{"id":95686,"date":"2022-05-12T02:00:51","date_gmt":"2022-05-12T09:00:51","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95686"},"modified":"2022-06-16T14:29:51","modified_gmt":"2022-06-16T21:29:51","slug":"requiem-for-the-ipod-intego-mac-podcast-episode-239","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/","title":{"rendered":"Requiem for the iPod &#8211; Intego Mac Podcast Episode 239"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+hy5rxcZ6?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.theverge.com\/2022\/5\/6\/23060113\/airtags-safety-phantom-alerts-apple\" target=\"_blank\" rel=\"noopener\">AirTags are sending a new kind of false alarm, report says<\/a><\/li>\n<li><a href=\"https:\/\/www.fastcompany.com\/90749268\/google-lines-up-with-apple-and-microsoft-to-nix-passwords-in-favor-of-nearby-device-authentication\" target=\"_blank\" rel=\"noopener\">Google lines up with Apple and Microsoft to nix passwords in favor of nearby-device authentication<\/a><\/li>\n<li><a href=\"https:\/\/www.apple.com\/newsroom\/2022\/05\/the-music-lives-on\/\" target=\"_blank\" rel=\"noopener\">Apple discontinues the last iPod model<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-use-an-ipod-touch-in-2022-17-reasons\/\">17 Reasons Why You Should Use an iPod touch in 2022<\/a> (published 8 days earlier)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-ipod-at-20-how-the-portable-music-player-laid-the-foundation-for-todays-apple\/\" target=\"_blank\" rel=\"noopener\">The iPod at 20 \u2013 How the Portable Music Player Laid the Foundation for Today\u2019s Apple<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/IPod\" target=\"_blank\" rel=\"noopener\">iPod (Wikipedia); this article shows all the iPod models<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,70],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Requiem for the iPod - Intego Mac Podcast Episode 239 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-12T09:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-16T21:29:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/\",\"name\":\"Requiem for the iPod - Intego Mac Podcast Episode 239 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage\"},\"datePublished\":\"2022-05-12T09:00:51+00:00\",\"dateModified\":\"2022-06-16T21:29:51+00:00\",\"description\":\"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Requiem for the iPod &#8211; Intego Mac Podcast Episode 239\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Requiem for the iPod &#8211; Intego Mac Podcast Episode 239\",\"datePublished\":\"2022-05-12T09:00:51+00:00\",\"dateModified\":\"2022-06-16T21:29:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage\"},\"wordCount\":178,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"iPod\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/","og_locale":"en_US","og_type":"article","og_title":"Requiem for the iPod - Intego Mac Podcast Episode 239 - The Mac Security Blog","og_description":"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-05-12T09:00:51+00:00","article_modified_time":"2022-06-16T21:29:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/","name":"Requiem for the iPod - Intego Mac Podcast Episode 239 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage"},"datePublished":"2022-05-12T09:00:51+00:00","dateModified":"2022-06-16T21:29:51+00:00","description":"Apple has discontinued the last iPod, the iPod touch. We discuss some of the history of the iPod, and look at 17 reasons who you should use an iPod touch. We also look at the new FIDO initiative, which allows your phone to replace passwords, and we discuss AirTag false alarms.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Requiem for the iPod &#8211; Intego Mac Podcast Episode 239"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Requiem for the iPod &#8211; Intego Mac Podcast Episode 239","datePublished":"2022-05-12T09:00:51+00:00","dateModified":"2022-06-16T21:29:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#webpage"},"wordCount":178,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","iPod"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/requiem-for-the-ipod-intego-mac-podcast-episode-239\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oTk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95686"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95686"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95686\/revisions"}],"predecessor-version":[{"id":95769,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95686\/revisions\/95769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}