	{"id":96469,"date":"2022-11-03T01:41:03","date_gmt":"2022-11-03T08:41:03","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96469"},"modified":"2022-11-03T01:41:03","modified_gmt":"2022-11-03T08:41:03","slug":"the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/","title":{"rendered":"The Dangers of Verified Accounts on Social Networks &#8211; Intego Mac Podcast Episode 264"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+v0ErCgf1?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We discuss this week&#8217;s Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.<\/p>\n<ul>\n<li><a href=\"https:\/\/developer.apple.com\/documentation\/macos-release-notes\/macos-13_1-release-notes\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.1 will resolve the Full Disk Access issue<\/a><\/li>\n<li><a href=\"https:\/\/rambo.codes\/posts\/2022-10-25-sirispy-ios-bug-allowed-apps-to-eavesdrop\" target=\"_blank\" rel=\"noopener\">SiriSpy &#8211; iOS bug allowed apps to eavesdrop on your conversations with Siri<\/a><\/li>\n<li><a href=\"https:\/\/dortania.github.io\/OpenCore-Legacy-Patcher\/\" target=\"_blank\" rel=\"noopener\">OpenCore Legacy Patcher added Ventura support for 2013 \u201cblack trash can\u201d Mac Pro <\/a><\/li>\n<li><a href=\"https:\/\/www.sec.gov\/news\/press-release\/2018-226\" target=\"_blank\" rel=\"noopener\"> Elon Musk Settles SEC Fraud Charges; Tesla Charged With and Resolves Securities Law Charge <\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/get-to-know-the-system-settings-app-on-macos-ventura\/\" target=\"_blank\" rel=\"noopener\">Get to Know the System Settings App on macOS Ventura<\/a><\/li>\n<\/ul>\n<p>If you like the Intego Mac Podcast podcast, be sure to rate and review it on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We discuss this week&#8217;s Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We discuss this week&#039;s Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangers of Verified Accounts on Social Networks - Intego Mac Podcast Episode 264 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We discuss this week&#039;s Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-03T08:41:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/\",\"name\":\"The Dangers of Verified Accounts on Social Networks - Intego Mac Podcast Episode 264 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage\"},\"datePublished\":\"2022-11-03T08:41:03+00:00\",\"dateModified\":\"2022-11-03T08:41:03+00:00\",\"description\":\"We discuss this week's Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dangers of Verified Accounts on Social Networks &#8211; Intego Mac Podcast Episode 264\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The Dangers of Verified Accounts on Social Networks &#8211; Intego Mac Podcast Episode 264\",\"datePublished\":\"2022-11-03T08:41:03+00:00\",\"dateModified\":\"2022-11-03T08:41:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage\"},\"wordCount\":174,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We discuss this week's Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/","og_locale":"en_US","og_type":"article","og_title":"The Dangers of Verified Accounts on Social Networks - Intego Mac Podcast Episode 264 - The Mac Security Blog","og_description":"We discuss this week's Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-11-03T08:41:03+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/","name":"The Dangers of Verified Accounts on Social Networks - Intego Mac Podcast Episode 264 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage"},"datePublished":"2022-11-03T08:41:03+00:00","dateModified":"2022-11-03T08:41:03+00:00","description":"We discuss this week's Apple security updates, explain why some apps have issues with full disk access in macOS Ventura, and we discuss the dangers of verified accounts on social networks, such as Twitter. We also take a close look at one of the biggest changes in macOS Ventura, the System Settings app.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Dangers of Verified Accounts on Social Networks &#8211; Intego Mac Podcast Episode 264"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The Dangers of Verified Accounts on Social Networks &#8211; Intego Mac Podcast Episode 264","datePublished":"2022-11-03T08:41:03+00:00","dateModified":"2022-11-03T08:41:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#webpage"},"wordCount":174,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-dangers-of-verified-accounts-on-social-networks-intego-mac-podcast-episode-264\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p5X","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96469"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96469"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96469\/revisions"}],"predecessor-version":[{"id":96470,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96469\/revisions\/96470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}