{"id":16163,"date":"2013-07-23T11:00:27","date_gmt":"2013-07-23T18:00:27","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16163"},"modified":"2013-07-23T11:02:37","modified_gmt":"2013-07-23T18:02:37","slug":"security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/","title":{"rendered":"Security Experts Pleased With iOS 7 Activation Lock"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Bypass.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16217\" alt=\"Bypass\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Bypass.jpg\" width=\"500\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Bypass.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Bypass-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Bypass-300x300.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>Update &#8211;<\/strong> <strong>July 23, 2013<\/strong><\/p>\n<p>The verdict from the group of security experts is in, and they&#8217;re pleased with the <a href=\"http:\/\/www.sfexaminer.com\/sanfrancisco\/sf-district-attorney-pleased-with-apple-samsung-progress-on-anti-theft-tech-for-smartphones\/Content?oid=2518045\">&#8220;clear improvements&#8221;<\/a> that have been made in iOS 7 for securing iPhone 5 against theft.<\/p>\n<p>While &#8220;Find My iPhone&#8221; in iOS 6 allows users to track lost or stolen devices, and to remotely wipe them if needed, it\u2019s not hard for thieves to bypass existing security features to get into devices and reset them to factory settings.<\/p>\n<p>Activation Lock in iOS 7 makes it so thieves would need to jailbreak devices in order to bypass new security features, and then spoof the phone\u2019s hardware UUID to install new, modified firmware without the Activation Lock feature. That\u2019s a much higher technological hurdle to jump! And since successful jailbreaks are becoming increasingly difficult for the teams of hackers that take on the task, that jump may not be feasible for a while after people update to iOS 7.<\/p>\n<p>The bottom line is, after people start updating to iOS 7, there may be a window of time when a stolen iPhone with Activation Lock may not be such a tempting target. It will be very interesting to see if that actually deters thieves, or if it simply makes theft less profitable.<\/p>\n<p>___<\/p>\n<p>You can&#8217;t seem to swing a cat lately without hitting an article about rising rates of iPhone theft. It&#8217;s not helpful that there seems to have been a lot of\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/return-of-the-passcode-flaw-in-ios-6-1-3\/\" target=\"_blank\">passcode bypass issues in iOS 6<\/a>\u00a0to boot.\u00a0As it turns out, many security experts with law enforcement agencies are seeking Apple&#8217;s help to stem the tide. Apple has heeded the call for assistance, and it&#8217;s brought a couple of interesting developments.<\/p>\n<p>The first <a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-security-improvements-announced-at-wwdc-2013\/\" target=\"_blank\">big announcement<\/a> in this effort to curb iPhone theft is Activation Lock, set to be released with iOS 7. This feature locks a device if a thief tries to turn off \u201cFind My iPhone\u201d or to wipe the device, until the proper iCloud password has been entered. While this potentially limits the value of a stolen iPhone, it still leaves a fairly wide window of opportunity to get valuable information off of it, especially if a thief can bypass the passcode lock.<\/p>\n<p>Now it appears the District Attorney of San Francisco is <a href=\"http:\/\/www.idownloadblog.com\/2013\/07\/18\/security-exp-activation-lock\/\" target=\"_blank\">organizing an assessment of the security features of smartphones<\/a> including Apple&#8217;s iPhone 5 and Samsung&#8217;s Galaxy S4. Experts from the Northern California Regional Intelligence Center are being given phones to attack as if they were thieves trying to bypass security features. Hopefully, this expanded effort to find flaws can help lead to ways to identify and remove future problems more quickly.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/selva\/1095554\/\">selva<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update &#8211; July 23, 2013 The verdict from the group of security experts is in, and they&#8217;re pleased with the &#8220;clear improvements&#8221; that have been made in iOS 7 for securing iPhone 5 against theft. While &#8220;Find My iPhone&#8221; in iOS 6 allows users to track lost or stolen devices, and to remotely wipe them [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16221,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[69,443,9,259,319,539],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Update - July 23, 2013 The verdict from the group of security experts is in, and they&#039;re pleased with the &quot;clear improvements&quot; that have been made in iOS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Experts Pleased With iOS 7 Activation Lock - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Update - July 23, 2013 The verdict from the group of security experts is in, and they&#039;re pleased with the &quot;clear improvements&quot; that have been made in iOS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-23T18:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-07-23T18:02:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/\",\"name\":\"Security Experts Pleased With iOS 7 Activation Lock - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage\"},\"datePublished\":\"2013-07-23T18:00:27+00:00\",\"dateModified\":\"2013-07-23T18:02:37+00:00\",\"description\":\"Update - July 23, 2013 The verdict from the group of security experts is in, and they're pleased with the \\\"clear improvements\\\" that have been made in iOS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Experts Pleased With iOS 7 Activation Lock\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Security Experts Pleased With iOS 7 Activation Lock\",\"datePublished\":\"2013-07-23T18:00:27+00:00\",\"dateModified\":\"2013-07-23T18:02:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage\"},\"wordCount\":440,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png\",\"keywords\":[\"iOS\",\"iOS 7\",\"iPhone\",\"Passcode\",\"Security\",\"theft\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Update - July 23, 2013 The verdict from the group of security experts is in, and they're pleased with the \"clear improvements\" that have been made in iOS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Security Experts Pleased With iOS 7 Activation Lock - The Mac Security Blog","og_description":"Update - July 23, 2013 The verdict from the group of security experts is in, and they're pleased with the \"clear improvements\" that have been made in iOS","og_url":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-07-23T18:00:27+00:00","article_modified_time":"2013-07-23T18:02:37+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/","name":"Security Experts Pleased With iOS 7 Activation Lock - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage"},"datePublished":"2013-07-23T18:00:27+00:00","dateModified":"2013-07-23T18:02:37+00:00","description":"Update - July 23, 2013 The verdict from the group of security experts is in, and they're pleased with the \"clear improvements\" that have been made in iOS","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Security Experts Pleased With iOS 7 Activation Lock"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Security Experts Pleased With iOS 7 Activation Lock","datePublished":"2013-07-23T18:00:27+00:00","dateModified":"2013-07-23T18:02:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#webpage"},"wordCount":440,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png","keywords":["iOS","iOS 7","iPhone","Passcode","Security","theft"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/security-experts-to-help-apple-eradicate-ios-passcode-bypass-flaws\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/BypassFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4cH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16163"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16163"}],"version-history":[{"count":33,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16163\/revisions"}],"predecessor-version":[{"id":16323,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16163\/revisions\/16323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16221"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}