{"id":5614,"date":"2012-10-02T10:42:54","date_gmt":"2012-10-02T17:42:54","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5614"},"modified":"2014-10-23T09:21:52","modified_gmt":"2014-10-23T16:21:52","slug":"what-is-encryption-and-why-is-it-helpful","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/","title":{"rendered":"What is Encryption and Why is It Helpful?"},"content":{"rendered":"<p>Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In order to answer that question, it\u2019s helpful to give a quick bit of background about what encryption is and how it\u2019s useful. Simply put, encryption is a way of taking data and converting it so that it cannot easily be read. It sounds terribly complicated and mathtacular, but it isn\u2019t always.<\/p>\n<p>Most kids have played with a very simple form of encryption. If you ever had one of those secret decoder rings that came as a prize in a box of cereal or solved a Cryptogram puzzle, you were playing with encryption. Decoder rings are using one of the simplest methods of encryption called a rotational cipher \u2013 it rotates the alphabet a few letters to get its code. Cryptograms (or Word Scrambles) are a game where you solve the puzzle by substituting letters for one another to decode a phrase \u2013 it\u2019s asking you to decrypt what\u2019s called a substitution cipher.<\/p>\n<p align=\"center\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/decoder\/\" rel=\"attachment wp-att-6541\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-6541\" title=\"decoder\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/decoder.jpg\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/decoder.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/decoder-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/decoder-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/decoder-100x75.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><br \/>\n<em>A simple form of encryption.<\/em><\/p>\n<p>These are very simple methods of encryption that are fairly easily undone, but there are others that are effectively impossible to undo, as well as plenty that are in-between. The types of encryption that are used to protect your data are generally the stronger kind. When you encrypt data on your computer, you\u2019ll get the benefit of encryption either in transit or when it\u2019s in storage.<\/p>\n<p>In transit, you use encryption to dissuade people from eavesdropping on your conversation. This could be any sort of web traffic, though one of the most common forms you\u2019ll run across is encrypted web traffic. Facebook uses this by default. Your bank almost assuredly does \u2013 any time you see that little lock up by the web address and an address that starts with HTTPS, that\u2019s what\u2019s happening. That\u2019s why we tell you to look for that lock when you want to make sure your data is kept private and that you&#8217;re <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-protect-yourself-from-cyber-criminals-during-the-2012-london-olympic-games\/\">protecting yourself against cyber-criminals<\/a>.<\/p>\n<p>When you\u2019re storing files, encryption is good because that makes it harder for people to steal the data inside them. It won\u2019t stop malware from damaging the files or deleting them, but someone can\u2019t make off with the data inside when files are just sitting on disk. This can help prevent identity theft, among other things.<\/p>\n<p>There is one time when encryption will <em>not<\/em> help you, and that\u2019s when you\u2019re looking at the data in a readable form. This includes any time the encrypted file is open, even if it\u2019s covered up with other windows, because opening the file has decrypted it in the computer\u2019s memory. If the data is in a readable form, anyone who has a backdoor into your machine can access that readable data. This is not to say that encryption isn\u2019t useful \u2013 in fact, it can do a lot to save your bacon if someone is able to hack into your computer or anyplace you store data. This is, as we\u2019re so fond of saying, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\">why layered defenses are a good thing<\/a>: one technology can help bolster the effectiveness of another.<\/p>\n<p>So to answer our original question, if you\u2019re using encryption, this doesn\u2019t obviate the need for other security products. It can help protect your data in case of hacks that don\u2019t involve malware, or in the unlikely event that you are hit with targeted malware that is so obscure that your other security products haven\u2019t yet added it. Happily, both <a href=\"http:\/\/www.macworld.com\/article\/1053658\/decmobilemac.html\">OS X<\/a> and <a href=\"http:\/\/gizmodo.com\/5934234\/ios-encryption-is-so-good-not-even-the-nsa-can-hack-it\">iDevices<\/a> have some really awesome encryption capabilities built-in and ready for you to use, so give it a whirl!<\/p>\n<p><span style=\"font-size: x-small;\"><em>photo credits: <a href=\"http:\/\/www.flickr.com\/photos\/reedwade\/2410328364\/\">reedwade<\/a> and <a href=\"http:\/\/www.flickr.com\/photos\/runa-sankarshan\/4823340662\/\">sankarshan<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/em><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In order to answer that question, it\u2019s helpful to give a quick bit of background about what encryption is and how it\u2019s useful. Simply put, encryption is a way of taking data and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6543,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[273],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Encryption and Why is It Helpful? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-02T17:42:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-10-23T16:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"159\" \/>\n\t<meta property=\"og:image:height\" content=\"159\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg\",\"width\":\"159\",\"height\":\"159\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\",\"name\":\"What is Encryption and Why is It Helpful? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage\"},\"datePublished\":\"2012-10-02T17:42:54+00:00\",\"dateModified\":\"2014-10-23T16:21:52+00:00\",\"description\":\"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Encryption and Why is It Helpful?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What is Encryption and Why is It Helpful?\",\"datePublished\":\"2012-10-02T17:42:54+00:00\",\"dateModified\":\"2014-10-23T16:21:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage\"},\"wordCount\":646,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg\",\"keywords\":[\"Encryption\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/","og_locale":"en_US","og_type":"article","og_title":"What is Encryption and Why is It Helpful? - The Mac Security Blog","og_description":"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-10-02T17:42:54+00:00","article_modified_time":"2014-10-23T16:21:52+00:00","og_image":[{"width":"159","height":"159","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg","width":"159","height":"159"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/","name":"What is Encryption and Why is It Helpful? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage"},"datePublished":"2012-10-02T17:42:54+00:00","dateModified":"2014-10-23T16:21:52+00:00","description":"Someone recently asked me whether encryption could be used as a replacement for more traditional security tools like Anti-Malware or Firewall products. In","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What is Encryption and Why is It Helpful?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What is Encryption and Why is It Helpful?","datePublished":"2012-10-02T17:42:54+00:00","dateModified":"2014-10-23T16:21:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#webpage"},"wordCount":646,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg","keywords":["Encryption"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/padlock-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1sy","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5614"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5614"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5614\/revisions"}],"predecessor-version":[{"id":6549,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5614\/revisions\/6549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/6543"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}