{"id":15477,"date":"2013-06-28T12:40:02","date_gmt":"2013-06-28T19:40:02","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=15477"},"modified":"2015-03-26T16:17:36","modified_gmt":"2015-03-26T23:17:36","slug":"sabotaging-your-security-efforts","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/","title":{"rendered":"Are You Sabotaging Your Own Security Efforts?"},"content":{"rendered":"<p>You\u2019re conscientious about security, right? You\u2019ve got <a title=\"Mac Antivirus\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">anti-virus software<\/a> and a firewall; you\u2019re using encryption and strong, unique passwords with two-factor authentication set up on your accounts. High-five! Gold star! You get a cookie for good data-protection! But wait, there\u2019s more to this equation than there may appear. Could you have followed the spirit of the security advice and still be shooting yourself in the foot?<\/p>\n<p>On the obvious side, if you have all these security pieces in place but you never activate them, it\u2019s not going to do you much good. If you click through every warning on your firewall without ever looking at it, it\u2019s not going to be doing as much for you as you might think. If you disable real-time protection on your AV software, likewise, it\u2019s going to be quite a bit more limited in its ability to protect you. But there are less obvious ways that you could be sabotaging your security efforts.<\/p>\n<p>There were a couple of good articles this week discussing ways people undo their security without realizing it \u2013 specifically, using backups. The first is about how <a href=\"http:\/\/www.threattracksecurity.com\/it-blog\/taking-sms-authentication-out-of-the-game\/\" target=\"_blank\">people backing their texts up to web services negate SMS for two-step authentication<\/a>. The second is how <a href=\"http:\/\/arstechnica.com\/security\/2013\/06\/can-apple-read-your-imessages-ars-deciphers-end-to-end-crypto-claims\/\" target=\"_blank\">backing up iMessages to iCloud negates the protection<\/a> given by encryption. But backups are also part of a good security strategy, right? Oh man, so confusing. I know security advice can seem really conflicting sometimes. So, let\u2019s break it down and see what\u2019s up.<\/p>\n<p><strong>The SMS Issue \u2013 When is 2-Factor Authentication Not Two Factors?<\/strong><\/p>\n<p>SMS backup is problematic, partly because two-step authentication is only a small improvement over single-step authentication, and also because it is\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wordpress-offers-two-factor-authentication\/\" target=\"_blank\">not quite two-factor authentication<\/a> to begin with.<\/p>\n<p>The idea with two-factor authentication is that the \u201cthing you have\u201d should be something separate than the thing you\u2019re accessing a resource with. Because you can access most web-services with your mobile phone as well as your computer, it\u2019s a less-secure method of authentication than using a dedicated dongle. And when you back up your SMS to your webmail, you\u2019re making it so you can access your texts on both your computer and your phone. So an SMS activation code becomes simply another \u201cthing you know,\u201d rather than a separate \u201cthing you have.\u201d One factor. Whoops.<\/p>\n<p><strong>The iMessage Issue \u2013 When Are Our Messages Encrypted?<\/strong><\/p>\n<p>The iMessages issue butts up against the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\" target=\"_blank\">limitations of encryption<\/a>. Encryption is meant to protect data only when it\u2019s not being used. That is to say, when the data is in transit or when nothing (and no one) is accessing that data. But the problem is, by allowing backups of your messages, you\u2019re creating more access to that data. If you forget your password, Apple has to give you a way to retrieve it, which opens up ways for other people to retrieve it too.<\/p>\n<p>The ArsTechnica article also brought up another issue with regards to encryption, which is something <a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\" target=\"_blank\">we talked about other day<\/a> too. There can be considerable clues to what you\u2019re up to in the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\" target=\"_blank\">metadata<\/a>. Metaphorically speaking, while having an encrypted file called \u201cAll my illegal activities\u201d may not be admissible as evidence in a trial against you, it\u2019s certainly going to put you under much more strenuous scrutiny whether or not it\u2019s warranted.<\/p>\n<p><strong>So, What Does That All Mean?<\/strong><\/p>\n<p>Well, for better or worse, it means you need to think about the consequences of your actions in security as in life. There\u2019s always a tradeoff between convenience and security. The more accessible your data is, the more difficult it is to protect it.