	{"id":95438,"date":"2022-03-03T02:20:22","date_gmt":"2022-03-03T10:20:22","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95438"},"modified":"2022-03-03T02:20:22","modified_gmt":"2022-03-03T10:20:22","slug":"apple-peek-performance-prognostics-intego-mac-podcast-episode-229","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/","title":{"rendered":"Apple Peek Performance Prognostics &#8211; Intego Mac Podcast Episode 229"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+8ZUsTt50?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple&#8217;s Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/hermeticwiper-malware-targeting-orgs-in-ukraine-heres-how-to-stay-safe\/\" target=\"_blank\" rel=\"noopener\">HermeticWiper malware targeting orgs in Ukraine; here\u2019s how to stay safe<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/security-researchers-spot-another-form-of-wiper-malware-that-was-used-against-ukraines-networks\/\" target=\"_blank\" rel=\"noopener\">IsaacWiper<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2022\/02\/26\/russian-invasion-of-ukraine-impacts-apple-world\/\" target=\"_blank\" rel=\"noopener\">Russian Invasion of Ukraine Impacts Apple World<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/apple-pauses-all-product-sales-in-russia-limits-apple-pay\/\" target=\"_blank\" rel=\"noopener\">Apple pauses all product sales in Russia, stops exports and limits Apple Pay<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/russias-most-cut-throat-hackers-infect-network-devices-with-new-botnet-malware\/\" target=\"_blank\" rel=\"noopener\">Russian hackers infect network devices with new botnet malware: Cyclops Blink<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/03\/02\/web-devs-advocacy-group-browser-engines-ios\/\" target=\"_blank\" rel=\"noopener\">Web Developers Form Advocacy Group to Allow Other Browser Engines on iOS<\/a><\/li>\n<li><a href=\"https:\/\/www.apple.com\/apple-events\/\" target=\"_blank\" rel=\"noopener\">Apple event, March 8<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple&#8217;s Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple&#039;s Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Peek Performance Prognostics - Intego Mac Podcast Episode 229 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple&#039;s Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T10:20:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/\",\"name\":\"Apple Peek Performance Prognostics - Intego Mac Podcast Episode 229 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage\"},\"datePublished\":\"2022-03-03T10:20:22+00:00\",\"dateModified\":\"2022-03-03T10:20:22+00:00\",\"description\":\"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple's Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Peek Performance Prognostics &#8211; Intego Mac Podcast Episode 229\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Apple Peek Performance Prognostics &#8211; Intego Mac Podcast Episode 229\",\"datePublished\":\"2022-03-03T10:20:22+00:00\",\"dateModified\":\"2022-03-03T10:20:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage\"},\"wordCount\":185,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Malware\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple's Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/","og_locale":"en_US","og_type":"article","og_title":"Apple Peek Performance Prognostics - Intego Mac Podcast Episode 229 - The Mac Security Blog","og_description":"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple's Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-03-03T10:20:22+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/","name":"Apple Peek Performance Prognostics - Intego Mac Podcast Episode 229 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage"},"datePublished":"2022-03-03T10:20:22+00:00","dateModified":"2022-03-03T10:20:22+00:00","description":"Russia has deployed malware against Ukraine in the lead up to its invasion; we have details on the cyber weapons they used. Third-party web browsers for the iPhone and iPad are forced to use WebKit, but want to be free from this requirement. And Apple's Spring Event is next week. We have a preview of what we hope is coming, along with some Peek Performance Prognostics.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Peek Performance Prognostics &#8211; Intego Mac Podcast Episode 229"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Apple Peek Performance Prognostics &#8211; Intego Mac Podcast Episode 229","datePublished":"2022-03-03T10:20:22+00:00","dateModified":"2022-03-03T10:20:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#webpage"},"wordCount":185,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Malware"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-peek-performance-prognostics-intego-mac-podcast-episode-229\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oPk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95438"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95438"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95438\/revisions"}],"predecessor-version":[{"id":95439,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95438\/revisions\/95439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}