable because the second &#8220;goto fail&#8221; line would ALWAYS fail.<\/p>\n<p>You might imagine that if you ALWAYS go to fail, the bug would result in no SSL cert being valid, but, alas, no, the bug actually had the opposite effect, because, the fail code at the end of the goto checked the error code that had triggered the failure, and, since there had been no real failure, there was no error code, so, the code did nothing, and the end result was that a number of vital certificate checks always returned true.<\/p>\n<p>More: <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/02\/24\/anatomy-of-a-goto-fail-apples-ssl-bug-explained-plus-an-unofficial-patch\/\">http:\/\/nakedsecurity.sophos.com\/2014\/02\/24\/anatomy-of-a-goto-fail-apples-ssl-bug-explained-plus-an-unofficial-patch\/<\/a><\/p>\n<h4>What it means:<\/h4>\n<p>The effect of the bug was that Apple&#8217;s SSL library would accept some invalid certificates as valid, hence enabling Man-in-the-Middle (or MITM) attacks against OS X, iOS &#038; Apple TV. In effect, if an attacker could see your internet traffic, they could intercept it without you knowing, and see everything you thought you were encrypting with Apple&#8217;s SSL, including Safari web traffic, Mail.app email traffic, App Store purchases, and iCloud traffic.<\/p>\n<p>It&#8217;s very hard for an attacker to get in the middle between you and the internet at home, but, it&#8217;s very easy for an attacker to do that on public wifi. So, if you have used Safari, Mail.app, the App Store, or iCloud on public wifi once in the last few years there is a non-zero chance that your passwords were intercepted, along with all the other content of your communications.<\/p>\n<h4>What you need to do:<\/h4>\n<p>You definitely need to update all your Apple devices NOW.<\/p>\n<p>Friend of the show and IT security pro George Starcher is recommending people change their Apple ID passwords and I&#8217;d add to that that it might be wise to change the passwords on any email accounts you check with Mail.app.<\/p>\n<p>A small mitigation against some of this is that FireFox and Chrome use their own SSL libraries, so surfing on those was safe.<\/p>\n<h4>Some Concerns:<\/h4>\n<p>This is a colossally embarrassing bug for Apple. It leads to two disturbing possible conclusions:<\/p>\n<ol>\n<li>Apple&#8217;s quality control sucks &#8211; there are automated code analysis tools that detect bugs like this, and Apple should be using them. All code should be code reviewed, and that goes double for such security critical code, so why was this glaringly obvious bug not spotted for so long? Large software projects are run through automated test suites &#8211; surely one of those tests should have been &#8220;do invalid certs fail to validate&#8221;?<\/li>\n<li>This was not an accident &#8211; it was intentional but plausibly deniable &#8211; this bug was introduced a few weeks before the date that the Snowdon leaks show Apple being added to PRISM program &#8211; did the CIA make Apple put the bug there, or did they just find it really quickly? http:\/\/daringfireball.net\/2014\/02\/apple_prism<\/li>\n<\/ol>\n<h3>Security Lite:<\/h3>\n<h4>Important Security Updates:<\/h4>\n<p>The only updates of note are all from Apple &#8211; and there are many, and the patch more than just the SSL bug!<\/p>\n<ul>\n<li>SSL patch for iOS 6 &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6146\">http:\/\/support.apple.com\/kb\/HT6146<\/a><\/li>\n<li>SSL patch for iOS 7 &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6147\">http:\/\/support.apple.com\/kb\/HT6147<\/a><\/li>\n<li>SSL patch for Apple TV &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6148\">http:\/\/support.apple.com\/kb\/HT6148<\/a><\/li>\n<li>OS X Mavericks 10.9.2 &#038; Security Updates 2014-001 for OS X 10.7 Lion &#038; 10.8 Mountain Lion &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6150\">http:\/\/support.apple.com\/kb\/HT6150<\/a> (Fixes SSL bug and more)<\/li>\n<li>Safari 6.1.2 &#038; 7.0.2 &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6145\">http:\/\/support.apple.com\/kb\/HT6145<\/a><\/li>\n<li>QuickTime 7.7.5 for Windows &#8211; <a href=\"http:\/\/support.apple.com\/kb\/HT6151\">http:\/\/support.apple.com\/kb\/HT6151<\/a><\/li>\n<\/ul>\n<h4>Important Security News:<\/h4>\n<ul>\n<li>Kickstarter breached &#8211; no credit card numbers accessed, but usernames, email addresses, phone numbers, and hashed passwords were taken (this leaves users vulnerable to spear-phising attacks, but the hashes strong, so all but the weakest passwords should be safe) &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/02\/16\/kickstarter-breached-change-your-passwords\/\">http:\/\/nakedsecurity.sophos.com\/2014\/02\/16\/kickstarter-breached-change-your-passwords\/<\/a><\/li>\n<li>A