{"id":17455,"date":"2013-09-06T13:37:56","date_gmt":"2013-09-06T20:37:56","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=17455"},"modified":"2020-05-04T23:55:07","modified_gmt":"2020-05-05T06:55:07","slug":"how-to-combat-nsa-surveillance","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/","title":{"rendered":"How to Combat NSA Surveillance (And Keep Fighting for Privacy!)"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-Privacy.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-17461\" alt=\"NSA-Privacy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-Privacy.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-Privacy.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-Privacy-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-Privacy-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>I was reminded this morning that a recent year was dubbed the &#8220;year of privacy,&#8221; meaning that it was the year that people began to understand how much surveillance was happening, and how much it could affect their daily lives. Could that year have been 2013?<\/p>\n<p>Turns out,\u00a0<a href=\"http:\/\/www.huffingtonpost.com\/hemanshu-nigam\/privacy-cases-2012_b_2405397.html\" target=\"_blank\" rel=\"noopener noreferrer\">that year was 2012<\/a>. Holy cow.\u00a0So, perhaps that makes\u00a0<a href=\"http:\/\/www.theblaze.com\/contributions\/2013-the-year-privacy-died\/\" target=\"_blank\" rel=\"noopener noreferrer\">2013<\/a> the year of DUDE, WHERE&#8217;S MY PRIVACY!?!?<\/p>\n<p>A recent <a href=\"http:\/\/news.cnet.com\/8301-1009_3-57601478-83\/half-of-internet-users-worry-over-personal-info-exposed-online\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Internet study<\/a> indicated that more than half of their respondents were concerned about their private information getting exposed online, up from 30 percent in 2009. Happily, 55 percent of the respondents have taken steps to elude surveillance, though 59 percent didn&#8217;t think it&#8217;s possible to be completely anonymous online. And 68 percent felt that current laws weren&#8217;t sufficient to protect their online privacy.<\/p>\n<p>Upon reading this, my reaction was hopeful: &#8220;They get it.&#8221; According to the Pew Internet study, it&#8217;s possible that a majority of people finally get that privacy has been dealt a huge blow; they&#8217;re realistic about whether they can truly be anonymous online, and that laws are not sufficiently dealing with the problem.<\/p>\n<p>The latest revelation in the ongoing NSA scandal is that their <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-has-made-strides-in-thwarting-encryption-used-to-protect-internet-communication\/2013\/09\/05\/0ec08efc-1669-11e3-a2ec-b47e45e6f8ef_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">surveillance efforts include subverting encryption<\/a>. That is to say, rather than necessarily breaking the encryption, they&#8217;re doing things to get around encryption, like encouraging the use of weaker standards or putting backdoors in place so that they see the traffic before it gets encrypted. Once again, we turn to <a href=\"http:\/\/xkcd.com\/538\/\" target=\"_blank\" rel=\"noopener noreferrer\">xkcd<\/a> for an illustration of this principle.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\" aligncenter\" alt=\"Principle of encryption xkcd\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/05\/security.png\" width=\"448\" height=\"274\" \/><\/p>\n<p>Why spend billions of dollars and CPU cycles breaking encryption, when you can just talk someone out of the keys?<\/p>\n<p>Cryptographer and security specialist Bruce Schneier <a href=\"http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-how-to-remain-secure-surveillance\" target=\"_blank\" rel=\"noopener noreferrer\">suggested<\/a> that rather than worry about the NSA&#8217;s surveillance capabilities, we simply make the cost of accumulating information on us more expensive.<\/p>\n<blockquote><p>The NSA has turned the fabric of the Internet into a vast surveillance platform, but they are not magical. They&#8217;re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.<\/p><\/blockquote>\n<p>This is much the same tactic that we&#8217;ve been suggesting in terms of security. If you make it too costly to get into your machine, attackers will look elsewhere. To help you combat NSA surveillance in this way, Schneier offers several tips.<\/p>\n<p>In short:<\/p>\n<ul>\n<li>Use Tor&#8217;s hidden services to hide your traffic<\/li>\n<li>Use encryption<\/li>\n<li>Use an &#8220;<a href=\"http:\/\/www.techopedia.com\/definition\/17037\/air-gap\" target=\"_blank\" rel=\"noopener noreferrer\">air gap<\/a>&#8221; when you need to transfer particularly important data<\/li>\n<\/ul>\n<p>He also gives several tips specific to how to choose the best types of encryption:<\/p>\n<ul>\n<li>Choose open-source over proprietary algorithms<\/li>\n<li>Choose symmetric cryptography over public-key cryptography<\/li>\n<li>Choose conventional discrete-log-based systems over elliptic-curve systems<\/li>\n<\/ul>\n<p>Granted, that last suggestion may be over most folks&#8217; heads. Do what you can, as you&#8217;re simply aiming to make your traffic harder to read than average. Think of it like the analogy of not having to outrun a bear to avoid getting eaten: you don&#8217;t have to be fastest, you just have to run faster than the slowest guy.