	{"id":94222,"date":"2021-08-05T03:46:10","date_gmt":"2021-08-05T10:46:10","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94222"},"modified":"2021-08-05T07:29:30","modified_gmt":"2021-08-05T14:29:30","slug":"understanding-icloud-private-relay-intego-mac-podcast-episode-199","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/","title":{"rendered":"Understanding iCloud Private Relay &#8211; Intego Mac Podcast Episode 199"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+pr-zCl2I?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>The Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works. <\/p>\n<ul>\n<li><a href=\"https:\/\/arstechnica.com\/tech-policy\/2021\/08\/zoom-to-pay-85m-for-lying-about-encryption-and-sending-data-to-facebook-and-google\/\" target=\"_blank\" rel=\"noopener\">Zoom to pay $85M for lying about encryption and sending data to Facebook and Google<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/08\/03\/apple-website-redesigned-store\/\" target=\"_blank\" rel=\"noopener\">Apple reverts back to having a Store tab (it\u2019s about time)<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/07\/with-help-from-google-impersonated-brave-com-website-pushes-malware\/\" target=\"_blank\" rel=\"noopener\">With help from Google, impersonated Brave.com website pushes malware<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/lookalike-domains-are-spreading-malware-heres-how-to-stay-safe\/\" target=\"_blank\" rel=\"noopener\">Lookalike domains are spreading malware; here&#8217;s how to stay safe<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-icloud-private-relay\/\" target=\"_blank\" rel=\"noopener\">How to Use iCloud Private Relay<\/a><\/li>\n<li><a href=\"https:\/\/what3words.com\" target=\"_blank\" rel=\"noopener\">What3Words<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding iCloud Private Relay - Intego Mac Podcast Episode 199 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-05T10:46:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-05T14:29:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/\",\"name\":\"Understanding iCloud Private Relay - Intego Mac Podcast Episode 199 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage\"},\"datePublished\":\"2021-08-05T10:46:10+00:00\",\"dateModified\":\"2021-08-05T14:29:30+00:00\",\"description\":\"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding iCloud Private Relay &#8211; Intego Mac Podcast Episode 199\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Understanding iCloud Private Relay &#8211; Intego Mac Podcast Episode 199\",\"datePublished\":\"2021-08-05T10:46:10+00:00\",\"dateModified\":\"2021-08-05T14:29:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage\"},\"wordCount\":161,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/","og_locale":"en_US","og_type":"article","og_title":"Understanding iCloud Private Relay - Intego Mac Podcast Episode 199 - The Mac Security Blog","og_description":"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-08-05T10:46:10+00:00","article_modified_time":"2021-08-05T14:29:30+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/","name":"Understanding iCloud Private Relay - Intego Mac Podcast Episode 199 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage"},"datePublished":"2021-08-05T10:46:10+00:00","dateModified":"2021-08-05T14:29:30+00:00","description":"They Apple watch has been updated to cover a recent security vulnerability that has been patched on other Apple operating systems. Zoom pays users for lying, Apple brings back the Store tab on its website, and we look at how the forthcoming iCloud Private Relay works.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Understanding iCloud Private Relay &#8211; Intego Mac Podcast Episode 199"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Understanding iCloud Private Relay &#8211; Intego Mac Podcast Episode 199","datePublished":"2021-08-05T10:46:10+00:00","dateModified":"2021-08-05T14:29:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#webpage"},"wordCount":161,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/understanding-icloud-private-relay-intego-mac-podcast-episode-199\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ovI","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94222"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94222"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94222\/revisions"}],"predecessor-version":[{"id":94256,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94222\/revisions\/94256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}