flaw has been discovered in iOS7 that allows apps running in the background to monitor touch events and key presses &#8211; this theoretically enables key logging &#8211; the bug exists in non-jailbroken iPhones, but the risk is low because Apple know about the bug, and should be able to detect any apps that do it and boot them from the App Store (assuming such apps even got in, where there is no evidence any did) &#8211; <a href=\"http:\/\/arstechnica.com\/security\/2014\/02\/new-ios-flaw-makes-devices-susceptible-to-covert-keylogging-researchers-say\/\">http:\/\/arstechnica.com\/security\/2014\/02\/new-ios-flaw-makes-devices-susceptible-to-covert-keylogging-researchers-say\/<\/a><\/li>\n<li>The OS X Bitcoin stealing trojan Bitcoin Thief now spreading through pirated versions of Angry Birds &#8211; reminder, don&#8217;t pirate software, it&#8217;s immoral AND bloody dangerous! &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/bitcoin-stealing-mac-malware-spreads-to-pirated-versions-of-angry-birds\">http:\/\/www.macobserver.com\/tmo\/article\/bitcoin-stealing-mac-malware-spreads-to-pirated-versions-of-angry-birds<\/a><\/li>\n<li>Google takes the creapy up a notch with Streak &#8211; a free browser plugin that lets you see who opened your emails where and when &#8211; Google have added tracking images into emails sent from Gmail to enable this &#8211; i.e. Google have stooped to the level of spammers (&#8216;do no evil&#8217; &#8211; how ironic that&#8217;s become) &#8211; your only protection is to disable the rendering of remote images in your mail client &#8211; this is a good idea anyway, because this same technique is used by spammers to track people and verify that email addresses are real and emails are being opened &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/02\/27\/how-emails-can-be-used-to-track-your-location-and-how-to-stop-it\/\">http:\/\/nakedsecurity.sophos.com\/2014\/02\/27\/how-emails-can-be-used-to-track-your-location-and-how-to-stop-it\/<\/a><\/li>\n<\/ul>\n<h4>Suggested Reading:<\/h4>\n<ul>\n<li>The recent spate of credit card breaches is being made worse for customers because credit card printing companies are struggling to keep up with the demand for replacement cards &#8211; <a href=\"http:\/\/krebsonsecurity.com\/2014\/02\/card-backlog-extends-pain-from-target-breach\/\">http:\/\/krebsonsecurity.com\/2014\/02\/card-backlog-extends-pain-from-target-breach\/<\/a><\/li>\n<li>GCHQ &#038; NSA &#8211; collaborate to save webcam images from Yahoo users &#8211; this was not targeted at suspects, and 1.8 million users were spied on during a 6 month period in 2008 &#8211; I&#8217;d say the government spying on people through their webcams counts as truly Orwellian! &#8211; <a href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo\">http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo<\/a><\/li>\n<li>US house of representatives passes a watered down cellphone unlocking bill &#8211; <a href=\"http:\/\/www.macobserver.com\/tmo\/article\/house-passes-cellphone-unlocking-bill-packed-with-disappointment\">http:\/\/www.macobserver.com\/tmo\/article\/house-passes-cellphone-unlocking-bill-packed-with-disappointment<\/a><\/li>\n<li>MasterCard are piloting a cellphone geolocation solution to protect credit cards &#8211; your card could only be used from within the area covered by the cell tower your phone is currently connected to &#8211; <a href=\"http:\/\/nakedsecurity.sophos.com\/2014\/02\/26\/mastercard-aims-to-reduce-card-fraud-with-smartphone-geo-location-technology\/\">http:\/\/nakedsecurity.sophos.com\/2014\/02\/26\/mastercard-aims-to-reduce-card-fraud-with-smartphone-geo-location-technology\/<\/a><\/li>\n<li>If you live in the US, and you care about the internet, you should probably read this article from the verge &#8211; the title uses a word Americans find naughty (but with which Irish people have no problem), but the article itself is not profane, and is very insightful &#8211; <a href=\"http:\/\/www.theverge.com\/2014\/2\/25\/5431382\/the-internet-is-fucked\">http:\/\/www.theverge.com\/2014\/2\/25\/5431382\/the-internet-is-fucked<\/a><\/li>\n<li>Finally &#8211; lets end on some good news &#8211; we talked a few weeks ago about how hackers had used social engineering to deprive Naoki Hiroshima of his valuable @N Twitter handle &#8211; well, Twitter have finally restored the account to it&#8217;s rightful owner (say the delay was because they were helping law enforcement investigate the matter) &#8211; <a href=\"http:\/\/thenextweb.com\/twitter\/2014\/02\/26\/happy-ending-n-restored-rightful-owner\/\">http:\/\/thenextweb.com\/twitter\/2014\/02\/26\/happy-ending-n-restored-rightful-owner\/<\/a><\/li>\n<\/ul>\n<h3>Dave Allen Review&#8217;s Sony NEX 6 Camera &#8230;<\/h3>\n<h3>Worms 3 for iOS &#038; OS X<\/h3>\n<p>Problem to be solved?