<\/p>\n<p>Backing your data up in the cloud is less secure than backing it up on a hard drive that you keep locked in a safe, where only you have the key. It\u2019s simply safer if you are the only person with access to the device that holds your data. If there\u2019s a bunch of people at a company that is contractually obligated to make sure you can access your data however you\u2019d like, that\u2019s less safe. Not necessarily unsafe, mind you, but less safe. And every time someone backs up their data to a web service that has minimal protection in a way that negates other security measures, somewhere there\u2019s an attacker wringing their hands with glee and a security wonk that\u2019s quietly weeping.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"8 Ways to Accidentally Infect Your Friends with Malware\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" target=\"_blank\">8 Ways to Accidentally Infect Your Friends with Malware<\/a><\/li>\n<li><a title=\"6 Ineffective Ways to Protect Yourself Against Online Attacks\" href=\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\" target=\"_blank\">6 Ineffective Ways to Protect Yourself Against Online Attacks<\/a><\/li>\n<li><a title=\"Top 5 Ineffective Ways to Protect Yourself From Government Surveillance\" href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\" target=\"_blank\">Top 5 Ineffective Ways to Protect Yourself From Government Surveillance<\/a><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/pasukaru76\/4892378102\/\">pasukaru76<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with two-factor authentication set up on your accounts. High-five! Gold star! You get a cookie for good data-protection! But wait, there\u2019s more to this equation than there may appear. Could you have followed the spirit of [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15493,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[485,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Sabotaging Your Own Security Efforts? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-28T19:40:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T23:17:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"420\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png\",\"width\":420,\"height\":256,\"caption\":\"sabotage security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\",\"name\":\"Are You Sabotaging Your Own Security Efforts? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage\"},\"datePublished\":\"2013-06-28T19:40:02+00:00\",\"dateModified\":\"2015-03-26T23:17:36+00:00\",\"description\":\"You\\u2019re conscientious about security, right? You\\u2019ve got anti-virus software and a firewall; you\\u2019re using encryption and strong, unique passwords with\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You Sabotaging Your Own Security Efforts?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Are You Sabotaging Your Own Security Efforts?\",\"datePublished\":\"2013-06-28T19:40:02+00:00\",\"dateModified\":\"2015-03-26T23:17:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage\"},\"wordCount\":784,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png\",\"keywords\":[\"sabotaging\",\"Security\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/","og_locale":"en_US","og_type":"article","og_title":"Are You Sabotaging Your Own Security Efforts? - The Mac Security Blog","og_description":"You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with","og_url":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-06-28T19:40:02+00:00","article_modified_time":"2015-03-26T23:17:36+00:00","og_image":[{"width":420,"height":256,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png","width":420,"height":256,"caption":"sabotage security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/","name":"Are You Sabotaging Your Own Security Efforts? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage"},"datePublished":"2013-06-28T19:40:02+00:00","dateModified":"2015-03-26T23:17:36+00:00","description":"You\u2019re conscientious about security, right? You\u2019ve got anti-virus software and a firewall; you\u2019re using encryption and strong, unique passwords with","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Are You Sabotaging Your Own Security Efforts?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Are You Sabotaging Your Own Security Efforts?","datePublished":"2013-06-28T19:40:02+00:00","dateModified":"2015-03-26T23:17:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#webpage"},"wordCount":784,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png","keywords":["sabotaging","Security"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/SabotagingSecurityFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-41D","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15477"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=15477"}],"version-history":[{"count":30,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15477\/revisions"}],"predecessor-version":[{"id":39253,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15477\/revisions\/39253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/15493"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=15477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=15477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=15477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}