{"id":89431,"date":"2019-09-03T11:31:49","date_gmt":"2019-09-03T18:31:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=89431"},"modified":"2021-05-03T08:53:45","modified_gmt":"2021-05-03T15:53:45","slug":"everyone-is-listening-intego-mac-podcast-episode-98","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/","title":{"rendered":"Everyone is listening! &#8211; Intego Mac Podcast, Episode 98"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The Intego Mac Podcast <a href=\"https:\/\/podcast.intego.com\/98\" target=\"_blank\" rel=\"noopener\">episode 98<\/a> is now available!<\/p>\n<p>There&#8217;s a recurring theme in security and privacy news lately, and that is the fact that everyone is listening. If you use Alexa, OK Google, or Siri, the companies behind these services listen to some of your requests (and sometimes when you don&#8217;t explicitly ask their devices anything). This week we share news about companies listening and watching, including Microsoft with its Xbox gaming console.<\/p>\n<p>We also share what you need to know about a bug in recent Apple OS updates, clickjacking scripts on websites, and all the stuff that Facebook knows about you. And we answer a couple of listener questions.\u00a0Check out the full <a href=\"https:\/\/podcast.intego.com\/98\" target=\"_blank\" rel=\"noopener\">show notes<\/a>\u00a0for links.<\/p>\n<div id=\"podcastPlayer\" style=\"overflow: hidden; overflow-x: scroll;\"><center><script type='text\/javascript'>\nvar mobile ='<iframe style=\"width: 100%; min-width: 335px;\" src=\"https:\/\/fireside.fm\/s\/GegHgcrH+5OjJJ1TE\/iframe\" height=\"80\" frameborder=\"0\" scrolling=\"no\"><\/iframe>';\nvar desktop = '<iframe style=\"width: 100%; min-width: 500px;\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+5OjJJ1TE?theme=dark\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe>';\nif (document.getElementById(\"podcastPlayer\").clientWidth < 500)\n{document.write (mobile)}\nelse\n{document.write (desktop)}\n<\/script><br \/>\n<noscript><iframe style=\"width: 100%; min-width: 335px;\" src=\"https:\/\/fireside.fm\/s\/GegHgcrH+5OjJJ1TE\/iframe\" height=\"80\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/noscript><\/center><\/div>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us!<\/strong><\/p>\n<p>Listeners can <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intego Mac Podcast episode 98 is now available! There&#8217;s a recurring theme in security and privacy news lately, and that is the fact that everyone is listening. If you use Alexa, OK Google, or Siri, the companies behind these services listen to some of your requests (and sometimes when you don&#8217;t explicitly ask their [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[4009,4552,53,3715,87,645],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Intego Mac Podcast episode 98 is now available! There&#039;s a recurring theme in security and privacy news lately, and that is the fact that everyone is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everyone is listening! - Intego Mac Podcast, Episode 98 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Intego Mac Podcast episode 98 is now available! There&#039;s a recurring theme in security and privacy news lately, and that is the fact that everyone is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-03T18:31:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T15:53:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/\",\"name\":\"Everyone is listening! - Intego Mac Podcast, Episode 98 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage\"},\"datePublished\":\"2019-09-03T18:31:49+00:00\",\"dateModified\":\"2021-05-03T15:53:45+00:00\",\"description\":\"The Intego Mac Podcast episode 98 is now available! There's a recurring theme in security and privacy news lately, and that is the fact that everyone is\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everyone is listening! &#8211; Intego Mac Podcast, Episode 98\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Everyone is listening! &#8211; Intego Mac Podcast, Episode 98\",\"datePublished\":\"2019-09-03T18:31:49+00:00\",\"dateModified\":\"2021-05-03T15:53:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage\"},\"wordCount\":184,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Alexa\",\"Clickjacking\",\"Facebook\",\"Intego Mac Podcast\",\"Microsoft\",\"Siri\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Intego Mac Podcast episode 98 is now available! There's a recurring theme in security and privacy news lately, and that is the fact that everyone is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/","og_locale":"en_US","og_type":"article","og_title":"Everyone is listening! - Intego Mac Podcast, Episode 98 - The Mac Security Blog","og_description":"The Intego Mac Podcast episode 98 is now available! There's a recurring theme in security and privacy news lately, and that is the fact that everyone is","og_url":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/","og_site_name":"The Mac Security Blog","article_published_time":"2019-09-03T18:31:49+00:00","article_modified_time":"2021-05-03T15:53:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/","name":"Everyone is listening! - Intego Mac Podcast, Episode 98 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage"},"datePublished":"2019-09-03T18:31:49+00:00","dateModified":"2021-05-03T15:53:45+00:00","description":"The Intego Mac Podcast episode 98 is now available! There's a recurring theme in security and privacy news lately, and that is the fact that everyone is","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Everyone is listening! &#8211; Intego Mac Podcast, Episode 98"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Everyone is listening! &#8211; Intego Mac Podcast, Episode 98","datePublished":"2019-09-03T18:31:49+00:00","dateModified":"2021-05-03T15:53:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#webpage"},"wordCount":184,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Alexa","Clickjacking","Facebook","Intego Mac Podcast","Microsoft","Siri"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/everyone-is-listening-intego-mac-podcast-episode-98\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ngr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/89431"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=89431"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/89431\/revisions"}],"predecessor-version":[{"id":89674,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/89431\/revisions\/89674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=89431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=89431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=89431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}