<\/p>\n<p>None really &#8211; this one is purely for fun \ud83d\ude42<\/p>\n<ul>\n<li>Worms itself is a game with a very long history &#8211; the first release was in 1995 &#8211; for the whole history see wikipedia: http:\/\/en.wikipedia.org\/wiki\/Worms_(series)<\/li>\n<li>I admit to having a real soft spot for it because many hours of my teenage life were spent in front of the original play station with between 1 and 3 friends playing worms into the small hours of the night<\/li>\n<li>This is the third version of the game to come to iOS, and it&#8217;s the first to unite the iOS and OS X versions &#8211; more on that later<\/li>\n<li>You could probably best sum up worms as a turn-based platform strategy game &#8211; neither strategy nor dexterity are enough to win on their own, you really do need both.<\/li>\n<li>The basic premise is that was has broken out between rival gangs of worms (4 worms per team), and armed with an implausible and often humorous array of weapons, each team takes it in turns to attack the other. There is a time-limit on the length of your turn, and you get fire one weapon per turn.\n<ul>\n<li>You have the basic weapons you&#8217;d expect, hand grenades, a bazooka, dynamite, and an array of guns<\/li>\n<li>As an homage to the old Gorillas game that shipped with DOS one of the most powerful weapons is the banana bomb<\/li>\n<li>Similarly, the Holy Hand Grande is an homage to Monty Python, and also very destructive<\/li>\n<li>There are also utterly bizarre weapons like the exploding sheep, and it&#8217;s more modern cousin, the flying super-sheep<\/li>\n<li>Some weapons are environmental, you can trigger and earthquake or an astroid strike for example<\/li>\n<\/ul>\n<\/li>\n<li>As well as weapons there are also utilities, like parachutes to allow you to safely descend from big heights, a ninja rope to swing Tarzan-like across the landscape, and a jetpack for ultimate mobility.<\/li>\n<li>There are different weapons modes for games so sometimes you only have a subset of weapons available, you&#8217;ll have an infinite supply of some weapons, and a finite supply of others, and some weapons only become active after a certain number of rounds of turns have passed (normally the most destructive weapons) &#8211; generally speaking the longer the game goes on the more damage you can unleash per turn.<\/li>\n<li>Both weapons and utilities can be picked up in crates that are randomly dropped on the landscape, and heath packs can be picked up too<\/li>\n<li>The landscape is also littered with dangers &#8211; land mines and barrels of explosive liquid are randomly dotted across the landscape, and any crate that has not been collected is highly explosive &#8211; this leads to the ironic situation that a health crate that drops next to one of your worms when it&#8217;s not their turn is as much of a liability as an opportunity &#8211; if some one shoots at it it will blow up and injure you rather than making you healthier!<\/li>\n<li>Some things also explode into patches of fire that can flow down the landscape and injure worms.<\/li>\n<li>Just like there are time-limits per turn, there are also over-all limits, and when a given threshold is passed (determined by the weapons mode), sudden death mode is triggered &#8211; in sudden death mode the water begins to rise and drown the worms lower down in the landscape, and all worms go down to 1 health point.<\/li>\n<li>So far I&#8217;m describing Worms as we have known it for many years, but Worms 3 brings some new and very exciting new elements to the game<\/li>\n<li>Firstly, a LOT of work has gone into online gaming. You can set up a Worms account which will sync the team you design between all your devices, and now your online games also sync between devices, so you can start a game against a stranger on the other side of the world on your iPad, take your next turn on your iPhone, and your next one on your Mac!<\/li>\n<li>Speaking of online games &#8211; you can challenge people you know to friendlies, or, you can play a ranked game against a randomly chosen opponent &#8211; more on this later<\/li>\n<li>Strategically, the first of two big changes in Worms 3 is the introduction of different classes of worm. In the past as worm was a worm was a worm, but now you can have scouts, soldieries, scientists, and heavies &#8211; each have their own strengths and weaknesses, so you need to assemble your team to best suit your preferred strategy.<\/li>\n<li>The second big strategic change is the introduction of cards\n<ul>\n<li>Cards can be used to alter the game physics in some way &#8211; adding a whole new layer of strategy to the game.<\/li>\n<li>Cards come in three levels, bronze, silver and gold. Bronze cards are cheap, gold cards are expensive, and silver cards are somewhere in-between.