<\/p>\n<p>Keep in mind this isn&#8217;t where we should stop our measures to improve privacy. Right now, privacy is not adequately being protected by the law. If we want this to change, we must tell our legislators that this concerns us. In addition to improving the protection of our personal information, we can keep fighting for privacy by contacting our government representatives to let them know that this is an issue of great importance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was reminded this morning that a recent year was dubbed the &#8220;year of privacy,&#8221; meaning that it was the year that people began to understand how much surveillance was happening, and how much it could affect their daily lives. Could that year have been 2013? Turns out,\u00a0that year was 2012. Holy cow.\u00a0So, perhaps that [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":17465,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[611,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"I was reminded this morning that a recent year was dubbed the &quot;year of privacy,&quot; meaning that it was the year that people began to understand how much\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Combat NSA Surveillance (And Keep Fighting for Privacy!) - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"I was reminded this morning that a recent year was dubbed the &quot;year of privacy,&quot; meaning that it was the year that people began to understand how much\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-06T20:37:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-05T06:55:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg\",\"width\":400,\"height\":266},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/\",\"name\":\"How to Combat NSA Surveillance (And Keep Fighting for Privacy!) - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage\"},\"datePublished\":\"2013-09-06T20:37:56+00:00\",\"dateModified\":\"2020-05-05T06:55:07+00:00\",\"description\":\"I was reminded this morning that a recent year was dubbed the \\\"year of privacy,\\\" meaning that it was the year that people began to understand how much\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Combat NSA Surveillance (And Keep Fighting for Privacy!)\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How to Combat NSA Surveillance (And Keep Fighting for Privacy!)\",\"datePublished\":\"2013-09-06T20:37:56+00:00\",\"dateModified\":\"2020-05-05T06:55:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage\"},\"wordCount\":579,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg\",\"keywords\":[\"NSA surveillance\",\"Privacy\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"I was reminded this morning that a recent year was dubbed the \"year of privacy,\" meaning that it was the year that people began to understand how much","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/","og_locale":"en_US","og_type":"article","og_title":"How to Combat NSA Surveillance (And Keep Fighting for Privacy!) - The Mac Security Blog","og_description":"I was reminded this morning that a recent year was dubbed the \"year of privacy,\" meaning that it was the year that people began to understand how much","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-09-06T20:37:56+00:00","article_modified_time":"2020-05-05T06:55:07+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg","width":400,"height":266},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/","name":"How to Combat NSA Surveillance (And Keep Fighting for Privacy!) - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage"},"datePublished":"2013-09-06T20:37:56+00:00","dateModified":"2020-05-05T06:55:07+00:00","description":"I was reminded this morning that a recent year was dubbed the \"year of privacy,\" meaning that it was the year that people began to understand how much","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Combat NSA Surveillance (And Keep Fighting for Privacy!)"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How to Combat NSA Surveillance (And Keep Fighting for Privacy!)","datePublished":"2013-09-06T20:37:56+00:00","dateModified":"2020-05-05T06:55:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#webpage"},"wordCount":579,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg","keywords":["NSA surveillance","Privacy"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-combat-nsa-surveillance\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/NSA-PrivacyFT.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4xx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17455"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=17455"}],"version-history":[{"count":58,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17455\/revisions"}],"predecessor-version":[{"id":91340,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17455\/revisions\/91340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/17465"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=17455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=17455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=17455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}