	{"id":80131,"date":"2018-06-15T00:01:37","date_gmt":"2018-06-15T07:01:37","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=80131"},"modified":"2025-03-14T12:09:51","modified_gmt":"2025-03-14T19:09:51","slug":"the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/","title":{"rendered":"The Intego Mac Podcast, Episode 35: Where&#8217;s the Best Place to Buy Mac Apps?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Some new security threats arise, and we discuss code signing and Apple&#8217;s Gatekeeper technology. We then look at the pros and cons of buying Mac apps from the Mac App Store or directly from developers.<\/p>\n<p>The Intego Mac Podcast <a href=\"https:\/\/podcast.intego.com\/35\" rel=\"noopener\">episode 35<\/a> is now available!\u00a0Check out <a>the latest episode<\/a>\u00a0for a roundup of important Apple news you need to know, industry opinions\u00a0about Macs and iOS devices, and how to keep them secure, which I co-host with Josh Long.<\/p>\n<p>If you like what you hear, be sure to rate and review the <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a> on iTunes!<\/p>\n<p><strong>Have a question? Ask us!<\/strong><\/p>\n<p>A new episode is available weekly, every Wednesday. Want your question aired in our next episode of the Intego Mac Podcast? Listeners and fans of the podcast can <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at\u00a0podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some new security threats arise, and we discuss code signing and Apple&#8217;s Gatekeeper technology. We then look at the pros and cons of buying Mac apps from the Mac App Store or directly from developers. The Intego Mac Podcast episode 35 is now available!\u00a0Check out the latest episode\u00a0for a roundup of important Apple news you [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"The Intego Mac Podcast, Episode 35: Where's the Best Place to Buy Mac Apps?","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Some new security threats arise, and we discuss code signing and Apple&#039;s Gatekeeper technology. We then look at the pros and cons of buying Mac apps from\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Intego Mac Podcast, Episode 35: Where&#039;s the Best Place to Buy Mac Apps? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Some new security threats arise, and we discuss code signing and Apple&#039;s Gatekeeper technology. We then look at the pros and cons of buying Mac apps from\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-15T07:01:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T19:09:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/\",\"name\":\"The Intego Mac Podcast, Episode 35: Where's the Best Place to Buy Mac Apps? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage\"},\"datePublished\":\"2018-06-15T07:01:37+00:00\",\"dateModified\":\"2025-03-14T19:09:51+00:00\",\"description\":\"Some new security threats arise, and we discuss code signing and Apple's Gatekeeper technology. We then look at the pros and cons of buying Mac apps from\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Intego Mac Podcast, Episode 35: Where&#8217;s the Best Place to Buy Mac Apps?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The Intego Mac Podcast, Episode 35: Where&#8217;s the Best Place to Buy Mac Apps?\",\"datePublished\":\"2018-06-15T07:01:37+00:00\",\"dateModified\":\"2025-03-14T19:09:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage\"},\"wordCount\":170,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Some new security threats arise, and we discuss code signing and Apple's Gatekeeper technology. We then look at the pros and cons of buying Mac apps from","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/","og_locale":"en_US","og_type":"article","og_title":"The Intego Mac Podcast, Episode 35: Where's the Best Place to Buy Mac Apps? - The Mac Security Blog","og_description":"Some new security threats arise, and we discuss code signing and Apple's Gatekeeper technology. We then look at the pros and cons of buying Mac apps from","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-06-15T07:01:37+00:00","article_modified_time":"2025-03-14T19:09:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/","name":"The Intego Mac Podcast, Episode 35: Where's the Best Place to Buy Mac Apps? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage"},"datePublished":"2018-06-15T07:01:37+00:00","dateModified":"2025-03-14T19:09:51+00:00","description":"Some new security threats arise, and we discuss code signing and Apple's Gatekeeper technology. We then look at the pros and cons of buying Mac apps from","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Intego Mac Podcast, Episode 35: Where&#8217;s the Best Place to Buy Mac Apps?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The Intego Mac Podcast, Episode 35: Where&#8217;s the Best Place to Buy Mac Apps?","datePublished":"2018-06-15T07:01:37+00:00","dateModified":"2025-03-14T19:09:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#webpage"},"wordCount":170,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-35-wheres-the-best-place-to-buy-mac-apps\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kQr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80131"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=80131"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80131\/revisions"}],"predecessor-version":[{"id":103480,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80131\/revisions\/103480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=80131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=80131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=80131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}