<\/li>\n<li>Example cards: your worms are immune from fall damage, enemy worms take extra fire damage, your worms get double the jetpack fuel for one turn, your opponent is prohibited from using any utilities in their next turn. Your worms are invisible to the enemy for on round, you trigger a solar flare and all the mines, crates, and barrels in the landscape explode, you trigger an earthquake, you trigger a flood, you prevent your opponent from playing any cards in their next turn and so on and so forth.<\/li>\n<li>Many of these cards can be intelligently combined &#8211; e.g. a very expensive but very effective combo is to get your worms high in the landscape in an enclosed space, then play the earthquake card to shake your enemy worms down to lower parts of the landscape, then trigger a flood to hopefully drown them all while your worms remain safe high up in the landscape. This combo is deadly, but, it&#8217;s very costly, costing two gold cards. Also, it can be easily combatted by ensuring you always keep at least one worm high up and and enclosed. Another nice combo is to play the card that doubles the fire damage for your opponent, with the card that reduces it for your worms, with the card that triggers a solar flare causing lots of explosions and hence lots of fire.<\/li>\n<li>There are limits on how many cards you can play &#8211; you only get to bring 10 cards into any one game, and you can only play 3 cards during any one turn. Turns are split into three phases &#8211; play cards, take your turn, play cards. Some cards can only be played before, some only after, and some can be played before or after.<\/li>\n<li>So what does it mean for cards to be &#8216;expensive&#8217;? We&#8217;re NOT talking real money. There is no way to use your wallet as a shortcut here, you have to earn your in-game coins in-game, and you then use these coins to buy cards.<\/li>\n<li>You can can earn in-game coins in a number of ways &#8211; you can complete the single-player missions for gold, you can play online ranked games for gold (if you win you get 100 coins, if you lose 30, so you are rewarded for completing games), and finally you get a loyalty bonus each consecutive day that you launch the game (bit of a bug in this, you have to actually exit and re-launch once a day to get the bonuses). The loyalty bonuses build up, so if you log in 7 days in a row you get a big bonus indeed. You then use the coins you earn to buy cards.<\/li>\n<\/ul>\n<\/li>\n<li>Since Worms is an inherently turn-based game it&#8217;s very well suited to online play &#8211; you can have many games going at once, and you get a push notification when it&#8217;s your turn. There is a limit to how long you can leave a game in limbo by not taking your turn, but it&#8217;s two or three days, not a matter of hours or minutes. If you fail to take your go for a few days you will forfit the game &#8211; your opponent gets 100coins, and you get none at all.<\/li>\n<li>I have about 6 games on the go all the time, and I&#8217;m really enjoying the game &#8211; you see so many different strategies, and there is always a new approach to try!<\/li>\n<\/ul>\n<p>Both versions of the app cost $4.99:<\/p>\n<ul>\n<li>iOS (universal) &#8211; <a href=\"https:\/\/itunes.apple.com\/ie\/app\/worms3\/id596677177?mt=8\">https:\/\/itunes.apple.com\/ie\/app\/worms3\/id596677177?mt=8<\/a><\/li>\n<li>OS X &#8211; <a href=\"https:\/\/itunes.apple.com\/ie\/app\/worms-3\/id725534367?mt=12\">https:\/\/itunes.apple.com\/ie\/app\/worms-3\/id725534367?mt=12<\/a><\/li>\n<\/ul>\n<h3>CCATP with Antonio Rosario &#8230;<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>This show is guest-hosted by Bart Busschots of the Let&#8217;s Talk Apple and Let&#8217;s Talk Photography podcasts. Bart gives us the low-down on the Goto Fail bug, Dave Allen reviews the Sony NEX6 Camera, Bart reviews Worms 3 for iOS &#038; OS X, and Antonio Rosario joins Bart for Chit Chat Across the Pond to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,173,1],"tags":[],"class_list":["post-4688","post","type-post","status-publish","format-standard","hentry","category-blog-posts","category-nosillacast","category-podcasts"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/4688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=4688"}],"version-history":[{"count":4,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/4688\/revisions"}],"predecessor-version":[{"id":4707,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/4688\/revisions\/4707"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=4688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=4688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=4688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}